Connect

Join us Contact

Blog

Tips for a successful SIEM

Tips for a successful SIEM

IBM has held its annual security event, Security Summit in Argentina on September 12 at El Planetario in Buenos Aires. Together with more than 200 clients and business partners, possible scenarios that could result from a cyberattack were presented in order to help...

Uruguayan companies start to get excited about blockchain

Uruguayan companies start to get excited about blockchain

Perhaps you have heard the word blockchain or you must have also heard of cryptocurrencies or bitcoins, however, according to experts on the subject, the meaning of the first term is not entirely clear in the heads of Uruguayans and even many companies are not sure about the...

Why is 5G important?

Why is 5G important?

What started as the portability of telephony became, over time, something much more significant. Cell phones evolved to the point where they are now considered almost inseparable parts of the modern man and woman. Their role as...

The Network Engineer in the Software Age

The Network Engineer in the Software Age

However, the skills that engineers need to have are not outside the scope of the transformation either. Personally, I still remember that when I was starting out in the networking world, where I studied there was a pretty clear map of careers with certifications...

The powerful botnet reappears

The powerful botnet reappears

Researchers at security firm Cofense identified in August that the command and control servers associated with Emotet were active, although the botnet remained dormant. Based on additional research conducted by analysts at...

What information is a hacker looking for and what does he do with it?

Different studies and reports in Latin America show that, in terms of cybercrime prevention, awareness and investment is still insufficient and the actions implemented are sometimes precarious. If we take into account that the detection of a cybercrime problem is...

Zero Day Attacks: what are they and how to protect ourselves?

Zero Day Attacks: what are they and how to protect ourselves?

Recently, citizens from all over the world were alerted to an alleged vulnerability in WhatsApp that allowed something to be installed on the device without the user noticing it. The vulnerability is a perfect example of what is known as a zero day...

German banks drop SMS as second authentication factor

German banks drop SMS as second authentication factor

Through the online banking service, banks seek to alleviate the workload that represents the attention to the public in their branches, aiming to reduce the number of customers who are served physically in their facilities. Since the existence of...

BEC, a major fraud

BEC, a major fraud

For quite some time now, there has been a form of scam called "BEC", which stands for "Business Email Compromise" or Business Email Compromise. It has been responsible for a huge number of frauds committed all over the...

Successful week of discounts for Fenicio stores

Successful week of discounts for Fenicio stores

However, several companies opted to extend their discounts in their online stores during the whole week, as well as to carry out promotions in parallel to the official event. For Fenicio's customers, the results of this action were positive, compared to those of...

Uruguay present at Collision Tech Conference 2019

Uruguay present at Collision Tech Conference 2019

With an estimated attendance of more than 25,000 people, Collision was for a week the meeting point for startups, companies and delegations from around the world. Cuti together with Smart Services (Uruguay XXI) and eight Uruguayan companies (Bunker db, Código del Sur, Convexa,...

Conditions for the use of Cuti's Blog
  1. Its use may not be contrary to the rules of the Oriental Republic of Uruguay, which means that, among others, publications of discriminatory, violent, pornographic content, or that damage the property, image or honor of persons may not be made.
  2. Any User may report the existence of inappropriate content. Cuti may remove -at its sole discretion- these contents.
  3. Cuti may provide copies of the contents, even those containing personal data, to any police, judicial or administrative authority upon request.
  4. Third-party content must have sufficient rights for publication.
  5. Users of the Blog exonerate Cuti from any civil, commercial, labor, tax, criminal, administrative or any other liability resulting from their actions related to the contents of this Blog.