<img height="1" width="1" src="https://www.facebook.com/tr?id=2057445470939454&amp;ev=PageView &amp;noscript=1">

Security

O que é o SOC-CMM?

O que é o SOC-CMM? O SOC-CMM é uma ferramenta/modelo de avaliação de capacidade e maturidade voltado para Centro de Operações de Segurança (SOC). Ela pode ser aplicada para avaliar o serviço SOC desde sua contratação até a fase operacional. Conforme Rob van Os, “O modelo SOC-CMM foi inicialmente criado como um projeto de pesquisa […]

A Tecnologia Blockchain auxilia na segurança dos seus dados?

A Tecnologia Blockchain auxilia na segurança dos seus dados? O que é Blockchain? A tecnologia Blockchain é um mecanismo de armazenamento avançado que garante a confiabilidade, segurança e transparência das informações armazenadas. A estrutura desse armazenamento através de blocos interligados tornando os dados cronologicamente consistentes, permitindo alteração apenas com a autorização de toda a rede […]

Qbot (or Qakbot) - Inside the threat

Qbot (or Qakbot) - Inside the threat Qbot, also known as Qakbot, is a banking Trojan that was discovered in mid-2007 and is still active today. Having undergone various adaptations in its behavior, the malware is currently used mainly for initial access to obtain credentials and later used in [...]

What is Incident Response? See 6 phases for more security!

Information security (IS) is an increasingly important issue in today's digital world, and cyber incidents can have a devastating impact on companies and organizations of all sizes. That's why the Incident Response approach has become key to dealing with these situations. When [...]

Understand what blockchain is

The term blockchain has been appearing more and more in the Brazilian and world press. One of the reasons for this interest is that the use of the technology has expanded, reaching the financial market, the health sector and even the commercialization of works of art. However, many people still don't know the exact definition of the term [...]

Threat Hunting Malware Terminator

In the hacker community around the world, there has been mention of a notorious threat agent known as Spyboy, who is promoting a powerful tool called "Terminator". The author promises that the tool is capable of effectively disabling currently up to 23 EDR and Antivirus solutions. Including products from CrowdStrike, AVG, Sophos, Avast, Kaspersky, McAfee, BitDefender, Windows [...]

Learn how to draw up an information security plan

The information security plan consists of a set of standards, norms and guidelines that guarantee the protection of corporate data against possible threats. Basically, the plan aims to protect and guarantee three principles: confidentiality, integrity and availability. In the long [...]

What is data masking? Understand how it works!

Data masking, also known as data camouflage, is a practice that offers more protection to sensitive information in a database. The technique is adopted by IT managers in order to create more robust security mechanisms. The strategy is essential as it eliminates the risk of exposing [...]

How has Information Security become indispensable for the financial market?

Understand: How Information Security has become indispensable for the financial market Information security is directly related to the protection of a set of information, in the sense of preserving the value it has for an individual or an organization. The basic properties of information security are confidentiality, integrity, availability, authenticity and legality. This practice [...]

PERFECT SOLUTIONS FOR YOUR COMPANY

iT.eam is an IBM Premier Business Partner and offers tailor-made solutions for your company.

Find out more about our services
+55 (31) 4063-7340 contato@it-eam.com
Rua Sergipe, 1014 | 6º andar
Bairro Savassi - Belo Horizonte, MG
CEP: 30.130-171