
* Yuri Carneiro The use of cloud computing technology has significantly changed the scenario for the provision of infrastructure services….
* Yuri Carneiro The use of cloud computing technology has significantly changed the scenario for the provision of infrastructure services….
* Vinicius Melo Ransomware is a type of malware that encrypts the victim's files. Attackers or we can also ...
(*) By Claudinei Vieira “Everything threatens those who do not defend themselves” - inspired by Raul Pompéia (O Ateneu) Who we were…
* Sillas Martins The search for compliance increases every day, it is notable that external and internal audits are contemplating…
* Rodrigo Santiago The General Data Protection Law, Law 13.709 / 18, aims to establish clear, unique and harmonious rules for the…
What is ISO 22301? ISO 22301 specifies the requirements for a management system, not only & #8230;
* Rodrigo Santiago What is Machine Learning? Machine Learning is a type of artificial intelligence that from the use ...
How to prioritize a budget is not a simple question to answer. These 11 statistics pointed out by CISOs can help you & #8230;
* Raissa Ataide How important is adequacy regarding Information Classification? Asset Value The information has a & #8230;
* Umberto Rosti Identity management where to start? The process seems simple: the company buys the technology for & #8230;