News

El talón de Aquiles de la criptografía: cómo los PRNG pueden arruinar tu seguridad

The Achilles' heel of cryptography: how PRNGs c...

Celia Catalán

A02:2021 - Cryptographic failures – Pseudorandom Number Generators (PRNG) Introduction The generation of random numbers in programming is crucial for many applications, especially in...

The Achilles' heel of cryptography: how PRNGs c...

Celia Catalán

A02:2021 - Cryptographic failures – Pseudorandom Number Generators (PRNG) Introduction The generation of random numbers in programming is crucial for many applications, especially in...

El Desarrollo Seguro: Un pilar fundamental para la protección de nuestro negocio

Secure Development: A fundamental pillar for th...

JUAN ANTONIO CALLES

Secure development is an essential approach to creating threat-resistant software, integrating security measures from design to maintenance. Based on standards such as OWASP ASVS, it ensures effective controls in key...

Secure Development: A fundamental pillar for th...

JUAN ANTONIO CALLES

Secure development is an essential approach to creating threat-resistant software, integrating security measures from design to maintenance. Based on standards such as OWASP ASVS, it ensures effective controls in key...

A08:2021 - Software and Data Integrity Failures

A08:2021 - Software and Data Integrity Failures

Celia Catalán

In this chapter of the OWASP Top Ten, we are going to talk about the vulnerability A08:2021 - Software and Data Integrity Failures or in Spanish A08:2021 - Failures in...

A08:2021 - Software and Data Integrity Failures

Celia Catalán

In this chapter of the OWASP Top Ten, we are going to talk about the vulnerability A08:2021 - Software and Data Integrity Failures or in Spanish A08:2021 - Failures in...

Estado actual de la ciberseguridad: desafíos y tendencias

Current state of cybersecurity: challenges and ...

JUAN ANTONIO CALLES

Global cybersecurity faces an alarming panorama marked by the increase in advanced threats and key sectors such as finance, health and industry particularly affected. From ransomware that paralyzes operations and...

Current state of cybersecurity: challenges and ...

JUAN ANTONIO CALLES

Global cybersecurity faces an alarming panorama marked by the increase in advanced threats and key sectors such as finance, health and industry particularly affected. From ransomware that paralyzes operations and...

Identification and authentication failures

Identification and authentication failures

Celia Catalán

Identification, authentication, or authorization? First, we must understand the difference between identification and authentication: Identification: It is the process where an identity is provided; a u...

Identification and authentication failures

Celia Catalán

Identification, authentication, or authorization? First, we must understand the difference between identification and authentication: Identification: It is the process where an identity is provided; a u...

Se aprueba el Anteproyecto de Ley de Coordinación y Gobernanza de la Ciberseguridad: NIS2 llega a España

The Draft Law on Coordination and Governance of...

JUAN ANTONIO CALLES

The approval of the draft Law on Coordination and Governance of Cybersecurity represents a milestone in the protection of digital assets in Spain. The transposition of the NIS-2 Directive not...

The Draft Law on Coordination and Governance of...

JUAN ANTONIO CALLES

The approval of the draft Law on Coordination and Governance of Cybersecurity represents a milestone in the protection of digital assets in Spain. The transposition of the NIS-2 Directive not...