Wendy Rodriguez
Data breaches that left their mark on time
A look back at these ill-intentioned attacks that made us grateful they weren't directed towards our organizations.
Wendy Rodriguez
The best offense is a good defense
Proactive prevention is the best strategy against ransomware attacks. That’s why we compiled the best practices to prevent this malicious act.
Wendy Rodriguez
Historic events that will inspire you to act
In this post, we talk about the biggest and most impactful ransomware attacks in history that emphasize the need to take cybersecurity measures.
Felipe Ruiz
On-premises or in the cloud, security is your concern
We bring you a small comparison between on-premises and cloud environments, disclosing their advantages and disadvantages, with a stronger emphasis on security.
Felipe Ruiz
Attackers can indirectly instruct AI for malicious aims
We show you that LLM-integrated apps can suffer indirect prompt injection attacks through different methods that can put the security of their users at risk.
Felipe Ruiz
Let's rather say a bunch of breaches in a single box
They said they discovered the mother of all data breaches. But it was a false alarm. Let's understand why.
Felipe Ruiz
NIST sheds light on the classification of attacks on AI
Here is an overview of a recent NIST report on adversarial machine learning that could help us understand more about attacks against and from AI systems.
Jason Chavarría
Six main items in an AI policy for software development
Your company should have a policy about generative AI usage for software development. Read our suggestions on the most important items to include.
Jason Chavarría
Five best practices for coding with the help of gen AI
Generative AI tools are an ally for developers to write code efficiently. We share five best practices for developing software securely while using those tools.