Predictive prioritization: How to better manage vulnerabilities January 13, 2020February 22, 2021Tech-Blog Tech-Blog Vulnerability management is becoming increasingly complex. According to Luis Isselin, the general director of Tenable Mexico, a new vulnerability appears every hour. This means that traditional strategies to identify risks do not keep up with cyber threats. For this reason, predictive prioritization is increasingly essential. This approach consists of re-prioritizing vulnerabilities based on... Sure you've heard a lot of things about cybersecurity, but how many of them are true? Know some of the most popular myths about computer security and learn how to better protect your systems. Cryptography and Computer Security: The life cycle of keys & passwords and their relationship with your protection April 23, 2018June 23, 2020Tech-Blog Tech-Blog Do you know what’s behind your keys and passwords’ life cycle? How do they became the perfect match to protect your digital environments? Discover the way cryptography and computer security combine to protect you in this post.