representación de honeypots para ciberseguridad

Honeypots: the bitter candy for cybercriminals

  One of the biggest challenges posed by the advancement of digitization in the industrial sector is to guarantee the security of information in critical infrastructures. Until recently, the industry’s OT and IT networks remained isolated, making it easier to ensure security in the operations network. Today, for reasons of efficiency and cost reduction, both […]

Imagen de pagos digitales

Crypto technologies for the banking and digital payments market

Cash is numbered. With the advent of COVID-19, the growth of digital payment transactions has accelerated, with a particular focus on contactless, online and instant payments. Accenture’s global study shows that contactless payments have grown by 150% since March 2019. Nearly 2.7 trillion transactions, worth $48 billion, are expected to shift from cash to cards and digital […]

The three shields against vulnerability

  Gradiant is part of the BIECO project that is developing different tools for vulnerability detection, that arises from the need to address the increase detected in cybersecurity attacks in recent years. The boost in teleworking has provided attackers with a vast field to act in id, in most cases, insufficiently protected. Clear examples of […]

GRD Tech: Cybersecurity

With spring just around the corner we jumped into the pool with a new blog section. At GRD Tech, our colleagues will talk to about the most disruptive technologies and trends of the moment, besides telling us first-hand about the technologies we are developing and the problems they solve. In this first publication, our colleagues […]

5 Cybersecurity trends everyone is talking about after RSA 2018

Last week San Francisco’s Moscone Center hosted the world’s largest professional meeting on ICT security. More than 45,000 expert and visitors attended the RSA Conference 2018 to learn about new policies, practices, advances and technological solutions that are being developed to deal with current challenges facing the sector and to anticipate future ones. As it […]

Artificial intelligence, the future of cybersecurity?

When in 1984, William Gibson wrote Neuromancer,  years before world wide web was born, he was not only able to anticipate to hyper connected world using the term “cyberspace”, but he also foresaw cybersecurity associated problems. In the novel, Casi, the antihero and hacker (cyber cowboy in Gibson’s text) is hired to break the security […]