Últimas notícias

Autenticação corporativa de nível de hardware sem hardware: nova solução de segurança SIM para IAM

Sem nenhuma ação do usuário ou códigos para digitar, a autenticação baseada em SIM simplifica o login para funcionários.

25 de outubro de 2021

Prevenção à fraudes: biometria de voz da Minds Digital é a solução para ajudar instituições financeiras na prevenção de golpes

Minds Digital , agora disponível para outros players do setor, projeta um crescimento de 200% no seu faturamento até o final de 2022

24 de outubro de 2021

Claranet dá 5 dicas de como diminuir os riscos de ciberataques nas empresas

Executivo da Claranet elenca 5 dicas para empresários criarem barreiras contra ciberataques, ocorrências que estão em alta no Brasil

23 de outubro de 2021

NOC vs SOC: Qual a diferença entre eles?

Centros de operações terceirizados ou estruturados com recursos internos darão suporte à equipe de TI, permitindo que se concentrem em outros assuntos.

22 de outubro de 2021

International News

Criptografia da startup Tide propõe acabar com a pandemia de violação cibernética

A Tide Foundation, uma startup de cinco pessoas sediada em Sydney que compete no TechCrunch Disrupt Startup Battlefield esta semana.

Leia mais

Scaling digital transformation digital identity in Brazil

“There is no efficient government without digital government. There is no digital government without interoperability. And there is no interoperability without privacy.”– Luis Felipe Monteiro

Leia mais

Mobile Payment Security Trends and Opportunities

With these new solutions and the development of new payment technologies, new security challenges and opportunities have emerged as well

Leia mais

Researchers Warn of 4 Emerging Ransomware Groups That Can Cause Havoc

The development comes as ransomware attacks are getting bigger and more frequent, growing in size and severity

Leia mais

How does digital authentication work? And how can you implement it securely in your organisation?

More recently, attention has shifted to which technical components can contribute to a better overall solution to increase digital resilience

Leia mais

Implementing Encryption Feature in pdf-lib

After half a day of searching, I realize that not many libraries support modifying existing PDF files, let alone encryption features

Leia mais

Hackers Exploiting New Auth Bypass Bug Affecting Millions of Arcadyan Routers

Successful exploitation of the could enable an attacker to circumvent authentication barriers and potentially

Leia mais

Don’t pay that Ransom!

Ransomware is just another type of threat. Dealing with threats is not something new to IT

Leia mais

Up to 1,500 businesses infected in one of the worst ransomware attacks ever

Hackers affiliated with REvil, one of ransomware’s most cutthroat gangs, exploited a zero-day vulnerability in the Kaseya VSA remote management service.

Leia mais

Tim Berners-Lee sells web source code NFT for $5.4m

The original source code for the world wide web has been sold as a non-fungible token – (NFT), making $5.4m (£3.9m)

Leia mais

Google lança nova estrutura para prevenir ataques à cadeia de suprimentos de software

A estrutura SLSA promete integridade de ponta a ponta da cadeia de suprimentos de software e é projetada para ser incremental e acionável

Leia mais

Philip Zimmermann: “Today marks the 30th anniversary of the release of PGP 1.0.”

PGP Marks 30th Anniversary – 6 June 2021 – Today marks the 30th anniversary of the release of PGP 1.0

Leia mais

The FBI is breaking into corporate computers to remove malicious code – smart cyber defense or government overreach?

The FBI undertook the operation without consent because of the large number of unprotected systems throughout U.S. networks

Leia mais

Artificial Intelligence, Facial Recognition Face Curbs in New EU Proposal

EU is proposing one of the first laws globally to regulate the use of artificial intelligence

Leia mais

Poppy Gustafsson: the Darktrace tycoon in new cybersecurity era

Poppy Gustafsson runs a cutting-edge and gender-diverse cybersecurity firm on the brink of a £3bn stock market debut,

Leia mais

New NAME:WRECK Vulnerabilities Impact Nearly 100 Million IoT Devices

Security researchers have uncovered nine vulnerabilities affecting four TCP/IP stacks impacting more than 100 million consumer and enterprise devices

Leia mais

‘Blockchain computing’ plan in the works in China’s Yunnan province

Government officials from the Chinese Yunnan province released a plan to support the region’s blockchain industry’s development

Leia mais

Socure to Provide Identity Verification for Microsoft Azure Active Directory Verifiable Credentials

The result is an ecosystem for issuing standards-based digitally verifiable credentials, stored within an encrypted digital hub and accessed via an individual’s digital wallet.

Leia mais