As part of the standardization activities in GoIT, we attended to the plenary meeting of of CEN-CLC/JTC 13 ‘Cybersecurity and
Read MoreCybersecurity through Openness Although in many occasions the protection of information systems is achieved by implementing obscure procedures, the proper
Read MoreIngeniero Junior para el desarrollo de protocolos criptográficos post-cuánticos en gemelos digitales
Desarrollo de protocolos criptográficos post-cuánticos para creación de canales confidenciales autenticados en sistemas de gemelos digitales
Read MoreDiseño de bases de datos y de protocolos blockchain para el registro de eventos e incidencias en la cadena de producción de productos agroalimentarios
Read MoreIn the digital age, criminal activity has transformed with the advent of ‘Crime-as-a-Service’ (CaaS), presenting unprecedented challenges in the cyber
Read More