By sending your data you allow us to use it to resolve your doubts by sending you commercial information of interest. We will delete it when they are no longer necessary for this matter. Know your rights in our Privacy Policy.
6 - July 2018
CCN has published LINCE methodology for evaluation of IT products

LINCE will facilitate the inclusion in the CPSTIC catalogue

The CCN has published the LINCE - National Essential Safety Certification evaluation methodology on its website.

read more
4 - June 2018
Panda Adaptive Defense obtains the Common Criteria certification

EAL2+ALC_FLR.1 certificate under the Spanish scheme

The advanced cybersecurity solution Panda Adaptive Defense is the only EDR (Endpoint Detection and Response) protection to obtain the certification of guarantee EAL2+ in its evaluation under the Common Criteria standard.

read more
30 - May 2018
AICPA SOC2 versus ISO 27001

Which one is better for your company?

Nowadays, an increasing inclination can be observed when it comes to increment the efforts on security aiming to meet the current regulation requirements. This entails a parallel rise on the popularity of services like SOC2 and ISO 27001, but which one is better for your company?

read more
14 - May 2018
Four days, three talks, two congresses, one goal.

Sharing knowledge for a more cybersecure world.

It has been an intense few days for the jtsec team, but tremendously rewarding at the same time and, why not, fun as well. Four days to lecture in two congresses with one single goal! To improve cybersecurity in the IT systems.

read more
24 - April 2018
Hardware Hacking and ARM Reverse Engineering training

Attacking embedded security devices and IoT hardware using baremetal reversing

Successful completion of the first edition of our custom Hardware Hacking and Reverse Engineering training! In this way, we open a new series of customized trainings focused on basic and intermediate level attacks applied to security hardware and IoT devices.

read more