Today, the way we apply security within corporations has changed dramatically. In the past, we relied on private WAN access and used star designs, implementing security measures by stacking functionalities in a centralized data center while ensuring geographically redundant backups. In many cases, these companies have numerous geographically dispersed locations, and enhancing control and...
Oscar Oller
Main cybersecurity threats for SMEs
For the production fabric in general and for Spain in particular, SMEs play an important role. According to CEPYME (Spanish SMEs business organization), companies with 10 to 49 workers have had a very high employment generation rate in recent years and are now struggling to find qualified workers. CEPYME warns of around 100,000 unfilled vacancies, which together with other problems such as...
Zero Trust Approach and Unified Cloud Security
Introduction In the new paradigm of the connected world, where everything and everyone has access to the Internet, having a totally secure network is difficult to imagine. Today we see how digitization is advancing rapidly, within education, health and government, offering more and more services and simplifying access to data and procedures, generating a high stress to cybersecurity teams. This...
Categories