Technological Surveillance: Trends and Strategies in Cybersecurity 

Cybersecurity has emerged as a fundamental pillar in the protection of data and infrastructure in the digital age. Increasing global interconnectedness has left individuals and organizations vulnerable to increasingly complex cyber threats, the consequences of which can range from the disruption of Internet access to the leaking and manipulation of […]

Academic and Investigative Surveillance in Cybersecurity 

Cybersecurity is critical to protecting information, privacy, and critical infrastructure in the digital age. From an academic perspective, this article reviews the state of the art of cybersecurity, exploring its evolution, benefits and key tools, as well as scientometric indicators that reflect the development of research in […]

Commercial and Competitive Surveillance in the Cybersecurity Sector

Strategic Monitoring of the Business Environment Commercial and competitive surveillance in the field of cybersecurity is essential to maintain a strategic advantage in a dynamic and constantly evolving environment. It involves monitoring the industry-specific business environment, collecting critical information that allows informed and strategic decisions to be made. This dual approach allows us to identify […]

Cybersecurity and Legal Protection: A Comprehensive Approach for Institutions 

In the current digital environment, computer security has become an unavoidable priority for Higher Education Institutions (HEIs), private companies and government entities. The increasing dependence on technology in all spheres of life has accentuated the need to protect digital assets and preserve the integrity of data in […]

Strengthening Cybersecurity with proactive and innovative strategies.

Jorge Merchán Lima – CEDIA Information Security Manager A look at the evolution and future of cybersecurity from a SOC-CSIRT perspective In the constant battle against cyber threats, Latin America and the Caribbean have witnessed a significant evolution in the way that cybersecurity is addressed. The Operations Centers […]