
Felipe Ruiz
10 recent critical security breaches
The transportation and logistics sector is now among the most attacked worldwide. Discover some of the most significant recent cyber attacks.

Felipe Ruiz
Towards enhanced vulnerability prioritization
In this blog post, you will learn about reachability analysis, a software assessment technique that helps to prioritize vulnerabilities for their remediation.

Felipe Ruiz
Introduction to cybersecurity in the aviation sector
As part of the transportation industry, the aviation sector, in its massive digital transformation, has faced cybersecurity challenges worth highlighting.

Felipe Ruiz
Protecting your PoS systems from cyber threats
PoS devices are now part and parcel of the retail industry. In this post, we explain the risks these systems face and the best practices for protecting them.

Felipe Ruiz
Top seven successful cyberattacks against this industry
Cyberattacks that negatively impact some companies can serve as a warning and a lesson for others, at least for those still behind the curve in cybersecurity.

Felipe Ruiz
Challenges, threats, and best practices for retailers
The retail sector is part of the global digital transformation, so it is constantly exposed to security threats, for which it should have a preventive posture.

Felipe Ruiz
We need you, but we can't give you any money
We want to persist in raising awareness about the scarce support that many open-source software projects, on which nearly everyone depends, are receiving.

Felipe Ruiz
Lessons learned from black swans
There are also "black swans" in cybersecurity. We can run into one of them at any time, so we must be prepared.

Felipe Ruiz
A digital infrastructure issue that many still ignore
The joke mentioned here is just a small sample of a big dependency issue in the global digital infrastructure, about which we need to raise awareness.