Mar 15, 2020 |
Information Security | 1134
Hey guys, I always write articles, share posts from some sites that I follow and find relevant. Among these various experiences that I have been exchanging with professional friends, the question that always comes to mind is:
"Where do I start studying to migrate to safety?"
I decided to write how I...
read more
Oct 12, 2019 |
Information Security | 3106
Security professionals, tasked with protecting the information assets of an organization, typically think of their responsibilities in three realms: confidentiality, integrity, and availability (CIA). The adversaries/attackers, seeking to disrupt an organization’s security, have three corresponding goal...
read more
Jul 9, 2019 |
Information Security | 1382
Have you ever stopped to think about what it would be like to get home and discover had your property invaded? or you leave your car in a parking lot and upon returning to search you find out that it was broken into? This type of concern also occurs in information technology environments. Nowadays independent...
read more
Feb 15, 2019 |
CompTIA, Zoziel Freire | 1144
Let's begin to speak about software engineering that is an area of knowledge of computation turned to specification, development, and maintenance of software system, applying technology and practice of project management and other disciplines, creating an organization, productivity, and quality. Currently, ...
read more
Feb 11, 2019 |
Security Product, Zoziel Freire | 1262
Every day new security flaws are discovered, often in newly released products. The pertinent question is: how are professionals and managers dealing with this reality? Are they preparing properly? Is the team properly trained?
The need to create a compliant and secure environment has grown. Therefore, it i...
read more
Dec 21, 2018 |
EC Council, Information Security | 1673
‘Social Engineering’ in the context of information security, refers to the manipulation of people to execute an action or to release confidential information. It can be called a ‘method attack’, where one makes use of persuasion, sometimes abusing the user’s trust, to get information that can be u...
read more
Nov 24, 2018 |
Ransomware, Zoziel Freire | 1264
What is ‘Ransomware’ and how does it work?
With advances in technology, it has become a big battle to keep our environment safe. There are new kinds of threats being created everyday which aim to target servers and network systems. The managers need to be prepared against these threats, using support too...
read more