redBorder joins the edge of innovation: Mobile World Congress 2015
Take note and come to meet us! We are thrilled to announce that we will be at the Mobile World Congress (MWC15) this year in beautiful Barcelona! We not only have the privilege of being surrounded by...
View ArticleredBorder will be the main sponsor of the IX University Free Software Contest
We have confirmed that we will participate as a main sponsor of the ninth edition of the Free Software University Contest (CUSL-acronym in Spanish). This will be organized by different universities and...
View Article“redBorder was born disruptive”: Pitch2Market by everisDigital at a glance
We stand on the other side of the camera to interview Aurelio Martin, our Business Developer Manager of redBorder, who will travel to Barcelona on Tuesday March 24 to attend the Pitch2Market organized...
View ArticleWhy is OSINT a key point of a CSIRT?
In order for a cybersecurity team to be able to identify threats, you must access and manage large amounts of information. This information could come from an alarm generated by an IDS, an anomaly in...
View ArticleWhy Big Data turns an essential key in a cybersecurity strategy
Currently, there is a continuous increase of devices (tablets, mobile phones, M2M …) connected together. In 2016 there will be about 18,900 million devices connected to the Internet worldwide. All...
View ArticleProcessing data streams in Real-time
The processing of Real-Time streams involves two key elements. One, we have sensors that collect and send information. Furthermore, a system is responsible for receiving the data, analyzing and...
View ArticleCUSL supports Free Software as bet of future
The 7th and 8th May will be the end of the ninth edition of Free Software University Contest (CUSL- acronym in Spanish). The Faculty of the University of Zaragoza will be the setting the stage and...
View ArticleWearables: Why analytics and security go hand in hand
You wake up and see that you have spent 7 hours and 14 mins in bed last night, but that you only had 3 hours and 24 mins of deep sleep. A graph shows you that you are an extremely light sleeper, and...
View ArticleWhy are anomaly detection and machine learning algorithms so important to...
Today the detection of attacks and intrusion is an important role in the security of our networks. To address this issue, we have several systems that follow a number of different strategies to solve...
View ArticleredBorder Family Album
Introduction and captions: Maria Nicholas Photo and content edition: Raquel Campuzano Go to top It has been an eventful several months for the rB team. We’ve been on quite a journey of learning,...
View Article
More Pages to Explore .....