*By Marcos Paulo de Freitas What is Identity and Access Management? Identity and Access Management (in English…
Read MoreSecurity researchers have created a list that brings together a total of 42 vulnerabilities present in 17 different technologies that groups…
Read MoreWhat's Changed in the Top 10 for 2021 There are three new categories, four categories with naming and scope changes…
Read MoreWritten by: Thais Cipollari - Source: https://www.segs.com.br/ Event: Concern with security in the transfer of personal data and the sensitive administration of…
Read MoreThe Origins and Importance of CTI (Cyber Threat Intelligence) *By Gabriel Castro Inspired during World War II, Sherman Kent…
Read More*By Gabriel Castro It is very common in the cybersecurity scenario for teams to have detections that focus on tools and…
Read MoreBYOD (bring your own device) – Is it worth it? *By Eliana Francisco Today's corporate infrastructure thinking goes…
Read MoreCyber Security - Regulation for “Mission Critical” Sectors (Critical Infrastructure) *By Carlos Borella The COVID-19 pandemic contributed to the explosion…
Read More*Renato Dante What is Code Review? Code review is a code review practice that is widely used…
Read More* By Antônio Silva Social engineering is a non-technical strategy used by cyber invaders, which depends a lot on…
Read More