How to prepare for the next cyber blackout?
The question is no longer if the blackout will come, but when – and only with robust cybersecurity will it be possible to meet the challenge The growing dependence on…
The question is no longer if the blackout will come, but when – and only with robust cybersecurity will it be possible to meet the challenge The growing dependence on…
José Mucio Monteiro took part in the largest cyber security simulation in the Southern Hemisphere, in Brasilia By First Lieutenant (RM2-T) Stilben Defending so-called critical infrastructures – nuclear and hydroelectric…
Incident communication experts contribute to scenario development, best practice training and strategic advice For the first time, a consultancy specialising in communications is collaborating in the development and execution of…
New edition of the ISG Provider Lens™ study highlights that the so-called “mother of all breaches” (MOAB) repository should make companies more preventive in their security approach, but the stance…
By Anthony Cusimano, Corporate Strategist at Object First I don’t know anything about the Olympics, but I can follow the simplest events to understand, such as the throws, jumps and…
Gustavo Daza (*) In today’s challenging business world, where competition is fierce and technological advances occur at a rapid pace, security is a fundamental pillar for the productivity and sustained…
A major cyber blackout last night (18) at cybersecurity company CrowdStrike caused chaos in various parts of the world. The problem caused several services such as banks, stock exchanges, television…
By Yago Morgan The world has woken up to one of the biggest, if not the biggest, cyber failures on record. Airlines, financial institutions and television broadcasters around the world…
The CDCAER facilities were also inaugurated on the occasion Air Force Agency, by Lieutenant Eniele Santos And Lieutenant Wanessa Liz On Thursday morning (11/07), the Air Force Command (COMAER), in…
Around the world, ransomware groups have intensified attacks on operational technology networks; experts warn about prevention measures Operational technology (OT) networks are increasingly in the sights of criminals around the…
The aim of the event is to improve the military’s knowledge of advances in technology and exchange experiences with American military personnel. Air Force Agency, by Lieutenant Gabrielle Varela The…
Hiring managed services is a measure to tackle the shortage of qualified labor and the technological gap in the government sector Data collected by the Office of Institutional Security of…
A recent study conducted by the Enterprise Strategy Group (ESG) reveals that Generative Artificial Intelligence (Generative AI) is shaping the future of cybersecurity, with professionals expressing cautious optimism about its…
Event takes place on Wednesday (8), with free registration and live online streaming In a challenging digital landscape that continues to evolve at an unprecedented pace, the Hemispheric Cyber Defense…
São José dos Campos (SP) – The first edition of the National Meeting on Quantum Technologies for Defense was held on September 27 and 28. The activity was opened by…
by Carlos Rodrigues, Vice President Latam at Varonis Compromised credentials and identities, third-party breaches, API attacks and application exploits are key entry points for hackers. The security challenges facing organizations…
(*) By Bruno Lobo, general director of Commvault for Latin America and author of the book “HumanOS: The key to cybersecurity” The digital age has brought with it a host…
Kryptus’ Pentest 360° solution, adopted by sectors such as industry and health, identifies vulnerabilities, evaluates attack scenarios and recommends prevention measures Corporate spending on information security is expected to reach…
by Carlos Rodrigues, vice president Latam at Varonis Protecting data from attackers while complying with the General Data Protection Law is a major challenge for CISOs. In the last six…
For two decades the company has contributed to the country’s development in areas such as cyber defense, digital certification and cryptography The trajectory of Kryptus, a Brazilian multinational company of…
Cookie | Duração | Descrição |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |