
Felipe Ruiz
Watch out for keylogging/keyloggers
Here we spell out what keylogging is and what keyloggers are, as well as how you can prevent, identify and remove them.

Felipe Ruiz
Benefits and risks of these increasingly used programs
We describe the password managers, their advantages and disadvantages, some recent security incidents, and give you some recommendations on their use.

Felipe Ruiz
Description and critique of CEH certifications
Here's a description and a critique of the CEH founded on the question, "Should the person who has this certification be called a 'certified ethical hacker'?"

Felipe Ruiz
Recognize the value of this security assessment method
We took as a basis a question from Tribe of Hackers Red Team (2019) aimed at explaining the value of red teaming to those who're reluctant or unaware of it.

Felipe Ruiz
A roadmap for developing and releasing secure software
CISA and other agencies published a guide encouraging organizations to offer their customers secure-by-design and secure-by-default products.

Felipe Ruiz
Tips for choosing a vulnerability management solution
If you are still wondering what you should pay more attention to when choosing a vulnerability management solution, we recommend you read this blog post.

Felipe Ruiz
Keep tabs on this proposal from the Biden-Harris Admin
Learn about the cybersecurity strategy announced by the Biden-Harris Administration, specifically, the issues it aims to address and the pillars it is based on.

Felipe Ruiz
Definitions, classifications and pros and cons
Learn what vulnerability scanners and vulnerability scanning are, what their classifications are, and what their pros and cons are.

Felipe Ruiz
How this process works and what benefits come with it
Learn about the vulnerability management process, its stages, and the benefits your organization can obtain by implementing it.