Navegación agéntica Comet Atlas Manus

Agentic browsing: a few interns (for now) who save me hours of clicking around

There’s a part of digital work I never liked, but couldn’t avoid.Looking for information. Comparing options. Opening websites. Accepting cookies. Filling out forms. Canceling services. Copying and pasting from here to there and then into an Excel sheet. A slog that didn’t add value. Over the past few weeks, I’ve started noticing something different. I’m …

¿Qué pasa si cae tu web / PMS?

Fitur 2026: Cybersecurity in the Hotel Industry: Key Risks, Real Impact and How to Protect Your Hotel

FITUR 2026 once again brings the major challenges facing the hotel industry to the forefront: digitalisation, guest experience, operational efficiency… and, increasingly, cybersecurity. The adoption of cloud-based PMS, channel managers, contactless check-in, digital payments and process automation has turned hotels into technology-driven businesses operating 24/7. In this context, security is no longer just a technical …

Peligros de usar IA sin auditoría

AI Risks You Should Know About. Does Your Company Need an AI Strategy?

This week I got the call that always makes me uncomfortable: “Carlos, we’ve been asked for documentation about our AI systems and we don’t even know what we have or how to classify them. Can we get fined?” The short answer: yes. And it could end your business. At Delbion we’ve been auditing systems for …

10 most common design mistakes tech startups make

The 10 most common design mistakes tech startups make (and how to avoid them)

“We want to invest €80,000 in the launch campaign for this new app, and we want to be sure the product can onboard 1,000 new customers per day.” – This is a common message from startup investors. This is Carlos Salgado, technology and cybersecurity auditor. Investors and partners ask: “Can you take a look at …

Job Offer Traps Fraud

Personal Case of Job Offer Traps: If you had told me this a month ago, I wouldn’t have lost €120,000

In today’s digital landscape, it is increasingly common for cybercriminals to use job searching as an attack vector to compromise the security of professionals and organizations. Fake job offers have become a sophisticated method to deceive unsuspecting candidates and run malicious code on their devices, putting valuable information and corporate environments at risk. How this …