Jose Luis C. Bringas | Ciberseguridad

Jose Luis C. Bringas | Ciberseguridad

7 episodes

Soy José Luis C. Bringas, gracias por aceptar unos minutos conmigo. Lo que escucharemos en este podcast es sobre experiencias, anécdotas, dudas y tratar de romper algunos paradigmas en materia de Ciberseguridad, ojalá algo de esto te ayude. Únete a este Podcast de Ciberseguridad. En redes sociales nos encuentras como @easysecmx

Podcasts

E175 Que es un actor de amenazas?

Published: June 25, 2024, 8:05 a.m.
Duration: 11 minutes 39 seconds

Listed in: Technology

E174 Que es el phishing y como protegerse?

Published: June 18, 2024, 8:05 a.m.
Duration: 12 minutes 1 second

Listed in: Technology

E173 Como enfocar la Ciberseguridad en el negocio?

Published: June 11, 2024, 8:05 a.m.
Duration: 16 minutes

Listed in: Technology

E172 Vale la pena invertir en Ciberseguridad?

Published: June 4, 2024, 8:05 a.m.
Duration: 13 minutes 47 seconds

Listed in: Technology

E171 Que es el Pentest y para que sirve?

Published: May 28, 2024, 8:05 a.m.
Duration: 17 minutes 39 seconds

Listed in: Technology

E170 La importancia del Analisis de Vulnerabilidades

Published: May 21, 2024, 8:05 a.m.
Duration: 12 minutes 46 seconds

Listed in: Technology

E169 Como generar una estrategia de Ciberseguridad?

Published: May 14, 2024, 8:05 a.m.
Duration: 11 minutes 51 seconds

Listed in: Technology

E168 Consejos para proteger el correo corporativo

Published: May 7, 2024, 8:02 a.m.
Duration: 17 minutes 45 seconds

Listed in: Technology

E167 Como proteger la informacion de tu empresa?

Published: April 30, 2024, 8:05 a.m.
Duration: 17 minutes 18 seconds

Listed in: Technology

E166 Como clasificar la informacion?

Published: April 23, 2024, 8:02 a.m.
Duration: 15 minutes 30 seconds

Listed in: Technology

E165 Perdida de datos, Que es y como prevenirla?

Published: April 16, 2024, 8:02 a.m.
Duration: 12 minutes 39 seconds

Listed in: Technology

E164 Por que es necesario un Firewall en la empresa?

Published: April 9, 2024, 8:05 a.m.
Duration: 16 minutes 50 seconds

Listed in: Technology

E163 Tipos de vulnerabilidades en el software

Published: April 2, 2024, 8:05 a.m.
Duration: 14 minutes 31 seconds

Listed in: Technology

E162 Plan de respuesta contra Ransomware

Published: March 26, 2024, 8:07 a.m.
Duration: 18 minutes 6 seconds

Listed in: Technology

E161 Cifrado de informacion

Published: March 19, 2024, 8:05 a.m.
Duration: 11 minutes 59 seconds

Listed in: Technology

E160 El control de cambios

Published: March 12, 2024, 8:04 a.m.
Duration: 14 minutes 10 seconds

Listed in: Technology

E159 El antimalware no lo es todo

Published: March 5, 2024, 6:05 a.m.
Duration: 11 minutes 30 seconds

Listed in: Technology

E158 Doble factor de autenticacion

Published: Feb. 27, 2024, 6:05 a.m.
Duration: 13 minutes

Listed in: Technology

E157 Visibilidad en la infraestructura

Published: Feb. 20, 2024, 6:05 a.m.
Duration: 13 minutes 12 seconds

Listed in: Technology

E156 Beneficios de un SOC

Published: Feb. 13, 2024, 8:02 a.m.
Duration: 15 minutes 21 seconds

Listed in: Technology

E155 Ciberseguridad para el trabajo remoto

Published: Feb. 6, 2024, 8:02 a.m.
Duration: 14 minutes 47 seconds

Listed in: Technology

E154 Que pasa si no hay ciberseguridad?

