By @carlosborella The European Personal Data Protection Regulation (GPDR - General Data Protection Regulation) has been…
Read MoreBy @marcospaulofreitas Resolution No. 4,658 of April 26, 2018 of the Central Bank of Brazil provides for the…
Read More* By Rangel Rodrigues Thinking like a hacker, knowing how to exploit loopholes by creating or editing code and understanding how security holes…
Read MoreAccording to Forrester's Mobile Vision 2020 study, 54% organizations will have deployed the Unified Endpoint Management…
Read MoreBy @CarlosBorella The State of Cybersecurity 2018 is a report issued annually by ISACA and presents the research results…
Read More* By @KelliRibeiro The European Personal Data Protection Regulation (GPDR - General Data Protection Regulation) has been…
Read MoreSee important security trends and the latest cyber threat intelligence. Discover security insights and key discoveries, download the…
Read MoreBy Umberto Rosti - Press room - RSA Conference 2018 - San Francisco On the 16th and 20th of April,…
Read MoreToday, many security conversations focus on security intelligence, behavioral anomaly detection, and the value of Artificial Intelligence…
Read MoreBelow is the most important list of cyber threat intelligence tools for hackers and security professionals. By…
Read More