Blog

Filter Total registers 96

Year

  • 2026
  • 2025
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019

Partners

  • Atlassian
  • AWS
  • IBM

Topics

  • Adware
  • Agentes autónomos
  • Agentes de IA para desarrollo.
  • agentes de inteligencia artificial
  • Agile methodology
  • Agility
  • AI
  • AI
  • AI success stories
  • Alliances
  • Amazon Q
  • Amazon RDS
  • Amazon Web Services.
  • Analytic
  • Anthropic IA
  • Artificial intelligence
  • Artificial intelligence in companies
  • Atlassian
  • Automation
  • Automatización inteligente.
  • AWS
  • AWS Benefits
  • AWS Competency
  • AWS Generative AI Competency
  • AWS Identity
  • AWS MEXICO
  • AWS México beneficios
  • AWS México incentivos
  • AWS Shield
  • Azure
  • Benefits of artificial intelligence
  • Bitbucket
  • BLOG
  • Business Agility
  • Business Continuity
  • Business Strategy
  • Certification
  • Certifications
  • Cloud
  • Cloud Computing
  • Cloud Governance
  • Cloud Migration
  • Cloud Migration
  • Cloud Security
  • COBIT
  • competencia Data & Analytics de AWS
  • confluence
  • Consulting
  • Cost strategy
  • Customer Experience
  • Cybersecurity
  • Data analysis
  • Data Center
  • Data Driven
  • Data Modernization
  • Data Security
  • DevOps
  • Evolución digital
  • finance
  • Financial
  • Financiero
  • Gartner
  • Generative AI
  • Human resources
  • Infrastructure
  • Innovation
  • Inteligencia artificial.
  • ISO
  • IT Trends
  • Itera Spain
  • Iterates
  • ITSM
  • Jira Bitbucket Vulnerability
  • Machine learning that it is.
  • Machine Learning vs AI
  • Machine learning.
  • Malware
  • Marketplace
  • Microsoft
  • Migration
  • Modelos de IA avanzados
  • MSP
  • partner aws
  • PARTNERS
  • Phishing
  • Picnic
  • Processes
  • Project Management
  • Remote Work
  • Rovo
  • RPA
  • SaaS
  • Safety
  • Scrum
  • Sensedia
  • Server Support
  • Software
  • Software Development
  • Soluciones IA Empresarial
  • TH
  • TOGAF
  • Training
  • transformación tecnológica
  • Trending
  • Vishing
  • VMWare
  • Well Architected
  • Well architected framework
  • Windows Server

Bring 7 good cybersecurity practices to your company.

Cyber threat and vulnerability management has never faced so many challenges. While there are many digital vulnerability scanning tools to prevent different attacks and detect different types of cyber threats, the effectiveness of these digital tools lies in applying good cybersecurity practices in your company

How to assess your company's information security

Adopting new technologies as a fundamental part of the evolutionary process of digital transformation involves knowing, identifying and understanding new risks, incidents, events, vulnerabilities and threats that companies may be facing.

Itera receives the Award for Best Expert Partner in Well Architected Framework

Itera, a cloud-centric company with more than 20 years of experience and presence in Latin America and Spain, was recognized by Amazon Web Services (AWS) as the organization most specialized in creating secure, high-performance, resilient and efficient cloud infrastructures throughout the region, for which it received the Best Expert Partner Award in Well Architected Framework 2022.

What is Multi-Factor Authentication or MFA?

Multi-Factor Authentication (MFA) is an access management component that requires users to prove their identity using at least two different verification factors before gaining access to a website, mobile app, or any other online resource.

Social Engineering

Social engineering is a malicious practice that aims to obtain sensitive information, doing so through the manipulation of legitimate users so that they reveal it to the attacker.

AWS Local Zones

It will integrate 6 technology centers in Mexico, Colombia, Chile, Peru, Argentina and Brazil

Data Modernization: Key Factor to Increase Business and Improve Your Customers' Trust

Sometimes it seems that organizations function as a 'house of laughter': stairs that go nowhere, doors that lead to walls, windows overlooking other rooms, furniture and shelves on the ceiling, mirrors that distort reality. Go! There is no blueprint of what the finished house is supposed to look like, it is simply a set of ideas or unconnected projects.

Updated: ISO/IEC 27002:2022

Information security, cybersecurity and privacy protection.