Corporate Security 01/February/2023 Cloud Security to Reduce the Impact of Shadow-IT It is estimated that 97% of cloud applications are not being managed, making the visibility of these applications difficult for security teams
Corporate Security 24/November/2022 The dangers of Shadow It – and CASB’s role in protecting the environment There was a time when people considered that data would always be safe behind applications, which were considered to be heavily protected
Corporate Security 09/February/2022 Data Leak Prevention Intelligence In this article, the focal point is to present a more conceptual view of the subject for those who have already taken the first plunge into the information security field
Corporate Security 12/January/2022 Evaluate, Direct and Monitor – governance goals according to the ISACA COBIT 2019 framework in the context of Managed Detection and Response (MDR) This article aims to comprehensively address the responsibilities and competences of an IT governance system in the organization
Corporate Security 01/September/2021 DLP technology making your life easier in achieving compliance with major market standards and regulations How to prevent sensitive and/or company-valued data from leaking out of the organization, regardless of the reason
Corporate Security 25/March/2020 The strategies behind the new coronavirus-themed attacks COVID-19 series: old scams in new packaging
Corporate Security 19/March/2020 The bare minimum of cybersecurity you need to consider when building an infrastructure in a hurry COVID-19 Series: What topics to prioritize and a few free resources and information providers
Corporate Security 16/March/2020 Cybersecurity in the home office in times of coronavirus: a question of coresponsibility COVID-19 series: tips for protecting company data in your home environment
Corporate Security 03/March/2020 Case Study — Symantec DLP — Endpoint Environment Analysis of the environment and problems found
Corporate Security 12/November/2019 Information Security Risk Management — Analytical Thinking A brief risk management analysis based on ISO / IEC 27005: 2011 — Information Technology — Security Techniques — Information Security Risk Management
Corporate Security 03/November/2017 Risks involving supply chain attacks We will look at some threats that abuse the supply chain and also address some of the consequences faced by organizations that have been victims of this type of attack
Corporate Security 01/February/2023 Cloud Security to Reduce the Impact of Shadow-IT It is estimated that 97% of cloud applications are not being managed, making the visibility of these applications difficult for security teams
Corporate Security 24/November/2022 The dangers of Shadow It – and CASB’s role in protecting the environment There was a time when people considered that data would always be safe behind applications, which were considered to be heavily protected
Corporate Security 09/February/2022 Data Leak Prevention Intelligence In this article, the focal point is to present a more conceptual view of the subject for those who have already taken the first plunge into the information security field
Corporate Security 12/January/2022 Evaluate, Direct and Monitor – governance goals according to the ISACA COBIT 2019 framework in the context of Managed Detection and Response (MDR) This article aims to comprehensively address the responsibilities and competences of an IT governance system in the organization
Corporate Security 01/September/2021 DLP technology making your life easier in achieving compliance with major market standards and regulations How to prevent sensitive and/or company-valued data from leaking out of the organization, regardless of the reason
Corporate Security 25/March/2020 The strategies behind the new coronavirus-themed attacks COVID-19 series: old scams in new packaging
Corporate Security 19/March/2020 The bare minimum of cybersecurity you need to consider when building an infrastructure in a hurry COVID-19 Series: What topics to prioritize and a few free resources and information providers
Corporate Security 16/March/2020 Cybersecurity in the home office in times of coronavirus: a question of coresponsibility COVID-19 series: tips for protecting company data in your home environment
Corporate Security 03/March/2020 Case Study — Symantec DLP — Endpoint Environment Analysis of the environment and problems found
Corporate Security 12/November/2019 Information Security Risk Management — Analytical Thinking A brief risk management analysis based on ISO / IEC 27005: 2011 — Information Technology — Security Techniques — Information Security Risk Management
Corporate Security 03/November/2017 Risks involving supply chain attacks We will look at some threats that abuse the supply chain and also address some of the consequences faced by organizations that have been victims of this type of attack