São Paulo/SP 2/2/2023 – The risk management and compliance process must contemplate the company as a whole, contemplating…
Read MoreSão Paulo/SP – January 23, 2023. The Cyber Kill Chain is a cybersecurity model that aims to…
Read MoreSão Paulo/SP – January 9, 2023. Exploits are programs or codes used to exploit vulnerabilities in operating systems,…
Read MoreSão Paulo/SP – January 2, 2023. Through Information Security training, it will be possible to engage employees…
Read MoreSão Paulo/SP – January 06, 2023. Security information and event monitoring is a set of…
Read MoreSão Paulo/SP – December 30, 2022. Data management and backup are topics of vital importance for continuity…
Read MoreSão Paulo/SP – December 26, 2022. A simple registration and homologation are not enough to guarantee trust…
Read MoreSão Paulo/SP – December 26, 2022. The performance indicators in their definition are management tools and…
Read MoreSão Paulo/SP – December 23, 2022. Red Team And Blue Team. An attack team and a team…
Read MoreSão Paulo/SP – December 19, 2022. Identity and access management is a structure of…
Read More