* By Isabelle Fernandes Data leak At the beginning of 2021, a leak exposed about 223 million data, this…
Read More* By Carolina Silva “Internet of Things - IOT” The term Internet of Things (IOT - Internet Of Things) is a…
Read More* By Antônio Silva Social engineering is a non-technical strategy used by cyber invaders, which depends a lot on…
Read More* By Antônio Silva You use the cloud daily, from emails, online banks, social networks, etc. But already ...
Read More* By Vitória Silva What is PIX? It is a means of payment created by the Central Bank (BC). A system ...
Read More* By Raíssa Ataide Backup and its Importance Overview The definition of the word backup, summarizes in backup…
Read More* By Gerson Lemos Controls and Methods of Information Security Definition One of the main security problems today is the…
Read More* By Vitória Silva Currently, any organizational environment, regardless of its size or type of business, fear cyber fraud,…
Read More* By Márcio Borges GRC is the acronym used for Governance, Risks and Compliance, this set of concepts is used ...
Read More