Navegación agéntica Comet Atlas Manus

Navegación agéntica: unos becarios (por ahora) que me ahorran horas de clics

There’s a part of digital work I never liked, but couldn’t avoid.Looking for information. Comparing options. Opening websites. Accepting cookies. Filling out forms. Canceling services. Copying and pasting from here to there and then into an Excel sheet. A slog that didn’t add value. Over the past few weeks, I’ve started noticing something different. I’m …

¿Qué pasa si cae tu web / PMS?

FITUR 2026: Ciberseguridad en el sector hotelero: riesgos clave, impacto real y cómo proteger tu hotel

FITUR 2026 once again brings the major challenges facing the hotel industry to the forefront: digitalisation, guest experience, operational efficiency… and, increasingly, cybersecurity. The adoption of cloud-based PMS, channel managers, contactless check-in, digital payments and process automation has turned hotels into technology-driven businesses operating 24/7. In this context, security is no longer just a technical …

Peligros de usar IA sin auditoría

Riesgos de la IA que deberías conocer. ¿Necesita tu empresa una estrategia de IA?

This week I got the call that always makes me uncomfortable: “Carlos, we’ve been asked for documentation about our AI systems and we don’t even know what we have or how to classify them. Can we get fined?” The short answer: yes. And it could end your business. At Delbion we’ve been auditing systems for …

10 most common design mistakes tech startups make

Los 10 errores de diseño más comunes que cometen las startups tecnológicas (y cómo evitarlos)

“We want to invest €80,000 in the launch campaign for this new app, and we want to be sure the product can onboard 1,000 new customers per day.” – This is a common message from startup investors. This is Carlos Salgado, technology and cybersecurity auditor. Investors and partners ask: “Can you take a look at …

Job Offer Traps Fraud

Caso personal de ofertas de trabajo trampa: Si me hubieran dicho esto hace un mes, no habría perdido 120.000 €

In today’s digital landscape, it is increasingly common for cybercriminals to use job searching as an attack vector to compromise the security of professionals and organizations. Fake job offers have become a sophisticated method to deceive unsuspecting candidates and run malicious code on their devices, putting valuable information and corporate environments at risk. How this …