*By Gabriel Castro It is very common in the cybersecurity scenario for teams to have detections that focus on tools and…
Read MoreBYOD (bring your own device) – Is it worth it? *By Eliana Francisco Today's corporate infrastructure thinking goes…
Read MoreCybersecurity and Digital Transformation *By Carlos Borella We know that Digital Transformation is not just about creating…
Read MoreIs the Pandemic scenario already part of the company's Business Continuity Management System (SGCN)?
Is the Pandemic scenario already part of the company's Business Continuity Management System (SGCN)? *By Rodrigo...
Read More*Renato Dante What is Code Review? Code review is a code review practice that is widely used…
Read More*Umberto Rosti The CISO or director of information security is a relatively new position on the board and has been…
Read More* By Carolina Silva “Internet of Things - IOT” The term Internet of Things (IOT - Internet Of Things) is a…
Read More* By Antônio Silva Social engineering is a non-technical strategy used by cyber invaders, which depends a lot on…
Read More* By Antônio Silva You use the cloud daily, from emails, online banks, social networks, etc. But already ...
Read More* By Vitória Silva What is PIX? It is a means of payment created by the Central Bank (BC). A system ...
Read More