Published: Jan. 30, 2024, 8:02 a.m.
Duration: 12 minutes 27 seconds

Listed in: Technology

E153 Capacita al personal: Invertir miles o perder millones

Published: Jan. 23, 2024, 8:10 a.m.
Duration: 11 minutes 11 seconds

Listed in: Technology

E152 Amenazas Persistentes Avanzadas

Published: Jan. 16, 2024, 8:02 a.m.
Duration: 16 minutes 1 second

Listed in: Technology

E151 Politicas de seguridad en el correo electronico

Published: Jan. 9, 2024, 8:02 a.m.
Duration: 10 minutes 29 seconds

Listed in: Technology

E150 Minimos privilegios

Published: Dec. 19, 2023, 8:02 a.m.
Duration: 16 minutes 48 seconds

Listed in: Technology

E149 Por que los ciberataques son exitosos?

Published: Dec. 12, 2023, 8:02 a.m.
Duration: 17 minutes 5 seconds

Listed in: Technology

E148 Como crear una estrategia de ciberseguridad?

Published: Dec. 5, 2023, 8:02 a.m.
Duration: 15 minutes 11 seconds

Listed in: Technology

E147 Ciberseguridad en PyMEs

Published: Nov. 28, 2023, 8:02 a.m.
Duration: 14 minutes 34 seconds

Listed in: Technology

E146 Fortalece la seguridad con el hardening

Published: Nov. 21, 2023, 8:02 a.m.
Duration: 13 minutes 45 seconds

Listed in: Technology

E145 Documentar es necesario para la empresa

Published: Nov. 14, 2023, 8:02 a.m.
Duration: 12 minutes 20 seconds

Listed in: Technology

E144 Auditorias de seguridad

Published: Nov. 7, 2023, 8:02 a.m.
Duration: 11 minutes 33 seconds

Listed in: Technology

E143 Que es el filtrado web?

Published: Oct. 31, 2023, 8:02 a.m.
Duration: 11 minutes 39 seconds

Listed in: Technology

E142 Que es el control de aplicaciones?

Published: Oct. 24, 2023, 8:02 a.m.
Duration: 13 minutes 30 seconds

Listed in: Technology

E141 Segmentacion de red

Published: Oct. 17, 2023, 8:02 a.m.
Duration: 11 minutes 47 seconds

Listed in: Technology

E140 Como elegir una herramienta de seguridad para la empresa?

Published: Oct. 10, 2023, 8:02 a.m.
Duration: 14 minutes

Listed in: Technology

E139 Gestion de usuarios

Published: Oct. 3, 2023, 8:02 a.m.
Duration: 16 minutes 41 seconds

Listed in: Technology

E138 Que es el phishing y como prevenirlo?

Published: Sept. 26, 2023, 8:02 a.m.
Duration: 15 minutes 21 seconds

Listed in: Technology

E137 Que es la actividad sospechosa?

Published: Sept. 19, 2023, 8:10 a.m.
Duration: 15 minutes 17 seconds

Listed in: Technology

E136 Tengo ciberseguridad y se infectan mis equipos?

Published: Sept. 12, 2023, 8:10 a.m.
Duration: 20 minutes 42 seconds

Listed in: Technology

E135 Gestion de vulnerabilidades

Published: Sept. 5, 2023, 8:02 a.m.
Duration: 16 minutes 53 seconds

Listed in: Technology

E134 Que es un SGSI?

Published: Aug. 29, 2023, 8 a.m.
Duration: 13 minutes 3 seconds

Listed in: Technology

E133 La importancia del inventario de activos

Published: Aug. 22, 2023, 8:10 a.m.
Duration: 14 minutes 47 seconds

Listed in: Technology

E132 Como proteger la informacion financiera de tu empresa?

Published: Aug. 15, 2023, 8 a.m.
Duration: 11 minutes 46 seconds

Listed in: Technology

E131 Como saber si mi empresa esta segura?

Published: Aug. 8, 2023, 8:10 a.m.
Duration: 13 minutes 24 seconds

Listed in: Technology

E130 Beneficios de la Ciberseguridad en las empresas

Published: Aug. 1, 2023, 8:10 a.m.
Duration: 11 minutes 56 seconds

Listed in: Technology

E129 Ataques Dirigidos

Published: July 25, 2023, 8:10 a.m.
Duration: 15 minutes 43 seconds

Listed in: Technology

E128 Como recuperarse de un ciberataque?

Published: July 18, 2023, 8:10 a.m.
Duration: 14 minutes 26 seconds

Listed in: Technology

E127 Los Directivos deben apoyar la Ciberseguridad

Published: July 11, 2023, 8:07 a.m.
Duration: 13 minutes 51 seconds

Listed in: Technology

E126 Que es la suplantacion de identidad?

