Skip to content
ISH Technology
Headline news: The ransomware threat continues to evolve. Defense needs to keep up.        
  • Português
  • 🎧 Listen to the Safetalks podcast →
  • Institutional
    • About us
    • Work with us
    • Integrity System
  • Solutions
    • ISH Vision
    • GRC / IRM
      • Business continuity plan (BCP)
      • Privacy
      • Risk management
      • Information security incident management
      • LGPD and GRC tools
      • Business and IT master plan
      • IAM (Identity and Access Management)
      • Regulatory compliance
      • Awareness talks
      • GAP ANALYSIS
      • Information classification
    • Infrastructure
    • Cloud
    • Digital risks
  • Vertical
    • Education
    • Finance
    • Public sector
    • Industry
    • Health
    • Retail
  • Contents
    • Downloadable materials
    • Success stories
    • Podcast
    • Safety bulletins
  • Blog
  • Investors
  • Contact
Customer portal
June 27th, 202010 de dezembro de 2024
Jaqueline SantosBlog, Geral, Insights, Trends

The evolution of security in business: why invest in a SOC?

If you've come this far, in the last post in our series on the evolution of security in the SOC, you've already understood how information security has evolved, how tools have become more complex and how a modern SOC is...
Read More
June 23, 202010 de dezembro de 2024
Jaqueline SantosBlog, Geral, Insights, Trends

The evolution of security in business: a hunting team

A SOC has a traditional structure, but we decided to organize it a little differently from the classic concept. Why? Well, before answering that question, we need to explain what the traditional structure is like, which was born out of inspiration from exercises...
Read More
June 19th, 202010 de dezembro de 2024
Jaqueline SantosBlog, Geral, Insights, Trends, Vídeos

The evolution of business security: how to protect in a hyperconnected world

Monitoring used to mean the following: having a solution that detected events that were already known and recorded. Did it work? Yes, but it was incomplete. Because, not infrequently, what we call zero-day threats ended up going unnoticed, those that are new and...
Read More
June 16th, 202010 de dezembro de 2024
Jaqueline SantosBlog, Geral, Trends

The evolution of security in business: how was the SOC concept born?

The evolution of security in business and how the SOC concept was born

Read More
June 15th, 202010 de dezembro de 2024
Jaqueline SantosBlog, Geral, Insights, Offline

Why we're not using Whatsapp in the right way from a security point of view

Why we're not using Whatsapp in the right way from a security point of view

Read More
June 4th, 202010 de dezembro de 2024
Jaqueline SantosBlog, Geral, Offline

5 behaviors that will make any company safer

Protecting data is a much broader issue than just eliminating vulnerabilities and protecting against hacker attacks. Confidentiality is not about hiding data. It's ensuring that it is only accessed by authorized persons. This pillar of security...
Read More
May 28, 202010 de dezembro de 2024
Jaqueline SantosBlog, Geral, Reviews, Trends

Operating without interruption: why is backing up important today?

For years, data protection and disaster recovery services have been undergoing a revolution. This rapid pace of innovation has resulted in many options for the end user who wants to operate their business without interruption, in a secure manner. The...
Read More
May 28, 202010 de dezembro de 2024
Jaqueline SantosBlog, Geral, Insights, On-the-go, Trends

If the biggest cyber attack in history is approaching, here's how to survive it

The routine hasn't been the same since the coronavirus. And, as we said in this post, there will be consequences. So if, in the coming months, we could be facing one of the biggest cyber attacks of all time, what...
Read More
May 21st, 202010 de dezembro de 2024
Jaqueline SantosBlog, Insider, Insights, Trends

The biggest cyber attack in history is just around the corner and no one is talking about it

Fighting hackers is one of the last things on the minds of most people and companies right now, when keeping businesses running and healthy is the top priority. But the disruption that the coronavirus has caused to our...
Read More
May 14th, 202010 de dezembro de 2024
Jaqueline SantosBlog, Insights, On-the-go, Trends

In the crisis, the cybersecurity market responds. Hiring.

ISH Tecnologia has open positions in various sectors. With the quarantine, we have adapted the entire selection and hiring process to online. It seems strange to talk about hiring when the crisis triggered by COVID-19 has had such harsh effects...
Read More
1 … 13 14 15 16

Latest posts

  • GenAI na multinuvem: como a inteligência artificial amplia riscos cibernéticos e exige defesas automatizadas 16 de julho de 2025
  • Do login à invasão: como a Porta 22 se tornou alvo global e o que fazer para evitar ataques 25 de junho de 2025
  • Aplicativos maliciosos: entenda os riscos e saiba como proteger seus dispositivos 4 de junho de 2025
  • Cibersegurança na saúde: como a conectividade sem proteção coloca pacientes em risco 13 de maio de 2025

Categories

Blog (217) Business (3) Geral (26) Insider (49) Insights (42) Offline (7) On-the-go (23) Professionals (2) Reviews (12) Segurança (21) Sem categoria (2) Software (2) Technology (5) Trends (42) Vídeos (3)

Contact us +55 (27) 3334-8900

Our business is information security, IT infrastructure and cloud computing. We stand out in the information security sector and on the corporate scene as an employer brand.

Solutions

  • Cybersecurity
  • GRC
  • Infrastructure
  • Cloud
  • Digital Risks

vertical

  • Education
  • Finance
  • Public Sector
  • Industry
  • Health
  • Retail

important links

  • About ISH
  • Privacy Policy
  • Blog

Copyright © 2024 ISH Tecnologia, All Rights Reserved.