* By Antônio Silva You use the cloud daily, from emails, online banks, social networks, etc. But already ...
Read More* By Vitória Silva What is PIX? It is a means of payment created by the Central Bank (BC). A system ...
Read More* By Gerson Lemos Controls and Methods of Information Security Definition One of the main security problems today is the…
Read More* Carlos Borella Much has been said about the evolution of the use of technology in agribusiness. In fact, the last few decades ...
Read More* Yuri Carneiro The use of cloud computing technology has significantly changed the scenario for the provision of infrastructure services.…
Read More* Vinicius Melo Ransomware is a type of malware that encrypts the victim's files. Attackers or we can also ...
Read More(*) By Claudinei Vieira “Everything threatens those who do not defend themselves” - inspired by Raul Pompéia (O Ateneu) Who we were…
Read More* Sillas Martins The search for compliance increases every day, it is notable that external and internal audits are contemplating…
Read More* Rodrigo Santiago The General Data Protection Law, Law 13.709 / 18, aims to establish clear, unique and harmonious rules for the…
Read MoreWhat is ISO 22301? ISO 22301 specifies the requirements for a management system, not just…
Read More