Feb 24 Love0 Phishing, the Data Capture Technique By Sara Carvalho Articles São Paulo/SP – January 30, 2023. The term phishing comes from the English that means “capturing” confidential data, it is…Read More
Apr 18 Love0 Top Security Threats in Cloud Computing By Sara Carvalho Articles * By Antônio Silva You use the cloud daily, from emails, online banks, social networks, etc. But already ...Read More
Apr 16 Love0 PIX Security By Sara Carvalho Articles * By Vitória Silva What is PIX? It is a means of payment created by the Central Bank (BC). A system ...Read More
Apr 08 Love0 Information Security Allied to Combat Fraud By Sara Carvalho Articles * By Vitória Silva Currently, any organizational environment, regardless of its size or type of business, fear cyber fraud,…Read More
Jul 16 Love0 The Challenges and Importance of Security Risk Management By Press Articles No Comments Risk Management consists of directing, controlling and taking Information Security risk to acceptable levels…Read More
May 22 Love1 Corporate Fraud Risk Management: learn how to improve controls and minimize occurrences By Andrea Rosti Articles * Kelli Ribeiro Corporate fraud is common in all types and sizes of organizations. In Brazil, the average loss ...Read More
Dec 08 Love0 [Cybersecurity] NIST ™ Baldrige Cybersecurity Excellence ™ Tool for self-assessment By Andrea Rosti Articles No Comments NIST has put a free download tool called "Baldrige Cybersecurity Excellence" that allows a simple and pragmatic self-assessment of the…Read More
Sep 22 Love0 [INFOGRAPHIC] Cybersecurity By Andrea Rosti Articles No Comments Do you know what a DDoS attack does? Personally, I had no idea until I read this infographic. 10…Read More
Sep 14 Love0 What is your maturity level with Cybersecurity? By Andrea Rosti Articles No Comments What is your maturity level with Cybersecurity? To find out this answer try first to reflect on your own…Read More
May 17 Love0 How to manage information security? By Andrea Rosti Articles No Comments How to manage Information Security? Ensuring security in information infrastructure and assets is a challenge every…Read More