Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
cyber espionage
July 23, 2021December 10th, 2024
Jaqueline SantosBlog, Insider, Insights

APT40 and cyber espionage

By Nathalia Ordonio Magalhaes Palmeira CISA has released an alert about the APT40 group, which has been active for over 10 years and has already been responsible for several espionage attacks. In this post, I've gathered information on attack methods and mitigation,...
Read More
July 15th, 2021December 10th, 2024
Jaqueline SantosBlog, Security

7 cybersecurity priorities that CISOs should focus on in 2021

In 2020, a world going digital was accelerated by COVID-19, requiring companies to enable remote workforces overnight, without planning or preparation. This change required chief information security officers (CISOs) to...
Read More
July 12, 2021December 10th, 2024
Jaqueline SantosBlog, Security

The key to protecting brands and companies lies in a new cybersecurity architecture

Warren Buffet, the American investor and philanthropist, said the following: "It takes years to build a reputation and seconds to destroy it." The expression certainly rings true in information security. Although Warren Buffet wasn't referring to information security,...
Read More
Cyber security needs renewal
June 22nd, 2021December 10th, 2024
Jaqueline SantosBlog, General, Insider, Insights

After a long period of crisis, cyber security needs renewal

In addition to traditional businesses, such as retail and services, the industrial control systems (ICS) that underpin our critical national infrastructure are facing increasing and immediate risks, which can be seen in the growing incidence of ransomware, among other...
Read More
6 incident response use cases for implementation in corporate SOCs
June 21st, 2021December 10th, 2024
Jaqueline SantosBlog, General, Insider, Insights

6 main SOAR use cases in corporate SOC

Cyber attacks rank first among global risks caused by humans, according to the World Economic Forum's "Global Risks Report 2020". Given the value of their assets and the expansion of infrastructure topology...
Read More
soc as a service
June 2, 2021December 10th, 2024
Jaqueline SantosBlog, Insider, Insights, On-the-go

SOC as a service: eyes open 24×7 in business, peace of mind for companies

The security operations center as a service (SOCaaS), or SOC as a service, is gaining momentum. The reason is that it addresses some of the main challenges faced by most companies, while at the same time seeking to meet...
Read More
group that attacked the Colonial Pipeline
May 24, 2021December 10th, 2024
Jaqueline SantosBlog, Insider, On-the-go, Trends

We explain how the group that attacked Colonial Pipeline operates; 13% of the victims were Brazilian companies

In recent days, the whole world has heard about the group that attacked Colonial Pipeline, called the DarkSide Ransomware Group. The attacks on large companies amounted to around U$90 million in Bitcoin. There have been at least 47 companies in the last 9...
Read More
Colonial Pipeline case
May 19th, 2021December 10th, 2024
Jaqueline SantosBlog, General, Insider, Trends

The Colonial Pipeline case shows that ransomware is more sophisticated; so is protecting yourself from it

When a giant like Colonial Pipeline, the largest oil pipeline operator in the United States, falls victim to ransomware with such catastrophic results, even triggering a crisis in the fuel market, the warning goes out to all other companies, from...
Read More
false sense of security
April 29, 2021December 10th, 2024
Jaqueline SantosBlog, Insider, Insights, On-the-go, Trends

The false sense of security - the greatest vulnerability

The ability of companies to adapt is as crucial to a business as their ability to generate profit. To do this, organizations depend on prepared leaders, who visualize and calculate actions considering the worst-case scenarios, from the loss of key...
Read More
Microsoft Exchange alert
April 19th, 2021December 10th, 2024
Jaqueline SantosBlog, Insider, On-the-go

Microsoft Exchange alert: users, check your environment for security breaches

By Paulo Trindade and Atila Abreu Altoe The Microsoft Exchange alert deals with vulnerabilities detected in the Exchange Server platform. Microsoft has released patches to address these vulnerabilities. But how do you know if breaches have occurred in your environment? In this alert, prepared by...
Read More
1 … 16 17 18 19 20 … 24

Latest posts

  • Cibersegurança na manufatura: riscos, vetores de ataque e como reduzir exposição em ambientes IT/OT 25 de fevereiro de 2026
  • Retrospectiva de Cibersegurança em 2025: principais ameaças, ransomware e os aprendizados do ano 26 de dezembro de 2025
  • Golpe de compartilhamento de tela no WhatsApp: como funciona e como proteger o seu negócio 9 de dezembro de 2025
  • Você confia em quem acessa seu sistema? A identidade digital como pilar da segurança moderna 3 de dezembro de 2025

Categories

Blog (231) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.