*By Juliana Dias Overview The General Data Protection Law (13.709/2018), better known as the LGPD, basically comes into…
Read MoreWritten by: Thais Cipollari - Source: https://www.segs.com.br/ Event: Concern with security in the transfer of personal data and the sensitive administration of…
Read More*By André Bitencourt IoT (Internet of Things) is a concept that refers to the digital interconnection of everyday objects with…
Read More*By Fernando Lopes COBIT 5 is essentially a globally recognized best practices framework for IT governance…
Read More*By Leonardo Silva With the advent of the COVID-19 pandemic, new health measures were adopted globally, including social distancing....
Read More*By Vinicius Melo VPN Redefining In 2020, COVID-19 accelerated the work-at-home revolution. The market…
Read MoreThe Origins and Importance of CTI (Cyber Threat Intelligence) *By Gabriel Castro Inspired during World War II, Sherman Kent…
Read More*By Fábio Moraes Surely you've seen that stat that says 90% (sometimes more) of all…
Read More*By Gabriel Castro It is very common in the cybersecurity scenario for teams to have detections that focus on tools and…
Read MoreBYOD (bring your own device) – Is it worth it? *By Eliana Francisco Today's corporate infrastructure thinking goes…
Read More