Published: July 4, 2023, 8:10 a.m.
Duration: 15 minutes 54 seconds

Listed in: Technology

E125 La mejora continua en Ciberseguridad

Published: June 27, 2023, 8:09 a.m.
Duration: 15 minutes 39 seconds

Listed in: Technology

E124 Consejos para proteger la informacion de la empresa

Published: June 20, 2023, 8:10 a.m.
Duration: 14 minutes 37 seconds

Listed in: Technology

E123 La importancia del mantenimiento

Published: June 13, 2023, 8:05 a.m.
Duration: 13 minutes 35 seconds

Listed in: Technology

E122 Que es y para que sirve un firewall?

Published: June 6, 2023, 8:10 a.m.
Duration: 17 minutes 58 seconds

Listed in: Technology

E121 El costo de un ataque interno

Published: May 30, 2023, 8:10 a.m.
Duration: 17 minutes 52 seconds

Listed in: Technology

E120 Como proteger los datos que salen de la empresa?

Published: May 23, 2023, 8:07 a.m.
Duration: 16 minutes 45 seconds

Listed in: Technology

E119 La Ciberseguridad mantiene segura la empresa?

Published: May 16, 2023, 8:10 a.m.
Duration: 9 minutes 46 seconds

Listed in: Technology

E118 Que son los movimientos laterales?

Published: May 9, 2023, 8:15 a.m.
Duration: 13 minutes 51 seconds

Listed in: Technology

E117 Filtraciones de datos

Published: May 2, 2023, 8:14 a.m.
Duration: 13 minutes 49 seconds

Listed in: Technology

E116 La importancia del monitoreo en ciberseguridad

Published: April 25, 2023, 8:10 a.m.
Duration: 14 minutes 5 seconds

Listed in: Technology

E115 Que son los controles de seguridad?

Published: April 18, 2023, 8:10 a.m.
Duration: 13 minutes 49 seconds

Listed in: Technology

E114 La importancia de la ciberseguridad en el negocio

Published: April 11, 2023, 8:15 a.m.
Duration: 14 minutes 51 seconds

Listed in: Technology

E113 La importancia de las actualizaciones

Published: April 4, 2023, 8:16 a.m.
Duration: 13 minutes 41 seconds

Listed in: Technology

E112 Matriz de roles y responsabilidades

Published: March 28, 2023, 8:14 a.m.
Duration: 12 minutes 25 seconds

Listed in: Technology

E111 Tu empresa esta preparada para un ciberataque?

Published: March 21, 2023, 8:13 a.m.
Duration: 14 minutes 21 seconds

Listed in: Technology

E110 Como definir el alcance de un pentest?

Published: March 14, 2023, 8:15 a.m.
Duration: 16 minutes 17 seconds

Listed in: Technology

E109 Comprendiendo la proteccion en capas

Published: March 7, 2023, 7 a.m.
Duration: 15 minutes 46 seconds

Listed in: Technology

E108 Perspectivas de la Seguridad de la Informacion

Published: Feb. 28, 2023, 8:15 a.m.
Duration: 12 minutes 12 seconds

Listed in: Technology

E107 Las fases de un ciberataque

Published: Feb. 21, 2023, 8:05 a.m.
Duration: 15 minutes 49 seconds

Listed in: Technology

E106 Cultura de ciberseguridad en la empresa

Published: Feb. 14, 2023, 8:20 a.m.
Duration: 14 minutes 12 seconds

Listed in: Technology

E105 Como definir una politica de seguridad?

Published: Feb. 7, 2023, 8:28 a.m.
Duration: 16 minutes 4 seconds

Listed in: Technology

E104 Como gestionar la ciberseguridad en la empresa?

Published: Jan. 31, 2023, 8:15 a.m.
Duration: 14 minutes 10 seconds

Listed in: Technology

E103 Ciberseguridad en PyMEs

Published: Jan. 24, 2023, 8:15 a.m.
Duration: 12 minutes 38 seconds

Listed in: Technology

E102 Conociendo mas de ingenieria social

Published: Jan. 17, 2023, 8:30 a.m.
Duration: 14 minutes 50 seconds

Listed in: Technology

E101 Algunos errores al implementar Ciberseguridad

Published: Jan. 10, 2023, 8:20 a.m.
Duration: 14 minutes 53 seconds

Listed in: Technology

E100 Eventos de seguridad para la toma de decisiones

Published: Jan. 3, 2023, 8:30 a.m.
Duration: 11 minutes 48 seconds

Listed in: Technology

E99 Plan de continuidad del negocio (BCP)

