By Fernanda Torres * Are you using your access correctly to prevent data leakage? Why should we look with other eyes…
Read MoreBy Raphael Denser * Phishing attacks are not new, especially when it comes to spam emails sent on the web.
Read MoreBy Vitoria Silva * Corporate Governance Corporate Governance is the system by which organizations are managed and controlled…
Read MoreBy Raissa Ataide * General Data Protection Act (LGPD) - Current Context The General Data Protection Act…
Read MoreMay 27, 2019 - Limor Kessem - IBM HawkEye Malware Operators renew attacks on corporate users Researchers…
Read MoreSOC (Security Operation Center) is the best way to increase your controls By Umberto Rosti Demand for security…
Read MoreSource: David Strom - CSO Online. Not all organizations that need a security operations center…
Read MoreSource: Copywriting - CIO. Privacy regulation worries companies Tema overcame talent shortage as the main risk…
Read MoreAgenda About Safeway and the Current Security Market About Cylance IA Approach to Security The Future…
Read MoreApril 11, 2019 IBM Security and Ponemon Institute asked global IT executives what they do…
Read More