By sending your data you allow us to use it to resolve your doubts by sending you commercial information of interest. We will delete it when they are no longer necessary for this matter. Know your rights in our Privacy Policy.
We help you being compliant to CCN-STIC 102 and 106 guides of spanish National Cryptological Centre (CCN)
25- Oct 2017
We help you being compliant to CCN-STIC 102 and 106 guides of spanish National Cryptological Centre (CCN)

Analysis of the new CCN-STIC 102 and 106 guidelines

The spanish National Cryptological Centre (CCN, Centro Criptológico Nacional) has published in its website, on 10/25/2017, the CCN-STIC 102 and 106 Guides, where the they have included the process to be followed for Approval of ICT security products for handling classified national information and for the inclussion of ITC security products in the spanish Catalog of ITC Security Products (CPSTIC).

read more
GDPR: Changes with respect to the Spanish data protection law (LOPD)
19- Oct 2017
GDPR: Changes with respect to the Spanish data protection law (LOPD)

Change analysis

In this article we will make a brief analysis of the most important changes made in the GDPR with respect to the old Spanish data protection law (LOPD)

read more
jtsec, new member of ISMS Forum Spain
25- Sept 2017
jtsec, new member of ISMS Forum Spain

jtsec is now member of ISMS Spain Forum, a Spanish association for the information security promotion.

ISMS Forum Spain is a non-profit organization founded in January 2007 to promote the development, knowledge and culture of Information Security in Spain and to act as benefit of all the community implicates of the sector.

read more
Deep Machine Learning
11- Sept 2017
Deep Machine Learning

Deep Machine Learning applied to cybersecurity in today's scene

Nowadays, the scene of cybersecurity is not the most hopeful one, If we consider the continuous growing and spreading of new kinds of malware through all types of devices and operating systems. Based on the statistics from sources such as Karspersky or GDATA, it is possible to check that the malware is not under control and still growing in new variants, with the objective of avoiding security measures and taking advantage of all types of vulnerabilities.

read more
How ISO/IEC 27001 could have helped protecting your business from WannaCry
25- May 2017
How ISO/IEC 27001 could have helped protecting your business from WannaCry

WannaCry cyber attack exposed weaknesses of many big companies for cyber-threat to information security. Implanting ISO/IEC 27001 norm could have protected the information of the attacked companies.

On last May 12, a worldwide cyber-attack based on WannaCrypt ransomware software was carried out by cyber criminals, affecting a great number of important corporations in many countries. This event quickly appeared in every newspaper, news webpage, and social media.

read more