Published: Dec. 27, 2022, 8:30 a.m.
Duration: 14 minutes 18 seconds

Listed in: Technology

E98 Estrategia de Ciberseguridad

Published: Dec. 20, 2022, 8:30 a.m.
Duration: 13 minutes 37 seconds

Listed in: Technology

E97 Proteger el correo electronico

Published: Dec. 13, 2022, 8:30 a.m.
Duration: 12 minutes 10 seconds

Listed in: Technology

E96 El antivirus no lo es todo

Published: Dec. 6, 2022, 8:30 a.m.
Duration: 11 minutes 43 seconds

Listed in: Technology

E95 Que es y para que sirve el control de cambios?

Published: Nov. 29, 2022, 8:30 a.m.
Duration: 12 minutes 23 seconds

Listed in: Technology

E94 Beneficios de un Analisis de Vulnerabilidades

Published: Nov. 22, 2022, 8:30 a.m.
Duration: 12 minutes 50 seconds

Listed in: Technology

E93 Monitorear los equipos de los empleados

Published: Nov. 15, 2022, 8:30 a.m.
Duration: 11 minutes 26 seconds

Listed in: Technology

E92 Beneficios de un DLP en la empresa

Published: Nov. 8, 2022, 8:30 a.m.
Duration: 13 minutes 14 seconds

Listed in: Technology

E91 Documentar tambien ayuda en Ciberseguridad

Published: Nov. 1, 2022, 8:30 a.m.
Duration: 11 minutes 46 seconds

Listed in: Technology

E90 Como manejar un incidente de seguridad?

Published: Oct. 25, 2022, 7:15 a.m.
Duration: 10 minutes 39 seconds

Listed in: Technology

E89 Como gestionar las amenazas?

Published: Oct. 18, 2022, 7:26 a.m.
Duration: 13 minutes 18 seconds

Listed in: Technology

E88 Que es el hardening?

Published: Oct. 11, 2022, 7:15 a.m.
Duration: 12 minutes 17 seconds

Listed in: Technology

E87 Arquitectura y Plan de Ciberseguridad

Published: Oct. 4, 2022, 7:30 a.m.
Duration: 14 minutes 38 seconds

Listed in: Technology

E86 Como definir las amenazas de seguridad?

Published: Sept. 27, 2022, 7:31 a.m.
Duration: 13 minutes 44 seconds

Listed in: Technology

E85 Beneficios de un Centro de Operaciones de Seguridad (SOC)

Published: Sept. 20, 2022, 7:25 a.m.
Duration: 14 minutes 50 seconds

Listed in: Technology

E84 Que habilidades requiere un analista de SOC?

Published: Sept. 13, 2022, 7:30 a.m.
Duration: 11 minutes 7 seconds

Listed in: Technology

E83 Falta de personal y estres en Ciberseguridad

Published: Sept. 6, 2022, 7:36 a.m.
Duration: 15 minutes 38 seconds

Listed in: Technology

E82 La importancia de la ciberseguridad en la empresa

Published: Aug. 30, 2022, 7:45 a.m.
Duration: 11 minutes 44 seconds

Listed in: Technology

E81 Por que se complica una auditoria de seguridad?

Published: Aug. 23, 2022, 7:15 a.m.
Duration: 11 minutes 42 seconds

Listed in: Technology

E80 Que es y como funciona el malware?

Published: Aug. 16, 2022, 7:58 a.m.
Duration: 15 minutes 14 seconds

Listed in: Technology

E79 Ingenieria social, ataques mas comunes

Published: Aug. 9, 2022, 8 a.m.
Duration: 14 minutes 21 seconds

Listed in: Technology

E78 Eligiendo un antimalware / antivirus

Published: Aug. 2, 2022, 7 a.m.
Duration: 13 minutes 37 seconds

Listed in: Technology

E77 Principio del minimo privilegio

Published: July 26, 2022, 7 a.m.
Duration: 13 minutes 54 seconds

Listed in: Technology

E76 Analisis de Vulnerabilidades y Pentest

Published: July 19, 2022, 7 a.m.
Duration: 12 minutes 32 seconds

Listed in: Technology

E75 5 Puntos por los que falla la estrategia de ciberseguridad

Published: July 12, 2022, 8 a.m.
Duration: 14 minutes 26 seconds

Listed in: Technology

E74 Enfoca la ciberseguridad al negocio

Published: July 5, 2022, 8 a.m.
Duration: 13 minutes 40 seconds

Listed in: Technology

E73 Como se si valio la pena mi inversion en ciberseguridad?

