top of page

Search


PCI Compliance in Cloud companies
Cloud security does not have to be a complicated topic. This service includes protection of critical information against theft, data...
Apr 16, 2020


Say no more to SSH keys, SSM is THE tool
The remote access login is the barrier intruders must break to steal information. Several options have been tried to help us prevent...
Nov 27, 2019


Pipeline Vulnerability Discovery
How often do you stop to think about the safety of your development tools? Even when these don't intentionally include malicious code,...
Oct 7, 2019


Data breaches: Small business killer
Think for a moment that: 60% of small and midsize businesses (SMBs) affected by some data leak go out of business within 6 months. 62...
May 30, 2019


Becoming GDPR compliant with AWS
G eneral D ata P rotection R egulation is a significant new EU Data Protection Regulation that introduces requirements that will raise...
Apr 24, 2018
bottom of page