PwnTillDawn para America Latina 2022
América Latina hoy en día es objeto de más de 700 millones de ciberataques al año, en...
Digital Transformation
The example of digital transformation studied by Digitalya, and available on their blog (see link below) is...
How to Better Prepare for Penetration Testing
Penetration testing -also called pentesting or ethical hacking- is a method used by specialists to assess a system's security measures. Certified cybersecurity...
«Wir wurden gehackt!» | Cyberattacke auf Schweizer Unternehmen | Ein Geschäftsführer...
Kenneth Reber, Geschäftsführer einer Firma für Lüftungstechnik im Berner Oberland, hätte nie mit einer Cyberattacke auf sein Unternehmen gerechnet. Im Video erzählt...
Top 5 Web Application Security Risks
As the world pushes forwards to go mobile, web application security risks have become a crucial part of our daily lives. Online...
RSA Asia Conference 2018
wizlynx group will be exhibiting at the RSA Asia Conference that will take place at the Marina Bay Sands in Singapore from the 25th to...
The Rise of Artificial Intelligence in Cyber Security
Currently, the new trends in cyber security are the use of artificial intelligence (AI) and machine-learning to predict threats before they are even conceived....
Effectively Securing Your Corporate Web Applications in 5 Steps
According to the latest Verizon Data Breach Investigations Report, cyber-attacks are on the rise. The cat-and-mouse game between hackers and defenders of corporate web...
Strategic Ethical Hacking: Harnessing the Power of Red and Blue Teams...
Step into the captivating realm of cybersecurity! Here, organizations valiantly guard their digital treasures against constant threats. Picture ethical hacking as a...
What Does wizlynx group Do? A beginner’s guide to our cyber...
We have all grown accustomed to the convenience of the digital world, always ready at the tap of our fingertips. However, as...