Published: June 28, 2022, 8 a.m.
Duration: 14 minutes 47 seconds

Listed in: Technology

E72 Beneficios del Filtrado Web

Published: June 21, 2022, 8 a.m.
Duration: 11 minutes 45 seconds

Listed in: Technology

E71 Por que debemos cambiar nuestras contrasenas?

Published: June 14, 2022, 8 a.m.
Duration: 14 minutes 20 seconds

Listed in: Technology

E70 Debo cumplir con la norma ISO 27001?

Published: June 7, 2022, 8 a.m.
Duration: 14 minutes 26 seconds

Listed in: Technology

E69 Que es un SIEM?

Published: May 31, 2022, 8 a.m.
Duration: 12 minutes 18 seconds

Listed in: Technology

E68 Que es un sandbox y para que sirve?

Published: May 24, 2022, 8 a.m.
Duration: 15 minutes 36 seconds

Listed in: Technology

E67 Detectando un insider

Published: May 17, 2022, 8 a.m.
Duration: 16 minutes 42 seconds

Listed in: Technology

E66 Eres victima frecuente de ciberataques?

Published: May 10, 2022, 8 a.m.
Duration: 18 minutes 20 seconds

Listed in: Technology

E65 Politicas de Ciberseguridad Como generarlas?

Published: May 3, 2022, 8 a.m.
Duration: 18 minutes 22 seconds

Listed in: Technology

E64 DRP Esta tu empresa lista para un desastre?

Published: April 26, 2022, 8 a.m.
Duration: 14 minutes

Listed in: Technology

E63 Que hacer despues de un incidente de seguridad?

Published: April 19, 2022, 8 a.m.
Duration: 13 minutes 9 seconds

Listed in: Technology

E62 Como ayuda el Directorio Activo?

Published: April 12, 2022, 8 a.m.
Duration: 14 minutes 58 seconds

Listed in: Technology

E61 Como clasificar la informacion?

Published: April 11, 2022, 11:53 p.m.
Duration: 17 minutes 31 seconds

Listed in: Technology

E60 Como actuar ante un ciberataque?

Published: March 29, 2022, 9 a.m.
Duration: 14 minutes 24 seconds

Listed in: Technology

E59 Ataques dirigidos

Published: March 22, 2022, 9 a.m.
Duration: 14 minutes 47 seconds

Listed in: Technology

E58 Por que se infectan mis equipos?

Published: March 15, 2022, 9 a.m.
Duration: 13 minutes 25 seconds

Listed in: Technology

E57 Segmentacion de la red Corporativa

Published: March 8, 2022, 9 a.m.
Duration: 13 minutes 8 seconds

Listed in: Technology

E56 Deja de retrasar las actualizaciones

Published: March 1, 2022, 9 a.m.
Duration: 14 minutes 58 seconds

Listed in: Technology

E55 Evita que un ex empleado dane la empresa

Published: Feb. 22, 2022, 9 a.m.
Duration: 13 minutes 33 seconds

Listed in: Technology

E54 No te arriesgues!, protege tu correo

Published: Feb. 15, 2022, 9 a.m.
Duration: 14 minutes 43 seconds

Listed in: Technology

E53 Comprometerse con la Ciberseguridad

Published: Feb. 8, 2022, 9 a.m.
Duration: 14 minutes 6 seconds

Listed in: Technology

E52 Ciberseguridad empresarial PyMEs

Published: Feb. 1, 2022, 9 a.m.
Duration: 14 minutes 34 seconds

Listed in: Technology

E51 Como ayudan los backups?

Published: Jan. 25, 2022, 9 a.m.
Duration: 13 minutes 30 seconds

Listed in: Technology

E50 Prevenir ciberataques con un Pentest

Published: Jan. 18, 2022, 9 a.m.
Duration: 12 minutes 33 seconds

Listed in: Technology

E49 Como guardar y proteger tus contrasenas?

