Cecilia Pastorino

Cecilia Pastorino

Security Researcher


Education? Studied Networking and Communication at Palermo University. CCNA and CCNP Cisco certifications and Certified Ethical Hacker (CEH).

Highlights of your career? I worked for almost 10 years in Infrastructure and specialized in network security. In 2012 I got in charge of the information security area of a company in the healthcare industry, where I developed the “Information Security Management System” and certified ISO 27001.

Position and history at ESET? First met ESET in 2013 when I joined Argentina Cibersegura as a volunteer. In January 2017 I became a Security Researcher in ESET Latin America.

What malware do you hate the most? Trojans, because they take advantage of unwary users.

Favorite activities? Travelling, meeting new people and places all over the world. Also amateur photography and rollerskating.

What is your golden rule for cyberspace? Don’t believe everything you see on the Internet. Be careful, the information you share online may be used against you.

When did you get your first computer and what kind was it? It was an Apple II Plus that belonged to my dad before I was born. My mom used to program games for me in the Apple, and I used it for several years until I got my first IBM with Windows 3.11.

Favorite computer game/activity? Investigate, try, break and learn. I also like scape games and all kind of logic games. Wholehearted fan of Carmen Sandiego and Monkey Island.


14 articles by Cecilia Pastorino

Digital Security

How will WPA3 improve WiFi security?

How will WPA3 improve WiFi security?

Digital Security

How will WPA3 improve WiFi security?

This is aimed at improving security at the time of the handshake, which is when the key is being exchanged. As a result, WPA3 is poised to provide robust security even if short or weak passwords are used, i.e. those that don’t contain a combination of letters, numbers and symbols.

Cecilia Pastorino09 Feb 20183 min. read


Digital Security

Five tips for keeping your database secure

Five tips for keeping your database secure

Digital Security

Five tips for keeping your database secure

In general, these are the most basic and essential precautions any systems manager must consider. However, depending on the system you want to protect, there are some additional issues to take into account.

Cecilia Pastorino08 Nov 20174 min. read


How To

How to secure your router to prevent IoT threats?

How to secure your router to prevent IoT threats?

How To

How to secure your router to prevent IoT threats?

The router is the first device that you must consider, since it not only controls the perimeter of your network, but all your traffic and information pass through it.

Cecilia Pastorino26 Oct 20175 min. read


Cloud services: What to consider when migrating your infrastructure

Cloud services: What to consider when migrating your infrastructure

Cloud services: What to consider when migrating your infrastructure

Most companies have switched the majority of their services and information over to the cloud. There are many reasons for this, ranging from cost to practicalities.

Cecilia Pastorino22 Sep 20175 min. read


Scams

Homograph attacks: Don’t believe everything you see

Homograph attacks: Don’t believe everything you see

Scams

Homograph attacks: Don’t believe everything you see

A homograph attack is what happens when attackers register domains that are similar to the originals, with valid certificates.

Cecilia Pastorino27 Jul 20175 min. read