Microsoft posted earlier this week a post reporting a bug in some versions of Internet Explorer could cause attackers to execute malicious code on users' equipment. A user can become infected by visiting a malicious web page or being tricked into clicking a link in an email. Information is
Another chapter of the soap opera Huawei vs. USA appeared - and it has worldwide proportions. According to the Wall Street Journal, the Chinese manufacturer has been suspended from the Times of Security and Incident Response Forum (“FIRST”), an independent initiative to share immediate i
IT professionals know that Information Security (IS) is responsible for protecting a data set to preserve the value that an individual or organization holds. Confidentiality, integrity, availability, authenticity and legality are basic properties of SI. But contrary to popular knowledge, th
The news often reports on incidents involving large corporations facing massive data breaches where the personal information of millions of consumers was potentially leaked. However, we don't often hear reports about the hacking of small businesses, mainly because these types of attacks aren't publi
KPIs or Key Performance Indicators are the indicators that, in an ideal scenario, we should all follow. After all, when well selected, they are able to give a clear picture of the progress or impact of activities in a particular area. If it's network monitoring, KPIs can help your organization under
Gartner has identified seven emerging security and risk management trends that will affect security, privacy and risk leaders in the long run. Gartner defines "top" trends as ongoing strategic changes in the security ecosystem that are not yet widely recognized, but are expected to have a b
That investing in information security is important (almost) everyone knows. No one-minded company stops thinking about keeping their internal data safe from intrusion and leaks. But not all of them think about another essential aspect of information security: compliance. In fact, only 3% of compani
With digital advancement, the demand for applications developed in less time increases, which consequently negatively impacts the security of applications that are only tested at the end of the development cycle, resulting in poorly structured and vulnerable code. How to obtain quality, safety and s
Digital transformation has already settled in the professional and personal routine of companies and this reality is irreversible. One of the pillars of this new era is Artificial Intelligence (AI), which has helped many companies around the world in formatting products and services useful to the po
According to surveys, small and medium-sized enterprises account for more than 90% of the country's business, totaling more than 6.4 million establishments operating in various sectors. In addition to all of the physical and financial infrastructure, many SME managers are skeptical of how s
Information Security Governance (GSI) is the system by which the information security activities of a particular organization are directed and controlled. GSI, like IT Governance, represents an unfolding of organizational governance and, although there are several possible models in general, GSI and
The world is full of connected devices - and more are coming. In 2017, there were an estimated 8.4 billion internet-enabled thermostats, cameras, streetlights and other electronics. By 2020 that number could exceed 20 billion, and by 2030 there could be 500 billion or more. Because they'll all be on
When you think about saving your money in a bank, one of the main reasons for that choice is security, right? Besides we have heard for some time that money under the mattress does not pay anything, everyone is tired of knowing that leaving all of their savings at home represents a great risk. &nbs
Bitcoin production already consumes 59.19 TWh of electricity per year - more than Switzerland (58.46 TWh), Greece (56.89 TWh) and Israel (55 TWh), for example. It shows a tool developed by the University of Cambridge and that estimates in real time the amount of electric power dedicated to cryptomad
The Independent website has touched on some of Apple's facilities where the equipment that protects the company's devices is made and maintained. There he interviewed Craig Federighi, a veteran brand executive, who commented on privacy - and was hurt by a recent statement from Sundar Pichai, Google'