*By Renan Moreira It is not recent that we know the importance of having a robust (protected) system, in addition to maintaining…
Read More*By Mateus Gonçalves The Watering hole is an attack technique in which the attacker observes websites that are frequently…
Read More*By Raíssa Ataide Having a motivated and productive team is every manager's dream, isn't it?...
Read MoreWith the increase in cyber incidents, companies focus on adapting and protecting their ecosystem. São Paulo/SP 11/4/2021 - Resolutions,...
Read More*By Kelly Ribeiro Information security and privacy are increasingly relevant themes nowadays and the failure…
Read More*By Renan Moreira It is well known that in recent years, cyber attacks are becoming more common and efficient, and…
Read MoreThe second edition of the event, which brings together leading experts in a differentiated, dynamic and complete online event experience, took place…
Read More*By André Barbosa What I should understand and know about digital work We are experiencing the fourth industrial revolution and how…
Read More*By Marcos Paulo de Freitas What is Identity and Access Management? Identity and Access Management (in English…
Read More*By Juliana Dias Overview The General Data Protection Law (13.709/2018), better known as the LGPD, basically comes into…
Read More