News

pentest.png

When to do Pentest?

14/09/2021
Listen to this article at the Podcast "CyberCast".    There are multiple reasons why you should have your network pent...
See More
tamanho-site-hardsecure-1-.png

10 Things to know about cloud security

01/09/2021
Listen to this article at the Podcast "CyberCast".  There is a clear trend and an increasing demand for Cloud Security...
See More
cti.png

What are the differences between CTI and CI?

17/08/2021
Listen to this article at the Podcast "CyberCast".  Today, organizations are exposed to several attacks (Zero-Day attacks,...
See More
-site-hardsecure.png

The importance of centralized communication - SOC

03/08/2021
Listen to this article at the Podcast "CyberCast".  When an organization plans its strategy and internal communication...
See More
soc-as-a-service.png

SOC as a service

20/07/2021
Listen to this article at the Podcast "CyberCast".  With the digital evolution, the number of attacks and threats to...
See More
ransomware.png

How to protect your organization against ransomware...

08/06/2021
Listen to this article at the Podcast "CyberCast".  Did you know that 27% of malware attacks in 2020 were the result of...
See More
tamanho-site-hardsecure-3-.png

CISO: an extremely important role in an organization

25/05/2021
Listen to this article at the Podcast "CyberCast".  The Chief Information Security Officer (CISO) is the executive responsible...
See More
pentest.png

7 main benefits of Pentest as a Service

18/05/2021
Listen to this article at the Podcast "CyberCast".  Pentest came to help companies test their resilience towards the even more...
See More
pentest.png

White Box, Gray Box and Black Box, what is the...

11/05/2021
Listen to this article at the Podcast "CyberCast".  Cybersecurity is an important issue for organizations, especially now...
See More
what-is-the-difference-between-a-vulnerability-scan-and-pentest.png

What is the difference between a vulnerability scan...

05/05/2021
Listen to this article at the Podcast "CyberCast".  We are constantly confronted with news of cyberattacks, which cause...
See More
how-to-protect-your-customer-data.png

How to protect your customer data?

27/04/2021
Listen to this article at the Podcast "CyberCast".  The Covid 19 situation accelerated the online presence of companies. In a...
See More
incident-response.jpg

Incident Response: What is the difference between...

20/04/2021
Listen to this article at the Podcast "CyberCast"  The increase in security incidents has shown that one SOC team is not...
See More
risk-management.png

What is Risk Management and why is it important?

06/04/2021
Listen to this article at the Podcast "CyberCast" (English Version) ou "CyberCast" (Spanish Version). What...
See More
backup.png

The importance of Backup and the best way to do it

31/03/2021
Listen to this article at the Podcast "CyberCast" (English Version) ou "CyberCast" (Spanish Version). We all...
See More
siem.png

What you should know before buying a SIEM?

16/03/2021
SIEM (Security Incident and Event Management) uses the core technology of a Security Operations Center (SOC) and consists of identifying, monitoring,...
See More
teste.png

The Security Scorecard Service

09/03/2021
The Security Rating service is provided through our partner Security Scorecard, and aims to rate and analyze the security level of an organization,...
See More
why-soc-is-needed.png

Why is SOC needed?

02/03/2021
SOC is a structure made of technological and human resources, processes, procedures and certifications, whose objective is to develop and guarantee a...
See More