
*By Renan Moreira It is not recent that we know the importance of having a robust (protected) system, in addition to maintaining…
*By Renan Moreira It is not recent that we know the importance of having a robust (protected) system, in addition to maintaining…
*By Mateus Gonçalves The Watering hole is an attack technique in which the attacker observes websites that are frequently…
*By Raíssa Ataide Having a motivated and productive team is every manager's dream, isn't it?...
With the increase in cyber incidents, companies focus on adapting and protecting their ecosystem. São Paulo/SP 11/4/2021 - Resolutions,...
*By Kelly Ribeiro Information security and privacy are increasingly relevant topics these days and failure...
*By Renan Moreira It is well known that in recent years, cyber attacks are becoming more common and efficient, and…
The second edition of the event, which brings together leading experts in a differentiated, dynamic and complete online event experience, took place…
*By André Barbosa What I should understand and know about digital work We are experiencing the fourth industrial revolution and how…
*By Marcos Paulo de Freitas What is Identity and Access Management? Identity and Access Management (in English…
*By Juliana Dias Overview The General Data Protection Law (13.709/2018), better known as the LGPD, basically comes into…