Attacking embedded security devices and IoT hardware using baremetal reversing
Successful completion of the first edition of our custom Hardware Hacking and Reverse Engineering training! In this way, we open a new series of customized trainings focused on basic and intermediate level attacks applied to security hardware and IoT devices.
Regulating the acquisition of IT products in the administration
One of our goals when we created jtsec was to make our contribution to increasing the awareness and knowledge on cybersecurity on the companies within our sector. Because of that, we have invested a great deal of time in preparing courses that adapt to what each of our clients need to know.
Our training experience in Malaysia
One of the objectives in creating jtsec was to support companies to increase their cybersecurity knowledge. For this reason, we have invested a large part of our time in preparing trainings that cover the knowledge needs of our clients.
NIS Directive, its application to Spanish National Security Scheme (ENS), and Spanish National Critical Infrastructure Catalogue (CNPIC)
In the last few years, certain areas of activity or infrastructure which provide essential services, of vital relevance for the continuity of state functioning, have become the target of numerous attacks. It is hard to miss that there is a strong dependency over certain infrastructures whose interruption or destruction would have a huge impact on the health, security and economic wellbeing of the citizens. Such infrastructures have become a high-priority target for state security strategies, materializing the concept of critical infrastructure
As graduates of the UGR etsiit, we speak about our entrepreneurial experience
This morning we had the chance to tell the students of the Escuela Técnica Superior de Ingenieros en Informática y Telecomunicaciones de la Universidad de Granada about our experience as entrepreneurs shaping jtsec.