Home Newsletters

Cybersecurity Newsletter

Devoteam Cyber Trust offers a newsletter every month to keep you up to date on cybersecurity issues and information security awareness tips. Sign up below to get access to this free information.


Latest editions

Real-life Cyberattack Case

Real-life Cyberattack Case

In recent years, remote and hybrid work has evolved from an emerging trend to a new global standard. With the development of technology and changes in work dynamics, there has been a revolution in how people work and carry out their functions.

The future of passwords

The future of passwords

This May, we celebrate World Password Day, highlighting the importance of this topic and understanding what the future holds for passwords in users' daily lives. Passwords have always been the most widely used authentication method, due to their ease of implementation and use.

Generative Artificial Intelligence: Managing Security Risks

Generative Artificial Intelligence: Managing Security Risks

In a world where technology is advancing by leaps and bounds, Artificial Intelligence (AI) has become an integral part of our daily lives, driving innovation in various sectors. It's impossible not to feel a certain enthusiasm for the ease that AI brings to our personal and professional lives, but just like any other emerging technology, there are some security risks associated with it.

Real-life Cyberattack Case

Real-life Cyberattack Case

In the dynamic and complex cybersecurity landscape, where threats are constantly evolving and cyber attacks are an inevitability, learning through real-life cases becomes an invaluable tool.

What is Spoofing?

What is Spoofing?

The term spoofing is becoming increasingly common in the context of cyber attacks, as it is a technique that can be used for phishing. The key point of a spoofing attack is that the message appears to originate from a secure source, leading someone to overcome a mental defense barrier.

Authentication in Cyberattack Prevention

Authentication in Cyberattack Prevention

Entering a new year is the ideal time to recall and reflect on our cybersecurity practices. A crucial theme in the cybersecurity ecosystem is authentication, and as technology advances, it is important to be aware of best practices in this area and how to leverage this tool.

Archive

2024

2023

2022

2021

2020

2019

Subscribe our newsletter.


Cookie Consent X

Devoteam Cyber Trust S.A. uses cookies for analytical and more personalized information presentation purposes, based on your browsing habits and profile. For more detailed information, see our Cookie Policy.