Today I have been reflecting on one of the values of my company: Life Balance, and what it represents in today’s society, especially in my country. We know that in Mexico we work a longer business working day than in other countries, that we take fewer days off each year, and please, let’s not forget […]
Posts Tagged ‘cybersecurity’
Emotional Intelligence: the Intelligence of Success
“CEOs are hired for their intellect and business expertise – and fired for a lack of emotional intelligence.” – Goleman. Emotional intelligence is the capacity that allows us to become aware of our emotions, understand the feelings of others, tolerate the pressures and frustrations we endure at work, increase our capacity for empathy and our […]
IT Industry: Its Adaptation in Times of Pandemic
It is not easy for a company to survive times of uncertainty and radical changes in all aspects (economic, technological, political, etc). However, IT companies have survived and grown enormously in times of pandemics. It has been almost 2 years since the pandemic began. Two years full of challenges and changes for many companies around […]
QA Team Building 2021
An important aspect of being a Great Place to work is having a great job environment in which people know each other and their achievements and great performance are acknowledged. We know how important it is to make our peers feel seen and appreciated and a great example of that is our yearly QA Team […]
How to Design Visually Appealing Better Forms (and Not Suffer in the Process)
Forms are everyday work for developers and UI designers around the world. This can either be a usability nightmare or a perfectly applied solution that users don’t even realize it took a lot of effort to plan, design, and code. Here I’ll give you some guidance on how to better up our form design. […]
Adopting a Zero Trust Approach to Security – Part 2
Welcome back! Our last blog on adopting a Zero Trust approach to security gave you a high-level overview of the core principles in a Zero Trust security model. In this blog, we’ll start by discussing o the first and most important pillar, identity. Identity is the primary control plane for the Zero Trust model, which […]
Adopting a Zero Trust approach to security – Part 1
Zero Trust has become somewhat of a buzzword over the past couple of years and has been coined the new gold standard of security models as technology has changed. So what exactly does “Zero Trust” mean, and should your organization start considering adopting this model? In this blog, we’ll discuss the Zero Trust security model […]
5G Is Here, and It’s Time to Increase Your Cybersecurity Posture
5G is changing the face of communication and connection. According to Forbes, the technological innovations from 5G could contribute as much as $2.2 trillion to the global economy over the next 15 years. The service will revolutionize the amount of data collection and increasing the number of connected devices and sensors. With the rapid growth […]
Creating a Data Flow Diagram
A data flow diagram (DFD) documents the path data takes throughout your process/system. It is important to document and keep accurate and updated. Part of the value of such a diagram is that it shows where data is crossing a trust boundary. For example, user input (low trust) from a web site crosses a boundary […]
The Need for a National Health Record
In healthcare, which is more important privacy or safety? Are they mutually exclusive? In the leaps that we have made in cybersecurity in healthcare, can’t we have both? The main argument I hear against a National Health Record is people’s fear of a data breach. Contrary to that popular belief, one study, related to sharing […]
How To Use The AWS API With S3 Buckets In Your Pen Test
Pen testers often need to stage payloads and other tools on servers outside of their own infrastructure. In this post I’ll show you how to use the Amazon AWS command line interface (CLI) to dynamically create and manage S3 buckets that you can use in your own pen tests. I’ll also show you how to […]
Ransomware Attack Affects 23 Texas Local Government Agencies
In what appears as a highly coordinated attack by a single actor, 23 local government agencies in the state of Texas were hit with ransomware. This extends the recent trend where local government entities were targeted, some of which have led to the attackers being paid millions of dollars via crypto-currency. A first line of […]