Posts by author
Panda Security
16 hardware and software platforms hacked in minutes. A contest or business reality?
Organizations should use advanced solutions that enable them to properly classify and control access to sensitive information to avoid any kind of problem.
The cold cyberwar and geopolitics: which weapons can protect endpoints?
The COVID-19 pandemic has been accompanied by another associated threat: cyberterrorism. Find out more information about how to protect your endpoint.
Measures to implement against critical vulnerabilities: Zerologon the Windows Netlogon security hole
To ensure your cybersecurity posture is fit for purpose, you must be sure that systems are up-to-date and that the relevant patches have been applied.
The four areas that all cybersecurity policies should keep in mind
One sound practice is to look for solutions that simplify the most common cybersecurity tasks, automating the maximum number of processes.
5 Reasons to join WatchGuardONE
WatchGuard and Panda Security channel partners can access the complete offering of products and benefits that this combined company delivers.
Monitoring and response to vulnerabilities to mitigate cybersecurity risks
Panda Security experts recommend applying security patches as the best strategy for organizations to protect themselves and minimize risks.
Carlos Arnal: โThe economic impact of a DNS attack is too great to ignore the vulnerabilities that would enable itโ
One of the main problems with DNS attacks is the increasing cost of the damage they cause, as well as their rapid evolution.