






Our director:
Lola Cano, Director of Trust Lab and professor at Universidad Politécnica de Cartagena (UPCT), Spain, has more than 25 years of experience in research and teaching. Author of two patents and numerous scientific publications, she has led important research projects at the national and regional level. As a member of the IEEE Artificial Intelligence Standardization Committee, she has received several awards, including the Research Group of Excellence and the Exemplary Reviewer Award from the IEEE Communications Society.


OUR DIRECTOR:

Lola Cano, Director of Trust Lab and professor at Universidad Politécnica de Cartagena (UPCT), Spain, has more than 25 years of experience in research and teaching. Author of two patents and numerous scientific publications, she has led important research projects at the national and regional level. As a member of the IEEE Artificial Intelligence Standardization Committee, she has received several awards, including the Research Group of Excellence and the Exemplary Reviewer Award from the IEEE Communications Society.
VISION:
We transform technology into your most secure and reliable ally.
We lead in telecommunications security through innovation, collaboration, and training. Together, we create a bright and secure digital future for everyone.
MISSION:
At TRUST Lab, we confidently reinvent the future of cybersecurity.
We are dedicated to training exceptional talent, leading cutting-edge research, and creating innovative solutions that empower people, protect industries, and safeguard societies globally.
R&D&I Laboratory
R&D&I
Laboratory
At TRUST Lab, in collaboration with the Polytechnic University of Cartagena and funded by the National Cybersecurity Institute (INCIBE), we lead the research and development of advanced technologies in cybersecurity, privacy, and secure communications.
We are dedicated to creating a secure and reliable digital environment, offering high-level training for companies and young talent.
Our 3 pillars
Leadership in cybersecurity innovation
We lead innovation in cybersecurity with advanced solutions and global collaborations to protect critical infrastructure and personal data.
Advanced training and empowerment
Our advanced training programs train cybersecurity leaders, equipping them with technical skills and a solid understanding of data protection.
Strategic collaboration for a secure future
We are the ideal strategic partner for companies seeking robust and practical cybersecurity solutions. We offer joint projects, specialized consulting, and customized training programs for a secure and reliable digital future.
THE POWER OF
COLLABORATION
At TRUST Lab, we know that with the power of collaboration, we will overcome any cybersecurity challenge.
We work with a wide network of partners, from large companies to startups and government agencies, to develop innovative and effective solutions.
Our collaborations include joint research projects, advanced solution development, specialized consulting, and training programs tailored to the specific needs of our partners.
With governments, we actively contribute to the formulation of cybersecurity policies and regulations, providing technical advice and participating in key initiatives to protect critical infrastructure.
We are active members of global networks dedicated to cybersecurity and privacy, where we share knowledge about emerging threats and design collaborative strategies. Our participation in the IEEE Artificial Intelligence Standardization Committee reinforces our commitment to excellence and leadership in the international arena.

THE POWER OF COLLABORATION
At TRUST Lab, we know that with the power of collaboration, we will overcome any cybersecurity challenge.
We work with a wide network of partners, from large companies to startups and government agencies, to develop innovative and effective solutions.
Our collaborations include joint research projects, advanced solution development, specialized consulting, and training programs tailored to the specific needs of our partners.
With governments, we actively contribute to the formulation of cybersecurity policies and regulations, providing technical advice and participating in key initiatives to protect critical infrastructure.
We are active members of global networks dedicated to cybersecurity and privacy, where we share knowledge about emerging threats and design collaborative strategies. Our participation in the IEEE Artificial Intelligence Standardization Committee reinforces our commitment to excellence and leadership in the international arena.



Director | Professor

Communications Director

Researcher

Researcher

Researcher

Researcher

Doctoral Researcher

Junior Researcher

Junior Researcher

Junior Researcher

Junior Researcher

Junior Researcher

Junior Researcher

Junior Researcher

Junior Researcher

Junior Researcher

Junior Researcher

Junior Researcher

Junior Researcher

Junior Researcher

Junior Researcher

Marketing Assistant

Professor

Professor

Professor

Professor

Professor

Professor

Professor

Professor

Professor

Professor

External Collaborator

External Collaborator

Researcher

Junior Researcher

Junior Researcher

Visiting Scholar
Our diverse and talented team is dedicated to cybersecurity, privacy, and secure communications. We value international collaboration, integrating diverse global perspectives to drive innovation and develop effective solutions. Together, we are moving toward the safer and more trustworthy society we all want.
Our Blog

Which Programming Language Should You Learn in 2025?
Practical guide with goal-based plans 2025 at a glance: the market is rebounding and the decision shifts After the post-pandemic adjustment driven by the higher cost of capital, software engineering demand began recovering in 2024. Entering 2025, the language choice should be framed less as “collecting technologies” and more as

Malicious QR Codes: the New Gateway to Online Fraud
Why QR codes are everywhere (and why it matters) QR codes are used practically everywhere. They’re cheap, easy to create, and easy to scan—just open the camera and you’re done. That mix of low cost and minimal friction explains their success in hospitality, retail, banking, transport, and public services. They

The Biggest Cyberattacks in History: Key Cases and What We Learned
Ranking Methodology: criteria (cost, reach, criticality, persistence) To rank the “biggest cyberattacks in history,” I applied four criteria that, combined, give a truer picture than a single damage figure: Ranking methodology for the biggest cyberattacks Criterion Definition Indicators Weight Cost Direct and indirect impact € lost, fines, litigation 35% Reach
Any questions? ¡Write to us!
Our Partners














