Just a few months ago, children were going to school, parents were worrying about limiting their children's computer and cell phone time at home, and the digital future was the stuff of science fiction. With COVID-19,...
In 1890, Samuel Warren and Louis Brandeis wrote "The Right to Privacy" for the Harvard Business Review and coined the term "the right to be left alone". Simply put, the idea is that what we do is none of our business...
The digital transformation not only places an obligation on companies to increase efficiency. Nor is it about modernizing. It's about envisioning new approaches to business and markets. And organizations that choose not to transform themselves digitally,...
The pandemic has created not just one, but many new normalities. For people, for businesses and also for cybersecurity operations. One of the transformations concerns the storage and use of data. Companies are rapidly migrating...
Versions of antivirus software are gaining increasingly comprehensive protection features for operating systems such as Windows 10 and MacOS. As a result, the thinking is growing that paying for an antivirus service is no longer...
Companies need to align security initiatives with business goals. And a Security Operations Center (SOC) provides the necessary foundation for the organization to protect data and information by detecting and responding more quickly to threats. We have created a...
If you've come this far, in the last post in our series on the evolution of security in the SOC, you've already understood how information security has evolved, how tools have become more complex and how a modern SOC is...
A SOC has a traditional structure, but we decided to organize it a little differently from the classic concept. Why? Well, before answering that question, we need to explain what the traditional structure is like, which was born out of inspiration from exercises...
Monitoring used to mean the following: having a solution that detected events that were already known and recorded. Did it work? Yes, but it was incomplete. Because, not infrequently, what we call zero-day threats ended up going unnoticed, those that are new and...
Olá,Informamos sobre uma recente movimentação estratégica.A ISH Tecnologia passou por um processo de cisão, dando origem à Vision Cybersecurity. As empresas iniciam uma nova fase, com uma estrutura especializada para diferentes contextos de atuação em cibersegurança.
Public SectorSoluções para infraestrutura crítica, soberania digital e ambientes regulados, exclusivas para o setor público.Access
Empresas PrivadasInteligência, antecipação e proteção exclusivamente para empresas privadas e ambientes digitais críticos.Access