Ciberseguridad

Contenido Ciberseguridad

Blog posted on 18/09/2025

Quantum computing is radically changing the cybersecurity landscape. While this technology offers significant advances in processing and analysis capabilities with extensive applications in simulation, optimisation, and artificial intelligence, it also poses an unprecedented threat to the traditional cryptographic systems that underpin current online security. 

Quantum computing, in particular, has the potential to break algorithms such as RSA, ECC and other public key systems using techniques such as Shor's algorithm. This scenario, anticipated as ‘Q-Day’, forces a massive migration from current cryptography to quantum-safe cryptography. 

Given that many current systems and devices will not be able to adapt easily, a considerable technical and organisational effort is required.

News posted on 08/09/2025

Spain’s Secretary of State for Telecommunications and Digital Infrastructure, Antonio Hernando Vera, together with Guillermo Moncayo, Deputy Executive Secretary of the OAS’s CICTE, inaugurated the competition, which brings together 84 teams from 17 different countries.

News posted on 25/08/2025

This initiative brings together more than 30 members from 12 countries, including healthcare organizations, sectoral CSIRTs, and key entities such as ENISA.

News posted on 21/08/2025
Blog posted on 14/11/2024

A  CI/CD (Continuous Integration/Continuous Deployment) pipeline is an essential tool in modern software development, which allows you to automate and optimize the entire development lifecycle, from code integration to its deployment in production. The article aims to explain security in  CI/CD pipelines, motivating readers to adopt automated practices that not only optimize software development, but also minimize the associated risks. Keep in mind that automation carries certain risks if not handled safely, as it can increase the attack surface for cybercriminals. It underscores the importance of implementing security controls at every stage of the pipeline, urging developers to take initiative-taking steps to protect their code, their environments, and ultimately, their final products.

News posted on 16/09/2024
Blog posted on 29/08/2024

The ability to monitor and analyze the behavior of users and entities becomes crucial for early detection and response to potential threats. UEBA solutions identify unusual or anomalous patterns in user behavior, enabling rapid identification of internal threats or external compromises. This post focuses on how UEBA analysis is becoming an essential tool for a cybersecurity strategy, from identifying suspicious behavior to preventing potential security breaches.