* By Gerson Lemos Controls and Methods of Information Security Definition One of the main security problems today is the…
Read More* By Vitória Silva Currently, any organizational environment, regardless of its size or type of business, fear cyber fraud,…
Read MoreSafeway would like to share with you a very interesting content: On March 10, the event of…
Read More* Umberto Rosti TOP 07 of Identity and Access Management (IAM) Companies are more and more mature and certain…
Read MoreSeptember 11, 2018 - Swati Khandelwal - The hacking news Times to gear up your systems and software. Just a few…
Read More@umbertorosti The biggest online robbery to date has been carried out through an Advanced Persistent Threats (APT) and took place between October…
Read MoreWelcome to Safeway Safety Drops. Through this YouTube channel you will have access to weekly videos with subjects…
Read More* By @KelliRibeiro The European Personal Data Protection Regulation (GPDR - General Data Protection Regulation) has been…
Read MoreBelow is the most important list of cyber threat intelligence tools for hackers and security professionals. By…
Read More* Umberto Rosti Does your company know what each employee is accessing and what information they have access to? All…
Read More