Eduard Bardají

Posts by Eduard Bardají
The future of VPNs: Are they being replaced by SASE and ZTNA?
The future of VPN

The future of VPNs: Are they being replaced by SASE and ZTNA?

Jun 17, 2025 12:21:27 PM 4 min read
Technological tools to increase security in Biotechs
technological-tools-to-enhance-security-in-biotechs

Technological tools to increase security in Biotechs

Jun 17, 2025 11:44:39 AM 2 min read
Most common cyberattacks in the food industry: Real cases
most-common-cyberattacks-in-the-food-industry-real-cases-and-how-to-solve-them

Most common cyberattacks in the food industry: Real cases

Jun 17, 2025 11:21:54 AM 3 min read
Red vs Blue Team: Simulating cyberattacks to improve business security
red-team-vs-blue-team-cyberattack-simulations-to-strengthen-business-security

Red vs Blue Team: Simulating cyberattacks to improve business security

Jun 17, 2025 10:41:36 AM 2 min read
How to protect genomic and research data in biotechnology companies
protect-genomic-data-biotechs

How to protect genomic and research data in biotechnology companies

Jun 17, 2025 10:09:17 AM 2 min read
Security Policies to enforce best practices in corporate social media

Security Policies to enforce best practices in corporate social media

Feb 14, 2025 11:46:34 AM 3 min read
BYOD: How to protect your business in a personal device environment

BYOD: How to protect your business in a personal device environment

Feb 14, 2025 10:29:01 AM 2 min read
How to differentiate a real cyberattack from a computer issue
differentiate a real cyberattack from a computer issue

How to differentiate a real cyberattack from a computer issue

Jan 13, 2025 11:54:24 AM 2 min read
How to improve the security of your WordPress
Security for WordPress

How to improve the security of your WordPress

Jan 13, 2025 11:51:37 AM 2 min read
Proactive cybersecurity: What it is and its advantages
ciberseguridad proactiva

Proactive cybersecurity: What it is and its advantages

Jan 13, 2025 11:47:24 AM 3 min read
Adware through identity theft: A threat to businesses
Adware a través de la suplantación de identidad.

Adware through identity theft: A threat to businesses

Jan 13, 2025 11:46:27 AM 2 min read
How does a Ransomware attack work?
Ransomware, cómo funciona

How does a Ransomware attack work?

Nov 27, 2024 11:56:09 AM 2 min read
ESED. Cyber Security & IT Solutions

Blog

Articles about cybersecurity and IT services

The future of VPNs: Are they being replaced by SASE and ZTNA?
Technological tools to increase security in Biotechs
Most common cyberattacks in the food industry: Real cases
Red vs Blue Team: Simulating cyberattacks to improve business security
How to protect genomic and research data in biotechnology companies
Security Policies to enforce best practices in corporate social media
BYOD: How to protect your business in a personal device environment
How to differentiate a real cyberattack from a computer issue
How to improve the security of your WordPress
Proactive cybersecurity: What it is and its advantages
Adware through identity theft: A threat to businesses
How does a Ransomware attack work?