Quantum computing is radically changing the cybersecurity landscape. While this technology offers significant advances in processing and analysis capabilities with extensive applications in simulation, optimisation, and artificial intelligence, it also poses an unprecedented threat to the traditional cryptographic systems that underpin current online security.
Quantum computing, in particular, has the potential to break algorithms such as RSA, ECC and other public key systems using techniques such as Shor's algorithm. This scenario, anticipated as ‘Q-Day’, forces a massive migration from current cryptography to quantum-safe cryptography.
Given that many current systems and devices will not be able to adapt easily, a considerable technical and organisational effort is required.
Spain’s Secretary of State for Telecommunications and Digital Infrastructure, Antonio Hernando Vera, together with Guillermo Moncayo, Deputy Executive Secretary of the OAS’s CICTE, inaugurated the competition, which brings together 84 teams from 17 different countries.
This initiative brings together more than 30 members from 12 countries, including healthcare organizations, sectoral CSIRTs, and key entities such as ENISA.
A CI/CD (Continuous Integration/Continuous Deployment) pipeline is an essential tool in modern software development, which allows you to automate and optimize the entire development lifecycle, from code integration to its deployment in production. The article aims to explain security in CI/CD pipelines, motivating readers to adopt automated practices that not only optimize software development, but also minimize the associated risks. Keep in mind that automation carries certain risks if not handled safely, as it can increase the attack surface for cybercriminals. It underscores the importance of implementing security controls at every stage of the pipeline, urging developers to take initiative-taking steps to protect their code, their environments, and ultimately, their final products.
The ability to monitor and analyze the behavior of users and entities becomes crucial for early detection and response to potential threats. UEBA solutions identify unusual or anomalous patterns in user behavior, enabling rapid identification of internal threats or external compromises. This post focuses on how UEBA analysis is becoming an essential tool for a cybersecurity strategy, from identifying suspicious behavior to preventing potential security breaches.



