News
The Achilles' heel of cryptography: how PRNGs c...
A02:2021 - Cryptographic failures – Pseudorandom Number Generators (PRNG) Introduction The generation of random numbers in programming is crucial for many applications, especially in...
The Achilles' heel of cryptography: how PRNGs c...
A02:2021 - Cryptographic failures – Pseudorandom Number Generators (PRNG) Introduction The generation of random numbers in programming is crucial for many applications, especially in...
Secure Development: A fundamental pillar for th...
Secure development is an essential approach to creating threat-resistant software, integrating security measures from design to maintenance. Based on standards such as OWASP ASVS, it ensures effective controls in key...
Secure Development: A fundamental pillar for th...
Secure development is an essential approach to creating threat-resistant software, integrating security measures from design to maintenance. Based on standards such as OWASP ASVS, it ensures effective controls in key...
A08:2021 - Software and Data Integrity Failures
In this chapter of the OWASP Top Ten, we are going to talk about the vulnerability A08:2021 - Software and Data Integrity Failures or in Spanish A08:2021 - Failures in...
A08:2021 - Software and Data Integrity Failures
In this chapter of the OWASP Top Ten, we are going to talk about the vulnerability A08:2021 - Software and Data Integrity Failures or in Spanish A08:2021 - Failures in...
Current state of cybersecurity: challenges and ...
Global cybersecurity faces an alarming panorama marked by the increase in advanced threats and key sectors such as finance, health and industry particularly affected. From ransomware that paralyzes operations and...
Current state of cybersecurity: challenges and ...
Global cybersecurity faces an alarming panorama marked by the increase in advanced threats and key sectors such as finance, health and industry particularly affected. From ransomware that paralyzes operations and...
Identification and authentication failures
Identification, authentication, or authorization? First, we must understand the difference between identification and authentication: Identification: It is the process where an identity is provided; a u...
Identification and authentication failures
Identification, authentication, or authorization? First, we must understand the difference between identification and authentication: Identification: It is the process where an identity is provided; a u...
The Draft Law on Coordination and Governance of...
The approval of the draft Law on Coordination and Governance of Cybersecurity represents a milestone in the protection of digital assets in Spain. The transposition of the NIS-2 Directive not...
The Draft Law on Coordination and Governance of...
The approval of the draft Law on Coordination and Governance of Cybersecurity represents a milestone in the protection of digital assets in Spain. The transposition of the NIS-2 Directive not...





