
In recent times there has been a considerable increase in news about companies attacked by hackers who have had their data encrypted and…
In recent times there has been a considerable increase in news about companies attacked by hackers who have had their data encrypted and…
*By Marcos Paulo de Freitas What is Identity and Access Management? Identity and Access Management (in English…
Security researchers have created a list that brings together a total of 42 vulnerabilities present in 17 different technologies that groups…
What's Changed in the Top 10 for 2021 There are three new categories, four categories with naming and scope changes…
*By Juliana Dias Overview The General Data Protection Law (13.709/2018), better known as the LGPD, basically comes into…
Written by: Thais Cipollari – Source: https://www.segs.com.br/ Event: Concern with security in the transfer of personal data and the sensitive administration of…
*By André Bitencourt IoT (Internet of Things) is a concept that refers to the digital interconnection of everyday objects with…
*By Fernando Lopes COBIT 5 is essentially a best practices framework for IT governance, recognized globally...
*By Leonardo Silva With the advent of the COVID-19 pandemic, new health measures were adopted globally, including social distancing….
*By Vinicius Melo VPN Redefining In 2020, COVID-19 accelerated the work-at-home revolution. The market…