Published: Jan. 11, 2022, 9 a.m.
Duration: 11 minutes 8 seconds

Listed in: Technology

E48 La documentacion tambien importa

Published: Jan. 4, 2022, 9 a.m.
Duration: 11 minutes 26 seconds

Listed in: Technology

E47 Como generar una estrategia de ciberseguridad?

Published: Dec. 28, 2021, 9 a.m.
Duration: 14 minutes 10 seconds

Listed in: Technology

E46 Productividad y ciberseguridad empresarial

Published: Dec. 21, 2021, 9 a.m.
Duration: 12 minutes 59 seconds

Listed in: Technology

E45 Tu empresa es blanco facil de ciberataques?

Published: Dec. 14, 2021, 9 a.m.
Duration: 15 minutes 13 seconds

Listed in: Technology

E44 Que es un DLP?

Published: Dec. 7, 2021, 9 a.m.
Duration: 11 minutes 56 seconds

Listed in: Technology

E43 Antimalware, Endpoint protection y EDR, Cual elegir?

Published: Nov. 30, 2021, 9 a.m.
Duration: 12 minutes 4 seconds

Listed in: Technology

E42 Insiders o Amenazas internas

Published: Nov. 23, 2021, 9 a.m.
Duration: 13 minutes 28 seconds

Listed in: Technology

E41 La ciberseguridad empieza por nosotros mismos

Published: Nov. 16, 2021, 9 a.m.
Duration: 12 minutes 45 seconds

Listed in: Technology

E40 En ciberseguridad el mantenimiento tambien importa

Published: Nov. 9, 2021, 9 a.m.
Duration: 11 minutes 46 seconds

Listed in: Technology

E39 Para que cifrar los datos en mi empresa?

Published: Nov. 2, 2021, 9 a.m.
Duration: 13 minutes 15 seconds

Listed in: Technology

E38 Como se produce un ciberataque?

Published: Oct. 26, 2021, 8 a.m.
Duration: 13 minutes

Listed in: Technology

E37 Cultura en Ciberseguridad

Published: Oct. 19, 2021, 8 a.m.
Duration: 12 minutes 42 seconds

Listed in: Technology

E36 Que es la fuga de informacion?

Published: Oct. 12, 2021, 8 a.m.
Duration: 12 minutes 13 seconds

Listed in: Technology

E35 Destruyamos la informacion

Published: Oct. 5, 2021, 8 a.m.
Duration: 12 minutes 49 seconds

Listed in: Technology

E34 Analisis de Vulnerabilidades

Published: Sept. 28, 2021, 8 a.m.
Duration: 12 minutes 33 seconds

Listed in: Technology

E33 Que es y para que sirve la Seguridad Informatica?

Published: Sept. 21, 2021, 8 a.m.
Duration: 12 minutes 17 seconds

Listed in: Technology

E32 Como empezar un proyecto de Ciberseguridad?

Published: Sept. 14, 2021, 9 a.m.
Duration: 11 minutes 54 seconds

Listed in: Technology

E31 Violacion de datos

Published: Sept. 7, 2021, 8 a.m.
Duration: 12 minutes 44 seconds

Listed in: Technology

E30 Detecta a los intrusos

Published: Aug. 31, 2021, 8 a.m.
Duration: 11 minutes 57 seconds

Listed in: Technology

E29 El arte del engano - Ingenieria Social

Published: Aug. 24, 2021, 8 a.m.
Duration: 12 minutes 51 seconds

Listed in: Technology

E28 Ciberseguridad para PyMEs - 6 Puntos basicos

Published: Aug. 17, 2021, 9 a.m.
Duration: 11 minutes 31 seconds

Listed in: Technology

E27 Por esto debemos tener especialistas en Ciberseguridad

Published: Aug. 10, 2021, 8 a.m.
Duration: 12 minutes 39 seconds

Listed in: Technology

E26 Servicios en la nube protegidos

Published: Aug. 3, 2021, 8 a.m.
Duration: 11 minutes 6 seconds

Listed in: Technology

E25 Directivos en la mira de los Ciberdelincuentes

Published: July 27, 2021, 8 a.m.
Duration: 10 minutes 45 seconds

Listed in: Technology

E24 Mejora Continua en Ciberseguridad - SGSI

Published: July 20, 2021, 8 a.m.
Duration: 12 minutes 46 seconds

Listed in: Technology

E23 Ciberseguridad para las PyMEs

Published: July 13, 2021, 8 a.m.
Duration: 11 minutes 24 seconds

Listed in: Technology

E22 La economia de la privacidad

Published: July 6, 2021, 8 a.m.
Duration: 10 minutes 36 seconds

Listed in: Technology

E21 Este es el principal ataque a las empresas

Published: June 29, 2021, 8 a.m.
Duration: 12 minutes 44 seconds

Listed in: Technology

E20 Cual es el mejor antivirus para mi empresa?

