Cyber Security - Regulation for “Mission Critical” Sectors (Critical Infrastructure) *By Carlos Borella The COVID-19 pandemic contributed to the explosion…
Read MoreCybersecurity and Digital Transformation *By Carlos Borella We know that Digital Transformation is not just about creating…
Read MoreIs the Pandemic scenario already part of the company's Business Continuity Management System (SGCN)?
Is the Pandemic scenario already part of the company's Business Continuity Management System (SGCN)? *By Rodrigo...
Read MoreThe Knowledge Area: Time Management PMBOK® *By Rodrigo Dantas Managing time, considering daily tasks and activities…
Read More7 Top Questions to Ask to Find the Best Zero Trust Network Access (ZTNA) Solution *By Patrick Durand Finding the…
Read More*Renato Dante What is Code Review? Code review is a code review practice that is widely used…
Read More*Umberto Rosti The CISO or director of information security is a relatively new position on the board and has been…
Read More* By Isabelle Fernandes Data leak At the beginning of 2021, a leak exposed about 223 million data, this…
Read More* By Carolina Silva “Internet of Things - IOT” The term Internet of Things (IOT - Internet Of Things) is a…
Read More* By Antônio Silva Social engineering is a non-technical strategy used by cyber invaders, which depends a lot on…
Read More