Explore our comprehensive Data Center Security Checklist, covering topics from personnel management to disaster recovery. Secure your data center with a strategic, layered approach.
Continue lendoPostagens marcadas com → controls
Metodologia GAIT-R para auditoria de TI: abordagem top-down
A metodologia GAIT-R ajuda organizações a minimizar riscos de TI, segurança e violações de dados. Desenvolvida pelo IIA, fornece orientações para avaliar o ambiente de controle de TI de uma organização e identificar possíveis vulnerabilidades.
Continue lendoIncident response: how to deal with common types of attacks
Know what it is, the threat indicators, where to investigate and possible actions for common attack types, such as brute force attacks, botnets, ransomware, data exfiltration, compromised accounts, DoS/DDoS and Advanced Persistent Threats (APTs).
Continue lendoTypes of security controls: comprehensive guide and classifications
Security controls play an important role in defining the actions that cybersecurity professionals take to protect a company. We can say that there are three main types of IT security controls, including physical, technical and administrative. See, in this graphic overview, the different types of security controls.
Continue lendo