ESED. Cyber Security & IT Solutions

Blog

Articles about cybersecurity and IT services

What are logs and why are they important in cybersecurity?
Cybersecurity protocols that you should activate in your company
Differences between pentesting and red teaming: Which is the best option?
MITRE ATT&CK: What is it and how does it work?
DrDoS cyber attack analysis
Compromised email account? How to act when your account is hacked
Democratization of cyber attacks
Managed Detection and Response (MDR): ¿What is it, how does it work, and why is it recommended?
Latest trends in cyberattacks
Cybersecurity in the educational sector
How to recover files encrypted by ransomware
What is social engineering and how to protect yourself: Complete Guide
Complete Guide on Cybersecurity in Biotechs and Laboratories
Ethical hacking applied to the pharmaceutical sector
Solutions that will help you keep phishing at bay in your company
How to detect computer frauds to prevent access to your data
How to protect shared folders to prevent data leakage.
Email Security 2024
Utilizing Artificial Intelligence to prevent cyberattacks
Cybersecurity in advisory and consulting firms
How to recover files infected by a virus?
11 tips to protect your smartphone against cyber attacks