Corporate Security 01/February/2023 Cloud Security to Reduce the Impact of Shadow-IT It is estimated that 97% of cloud applications are not being managed, making the visibility of these applications difficult for security teams
Cloud & Platform Security 08/June/2022 Unwanted Permissions that may impact security when using the ReadOnlyAccess policy in AWS With this initial analysis, Tempest researchers identified at least 41 actions that can lead to improper data access
Cloud & Platform Security 12/March/2021 Good security practices using Docker Security must be considered at all levels of a project, from code development to the infrastructure where it will run.
Cloud 15/October/2019 Cloud Migration: what to consider from a cybersecurity perspective Keeping cloud data secure requires as much or more care and control than data stored on premises
Uncategorized 20/February/2018 Cyber security: how old and new problems place companies in a “state of attention” Noticing that security is inserted among such important issues for society does not come as a surprise
Corporate Security 01/February/2023 Cloud Security to Reduce the Impact of Shadow-IT It is estimated that 97% of cloud applications are not being managed, making the visibility of these applications difficult for security teams
Cloud & Platform Security 08/June/2022 Unwanted Permissions that may impact security when using the ReadOnlyAccess policy in AWS With this initial analysis, Tempest researchers identified at least 41 actions that can lead to improper data access
Cloud & Platform Security 12/March/2021 Good security practices using Docker Security must be considered at all levels of a project, from code development to the infrastructure where it will run.
Cloud 15/October/2019 Cloud Migration: what to consider from a cybersecurity perspective Keeping cloud data secure requires as much or more care and control than data stored on premises
Uncategorized 20/February/2018 Cyber security: how old and new problems place companies in a “state of attention” Noticing that security is inserted among such important issues for society does not come as a surprise