Últimas notícias

Gartner prevê que gastos mundiais de usuários finais com Nuvem Pública irão ultrapassar US$ 675 bilhões em 2024 

Gartner prevê crescimento anual que deve superar 20%, impulsionado por aplicativos habilitados para Inteligência Artificial Generativa

6 de junho de 2024

Bombardeio MFA: Nova Técnica de Phishing Mirando Usuários de Dispositivos Apple

Os especialistas da Norton, uma marca de cibersegurança para o consumidor da Gen™ (NASDAQ: GEN), alertam sobre uma nova modalidade conhecida como “bombardeio MFA” ou “push bombing,

6 de junho de 2024

Everymind e Salesforce abrem inscrições para evento de RGM para mercado de varejo e consumo

A Salesforce e a Everymind promovem o evento exclusivo “RGM em Foco: Conectando a Estratégia com o Campo” no dia 2 de julho em São Paulo.

6 de junho de 2024

CoopsParty 2024 é oportunidade para desmitificar a inovação e aproximar jovens do cooperativismo

O CoopsParty, pela primeira vez em Goiás, 18 e 19 de novembro, já pode ser considerado o maior evento de inovação do cooperativismo brasileiro

6 de junho de 2024

International News

DocuSign CEO: WalMart and other customers keep finding new use cases for digital transformation

What had been COVID-19-induced panic buying in digital signatures is turning into a steady state of change, says Dan Springer

Leia mais

Surprisingly, A Massive And Ongoing Apple Privacy Breach Is Thanks To Apple’s Security Focus

Privacy and security are not the same thing, although they’re related. Privacy is about your data staying yours, and not being shared or transmitted without your knowledge

Leia mais

Esta es la cédula digital que se usará en Colombia

El lunes se hará la presentación oficial del documento digital, que podrá solicitarse en todas las registradurías desde el 1 de diciembre. El cambio no es obligatorio y la cédula actual no perderá vigencia

Leia mais

Chinese APT Hackers Target Southeast Asian Government Institutions

Cybersecurity researchers today unveiled a complex and targeted espionage attack on potential government sector victims in South East Asia that they believe was carried out by a sophisticated Chinese APT group at least since 2018

Leia mais

Is quantum computing a cybersecurity threat?

Cybersecurity researchers and analysts are rightly worried that a new type of computer, based on quantum physics rather than more standard electronics, could break most modern cryptography

Leia mais

Digital Identity on the Blockchain: Securing User Data With Chainlink

In the off-chain and blockchain world, “Digital Identity” (D-ID) refers to the aggregated information that is collected by various parties and platforms when a user spends time and conducts activities online

Leia mais

How TinyML Makes Artificial Intelligence Ubiquitous

TinyML is the latest from the world of deep learning and artificial intelligence, it brings the capability to run machine learning models.

Leia mais

The ultimate guide to encryption key management

Key management includes the generating, using, storing, archiving and deleting of keys. In modern business, encryption plays a vital role in protecting electronic communications and financial transactions.

Leia mais

Why Cyber Security Is Still So Complex

“Consumers, businesses, and entire systems all over the world are under threat on a daily basis.” Check out the full article about Cyber Security

Leia mais

How USDA Digitized Their Processes with E‑Signatures in Record Time

In a spirit of goodwill, officials at the United States Department of Agriculture (USDA) took the swift actions needed to adapt their operations and ensure the continuity of their farm production and conservation services

Leia mais

A Self-Service Password Reset Project Can Be A Quick Win For IT

One support issue common to both on-premises and remote end-users is password resets and other account-related activities.

Leia mais

Researchers Fingerprint Exploit Developers Who Help Several Malware Authors

Writing advanced malware for a threat actor requires different groups of people with diverse technical expertise to put them all together. But can the code leave enough clues to reveal the person behind it?

Leia mais

New Report Explains COVID-19’s Impact on Cybersecurity

Most cybersecurity professionals fully anticipated that cybercriminals would leverage the fear and confusion surrounding the Covid-19 pandemic in their cyberattacks

Leia mais

Bluetooth Flaw Could Let Hackers Attack You Wirelessly From 800 Feet Away

Your laptop, smartphone or tablet’s Bluetooth chip provides an easy way to connect wireless speakers, keyboards and other accessories. It may also be opening you up to a nasty new cyber attack

Leia mais

How to manage your TLS certificates under Google’s new rules? Hear

From September 1st 2020, major web browsers will block TLS certificates that have a validity period of longer than 398 days

Leia mais

Maximum Lifespan of SSL/TLS Certificates is 398 Days Starting Today

Starting this week, the lifespan of new TLS certificates will be limited to 398 days, a little over a year, from the previous maximum certificate lifetime of 27 months (825 days).

Leia mais

Digital public services: How to achieve fast transformation at scale, by McKinsey & Company

Digitizing services helps governments meet public expectations and become more efficient and resilient.

Leia mais