Published: June 22, 2021, 9 a.m.
Duration: 12 minutes 6 seconds

Listed in: Technology

E19 Otra mas de Ransomware

Published: June 15, 2021, 9 a.m.
Duration: 12 minutes 27 seconds

Listed in: Technology

E18 El olvidado doble factor de autenticacion

Published: June 8, 2021, 9 a.m.
Duration: 12 minutes 6 seconds

Listed in: Technology

E17 El terror de las auditorias

Published: June 1, 2021, 9 a.m.
Duration: 12 minutes 58 seconds

Listed in: Technology

E16 Que no se fugue tu informacion

Published: May 25, 2021, 8 a.m.
Duration: 12 minutes

Listed in: Technology

E15 Si haces esto, Mejor NO compres un Firewall!

Published: May 18, 2021, 6 a.m.
Duration: 12 minutes 59 seconds

Listed in: Technology

E14 Quiubo chatos? - Cantinflas revive con DeepFake

Published: May 11, 2021, 9 a.m.
Duration: 14 minutes 12 seconds

Listed in: Technology

E13 No dejes la puerta abierta

Published: May 4, 2021, 9 a.m.
Duration: 11 minutes 28 seconds

Listed in: Technology

E12 HomeOffice vs Ciberseguridad

Published: April 27, 2021, 9 a.m.
Duration: 12 minutes 32 seconds

Listed in: Technology

E11 Las capas de seguridad

Published: April 20, 2021, 10 a.m.
Duration: 11 minutes 50 seconds

Listed in: Technology

E10 Detectando actividad sospechosa

Published: April 13, 2021, 10 a.m.
Duration: 10 minutes 59 seconds

Listed in: Technology

E09 El control de dispositivos es importante

Published: April 6, 2021, 11 a.m.
Duration: 11 minutes 32 seconds

Listed in: Technology

E08 El enfoque de la Ciberseguridad al negocio

Published: March 30, 2021, noon
Duration: 10 minutes 5 seconds

Listed in: Technology

E07 Las Politicas de Ciberseguridad Ocultas

Published: March 23, 2021, noon
Duration: 10 minutes 56 seconds

Listed in: Technology

E06 Lecciones que nos ha dejado la pandemia

Published: March 16, 2021, 5:32 p.m.
Duration: 9 minutes 53 seconds

Listed in: Technology

005 Empecemos a implementar ciberseguridad 10 Tips

Published: March 9, 2021, noon
Duration: 10 minutes 37 seconds

Listed in: Technology

E05 Empecemos a implementar ciberseguridad 10 Tips

Published: March 9, 2021, noon
Duration: 10 minutes 37 seconds

Listed in: Technology

004 Planeando la Ciberseguridad de forma inteligente

Published: March 2, 2021, 2 p.m.
Duration: 11 minutes 17 seconds

Listed in: Technology

E04 Planeando la Ciberseguridad de forma inteligente

Published: March 2, 2021, 2 p.m.
Duration: 11 minutes 17 seconds

Listed in: Technology

003 Pueden tomar el control de tu celular y distribuirse

Published: Feb. 23, 2021, noon
Duration: 10 minutes 46 seconds

Listed in: Technology

E03 Pueden tomar el control de tu celular y distribuirse

Published: Feb. 23, 2021, noon
Duration: 10 minutes 46 seconds

Listed in: Technology

002 Cuando implementar Ciberseguridad se vuelve complejo

Published: Feb. 16, 2021, 1 p.m.
Duration: 11 minutes 32 seconds

Listed in: Technology

E02 Cuando implementar Ciberseguridad se vuelve complejo

Published: Feb. 16, 2021, 1 p.m.
Duration: 11 minutes 32 seconds

Listed in: Technology

001 Los ataques también pueden ser internos

Published: Feb. 9, 2021, 9:09 p.m.
Duration: 9 minutes 21 seconds

Listed in: Technology

E01 Los ataques tambien pueden ser internos

Published: Feb. 9, 2021, 9:09 p.m.
Duration: 9 minutes 21 seconds

Listed in: Technology