Últimas notícias

Gerenciamento de Assinaturas de Internet das Coisas (IoT) Industrial e Empresarial

A solução baseada no eUICC está transformando a maneira como os fabricantes de equipamentos originais (OEMs) projetam e implementam as soluções da IoT de nível empresarial.

21/02/2018

Smart Security: sete exemplos de como o sistema de monitoramento pode simplificar o cotidiano dos usuários

O Smart Security reúne os benefícios do alarme monitorado com câmeras, notificações, cenários e interatividade, fornecendo segurança e praticidade aos usuários.

21/02/2018

Blockchain: a tecnologia que vai revolucionar as transações na era da transformação digital

Segundo dados da consultoria IDC, os gastos mundiais em soluções de blockchain chegarão a US$ 2,1 bilhões em 2018, o dobro de investimento registrado no ano passado.

20/02/2018

International News

Blockchain for 2018 and Beyond: A (growing) list of blockchain use cases

Does your company have a New Year’s innovation resolution? 2018 brings an incredible opportunity to take part in the next technological revolution — where Blockchain Technology and SaaS will integrate more seamlessly to produce higher efficiencies for a myriad of business processes.

Leia mais

Organisations need to do more to ensure GDPR compliance

Organisations need to do more work to ensure compliance with the European Union’s General Data Protection Regulations (GDPR) which are due to come into force in May 2018.

Leia mais

GSMA destaca como a reforma fiscal interfere na promoção da conectividade e inclusão social

A redução de impostos excessivos específicos para o setor móvel promoverá maior acesso à conectividade e proporcionará um ganho fiscal de até US$ 5,3 bilhões em cinco anos na Argentina.

Leia mais

Stefanini tem meta agressiva de crescimento nos próximos cinco anos

Stefanini anuncia projeto de inteligência cognitiva para a Caixa Econômica Federal, que beneficiará 150 mil funcionários e prestadores de serviços

Leia mais

Kaspersky Security Bulletin: Previsões de ameaças para 2018

Kaspersky Security Bulletin: Threat Predictions for 2018 Por Juan Andrés Guerrero-Saade, Costin Raiu, Kurt Baumgartner novembro de 2017 Introduction

Leia mais

CISCO TrustSec: The Cybersecurity Enforcer

What stands out in many breaches is not that adversaries were able to penetrate the network through a known vulnerability.

Leia mais

WikiLeaks: CIA impersonated Kaspersky Labs as a cover for its malware operations

WikiLeaks, under its new Vault 8 series of released documents, has rolled out what it says is the source code to a previously noted CIA tool, called Hive, that is used to help hide espionage actions when the Agency implants malware.

Leia mais

HowMuch Does an SSL Certificate Really Cost

The SSL/TLS Market is growing as companies realize the importance of encryption in cybersecurity best practices.

Leia mais

sciNote to incorporate artificial intelligence into its electronic lab notebook 

Cientistas do mundo todo começarão a usar Inteligência Artificial para escreverem seus artigos científicos.

Leia mais

Key Reinstallation Attacks Breaking WPA2 by forcing nonce reuse

We discovered serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks. An attacker within range of a victim can exploit these weaknesses using key reinstallation attacks (KRACKs).

Leia mais

Quantum Computing: Real or Exaggerated Threat to the Web PKI?

All of this is secured by digital certificates and encryption, which provide privacy and authentication of information transiting the open Internet (aka Web PKI).

Leia mais

Tempest is a co-author of the – Best Practices in Fraud Prevention – guide for the digital advertising industry

Tempest é co-autor do guia “Melhores Práticas de Prevenção de Fraude” para o setor de publicidade digital

Leia mais

CYBER WAR

The cybernetic sector contemplates the use of technological means destined to the transit of information, even those dedicated to strategic sectors, and to protect them is fundamental for the maintenance of the stability and security of the society, since we live in the information age, in which The dependence on technology increases every day and the risks inherent in the lack of security grow exponentially.

Leia mais

Petya Ransomware Spreading Rapidly Worldwide, Just Like WannaCry

By Swati Khandelwal     Watch out, readers! It is ransomware, another WannaCry, another wide-spread attack. The WannaCry ransomware is not

Leia mais

What’s the Difference Between Advanced and Qualified Signatures in eIDAS?

Regulations such as eIDAS have developed their own eSignature classifications based on trust and assurance. These terms signify the level of assurance provided by different types of signatures as specified by the goals of the regulation.

Leia mais

Symantec Connects 40 Cyber Attacks to CIA Hacking Tools Exposed by Wikileaks

Artigos em outros idiomas são publicados em International News | Articles in other languages are published in the International News

Leia mais