
*By Ricardo Ambrizzi Since the General Personal Data Protection Law (LGPD) was enacted on August 14…
*By Ricardo Ambrizzi Since the General Personal Data Protection Law (LGPD) was enacted on August 14…
*By David Silva Educational institutions such as schools, colleges and universities have been a constant target of cybercriminals. With the…
*By Eduardo Camolez With the growing wave of cyberattacks and information theft, there has been an increase in demand for the deployment…
*By Julie Oliveira Every day, companies suffer several attempts at attacks where malicious people use different techniques to take advantage of…
*By Marcos Paulo de Freitas Overview: ISO/IEC 27001 is an international standard that presents requirements for organizations…
*By Renan Moreira It is not recent that we know the importance of having a robust (protected) system, in addition to maintaining…
*By Mateus Gonçalves The Watering hole is an attack technique in which the attacker observes websites that are frequently…
How would you define, in just one word, the secret for a company to work? Thought? If you think that…
*By Eduardo Camolez The risk management and compliance process must consider the company as a whole, encompassing all…
What are the main advantages of hiring a SOC? *By Nailton Paixão In recent years cyber attacks have grown in…