Twitter | Search | |
Search Refresh
Cristina Trullén 5h
Reply Retweet Like
Actualidad en Seguridad 4h
Cyber security design principles Guides for the design of cyber secure systems
Reply Retweet Like
Cristina Trullén 5h
Reply Retweet Like
Cristina Trullén 5h
You can become a target for if you have a poor digital hygiene
Reply Retweet Like
Mila Dory Jun 24
Reply Retweet Like
Ceit 10h
👨‍💻Santiago Figueroa ha participado en el '2nd International Workshop on Blockchains and Smart contracts (BSC)' en , con una ponencia titulada “An Attribute-based Access control using chaincode in RFID systems”.
Reply Retweet Like
Romina Torres Jun 23
Reply Retweet Like
Beatriz Santoveña 8h
AWS anuncia AWS Security Hub y AWS Control Tower
Reply Retweet Like
Auditores Internos 12h
"DNS hijacking grabs headlines, but it’s just the tip of the iceberg" vía
Reply Retweet Like
Auditores Internos 13h
"Beating biometrics: Why biometric authentication alone is not a panacea"
Reply Retweet Like
MARCO Jun 24
Mitigating the Risk of Software Vulnerabilities by Adopting a Secure Software Development Framework (SSDF)
Reply Retweet Like
MisiónDominicana OEA Jun 21
🗓 RESERVA LA FECHA! Del 2⃣4⃣ al 2⃣7⃣ de SEPTIEMBRE de 2⃣0⃣1⃣9⃣ celebraremos el Simposio de de la en Santiago de Chile🇨🇱. ➡ En breve iremos dando a conocer más detalles con el hastag
Reply Retweet Like
Delta Protect Jun 21
“The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards.” -Gene Spafford
Reply Retweet Like
Revista de Prensa "Almendron" Jun 16
Reply Retweet Like
Alvaro Castañeda M. Jun 19
Con Nexus, FirePower Threat Defense Attack Lab ...
Reply Retweet Like
Fernando Huaman 19h
Reply Retweet Like
Fernando Huaman 19h
2 ¼ hours of consumer attention is on socialmedia each day; the platform for payments and fintech solutions.
Reply Retweet Like
Fernando Huaman 19h
Reply Retweet Like
Fernando Huaman Jun 22
Reply Retweet Like
Golden Money Team Music Group Jun 21
Reply Retweet Like