Corporate Security 09/February/2022 Data Leak Prevention Intelligence In this article, the focal point is to present a more conceptual view of the subject for those who have already taken the first plunge into the information security field
Corporate Security 12/January/2022 Evaluate, Direct and Monitor – governance goals according to the ISACA COBIT 2019 framework in the context of Managed Detection and Response (MDR) This article aims to comprehensively address the responsibilities and competences of an IT governance system in the organization
Corporate Security 01/September/2021 DLP technology making your life easier in achieving compliance with major market standards and regulations How to prevent sensitive and/or company-valued data from leaking out of the organization, regardless of the reason
Corporate Security 03/March/2020 Case Study — Symantec DLP — Endpoint Environment Analysis of the environment and problems found
Corporate Security 12/November/2019 Information Security Risk Management — Analytical Thinking A brief risk management analysis based on ISO / IEC 27005: 2011 — Information Technology — Security Techniques — Information Security Risk Management
Corporate Security 03/November/2017 Risks involving supply chain attacks We will look at some threats that abuse the supply chain and also address some of the consequences faced by organizations that have been victims of this type of attack
Corporate Security 09/February/2022 Data Leak Prevention Intelligence In this article, the focal point is to present a more conceptual view of the subject for those who have already taken the first plunge into the information security field
Corporate Security 12/January/2022 Evaluate, Direct and Monitor – governance goals according to the ISACA COBIT 2019 framework in the context of Managed Detection and Response (MDR) This article aims to comprehensively address the responsibilities and competences of an IT governance system in the organization
Corporate Security 01/September/2021 DLP technology making your life easier in achieving compliance with major market standards and regulations How to prevent sensitive and/or company-valued data from leaking out of the organization, regardless of the reason
Corporate Security 03/March/2020 Case Study — Symantec DLP — Endpoint Environment Analysis of the environment and problems found
Corporate Security 12/November/2019 Information Security Risk Management — Analytical Thinking A brief risk management analysis based on ISO / IEC 27005: 2011 — Information Technology — Security Techniques — Information Security Risk Management
Corporate Security 03/November/2017 Risks involving supply chain attacks We will look at some threats that abuse the supply chain and also address some of the consequences faced by organizations that have been victims of this type of attack