Young hacker smiling
Person playing chess against a robotic arm

Will machines replace us?

Automatic detection vs manual detection
Quill icon Andres Cuberos   Folder icon philosophy   Tag icon application,  detect,  vulnerability,  scanner

More than 20 years have passed since Garry Kasparov, the chess world champion, was defeated by Deep Blue, the supercomputer designed by IBM. For many people, that event was proof that machines had managed to exceed human intelligence [1]. This believe raised many doubts and concerns regarding technological advance, that …



Person working on the computer while looking at cellphone

Delimiting an Ethical Hacking

How to define the scope of your objectives
Quill icon Felipe Gómez   Folder icon philosophy   Tag icon ethical hacking,  pentesting,  security testing

The main problem encountered by an organization when they need to perform security testing is establishing the boundaries of the test. Delimiting the scope of a Pentest by time is a common mistake since it is not possible to know when a test, that is measured solely by effort, has …



Hands typing in a text editor

The importance of pentesting

Protect your company against Hackers, not Lamers
Quill icon Felipe Gómez   Folder icon philosophy   Tag icon security,  protect,  information

Without a doubt, the recent events in relation to the infringement of privacy, such as the theft of personal information from celebrities, the Sony, Target and Equifax hacks, and the big ransomware that affected Telefonica, make us reflect about how organizations protect their information. All of this in addition to …



Service status - Terms of Use