Security researchers have created a list that brings together a total of 42 vulnerabilities present in 17 different technologies that groups…
Read MoreWhat's Changed in the Top 10 for 2021 There are three new categories, four categories with naming and scope changes…
Read More*By Juliana Dias Overview The General Data Protection Law (13.709/2018), better known as the LGPD, basically comes into…
Read MoreWritten by: Thais Cipollari - Source: https://www.segs.com.br/ Event: Concern with security in the transfer of personal data and the sensitive administration of…
Read More*By André Bitencourt IoT (Internet of Things) is a concept that refers to the digital interconnection of everyday objects with…
Read More*By Fernando Lopes COBIT 5 is essentially a globally recognized best practices framework for IT governance…
Read More*By Leonardo Silva With the advent of the COVID-19 pandemic, new health measures were adopted globally, including social distancing....
Read More*By Vinicius Melo VPN Redefining In 2020, COVID-19 accelerated the work-at-home revolution. The market…
Read MoreThe Origins and Importance of CTI (Cyber Threat Intelligence) *By Gabriel Castro Inspired during World War II, Sherman Kent…
Read More*By Fábio Moraes Surely you've seen that stat that says 90% (sometimes more) of all…
Read More