cancel
Showing results for 
Search instead for 
Did you mean: 
North America
cancel
Showing results for 
Search instead for 
Did you mean: 

Discussion Posts

Monitoring machines

Good morning,  It would not be important in similar forensic software security solution to point some strange movement in net for manual configuration?  Would not it be nice to send this log to the administrator so that it has real science of what ...

Forum discussions

Dear, good day. Some situations created for the forum discussions were not disclosed And is marked in red someone can tell me why? hugs

You design your system

For better be your antivirus, two problems occur frequently: Lack of update. Inefficiency to block changes in the registry keys or writing to the system folder. For malware to install itself on the system successfully it needs basically two thin...

Risks of fraud power increase in business

The risks of fraud in computer security or enterprise networks have grown considerably in Brazil and worldwide. Essas são algumas das conclusões de um estudo realizado pela Deloitte intitulado “Risk Intelligent governance in the age of cyber threats”...

vulnerability

The Microso ft Windows users warned about possible attacks "man-in-the-middle" capable of stealing passwords from some wireless networks and VPNs (Virtual Private Networks).  However, the company will not release an update to resolve the problem.  Th...

Resolved! Phrases that scare security professionals

Given the findings of some practices and routines, it is easy to know what the problems are with the security companies. It is your case? The scenes are classic. A child with chocolate smeared shirt says, categorically: "It was not me." Or the phone ...

IT security policies need to change

IT security policies need to change Mobility, cloud and advancement of social networks are becoming obsolete the traditional rules, say industry leaders IT and information security managers will not be able to directly control or adequately protect ...

Labels