*By Gabriel Castro It is very common in the cybersecurity scenario for teams to have detections that focus on tools and…
Read MoreBYOD (bring your own device) – Is it worth it? *By Eliana Francisco Today's corporate infrastructure thinking goes…
Read MoreCyber Security - Regulation for “Mission Critical” Sectors (Critical Infrastructure) *By Carlos Borella The COVID-19 pandemic contributed to the explosion…
Read MoreCybersecurity and Digital Transformation *By Carlos Borella We know that Digital Transformation is not just about creating…
Read MoreIs the Pandemic scenario already part of the company's Business Continuity Management System (SGCN)?
Is the Pandemic scenario already part of the company's Business Continuity Management System (SGCN)? *By Rodrigo...
Read MoreThe Knowledge Area: Time Management PMBOK® *By Rodrigo Dantas Managing time, considering daily tasks and activities…
Read MoreChanges to WhatsApp Privacy Policy *By Fernando Lopes WhatsApp is a cross-platform instant messaging application and…
Read More*Renato Dante What is Code Review? Code review is a code review practice that is widely used…
Read More*Umberto Rosti The CISO or director of information security is a relatively new position on the board and has been…
Read More* By Isabelle Fernandes Data leak At the beginning of 2021, a leak exposed about 223 million data, this…
Read More