Explore our comprehensive Data Center Security Checklist, covering topics from personnel management to disaster recovery. Secure your data center with a strategic, layered approach.
Continue lendoPostagens marcadas com → security
How HTTPS works: web security protocol explained
The HTTPS protocol ensures privacy and security on the web, using encryption, certificate authentication, and key exchange to guarantee protected communication between clients and servers. Discover how it works through this explanatory visual diagram.
Continue lendoCASMM Model: Maturity in Consumer Authentication
The Consumer Authentication Strength Maturity Model (CASMM) é um modelo visual para ajudar as pessoas a visualizarem seus níveis atuais de maturidade quanto às suas senhas de usuários – além de mostrar como melhorá-las.
Continue lendoTypes of security controls: comprehensive guide and classifications
Security controls play an important role in defining the actions that cybersecurity professionals take to protect a company. We can say that there are three main types of IT security controls, including physical, technical and administrative. See, in this graphic overview, the different types of security controls.
Continue lendoRisks and controls in 2FA and MFA authentication systems
Multi-factor authentication (MFA) and two-factor authentication (2FA) are crucial for the protection and security of accounts, assets, data/information, and users themselves, especially in the face of credential stuffing and other cyber attacks that seek to break through single-factor security barriers. Learn more about authentication systems, similarities, differences, their risks and controls.
Continue lendoBoletim de cibersegurança do CNCS Portugal: principais insights
O primeiro boletim de 2021 do Observatório de Cibersegurança já está disponível no site do Centro Nacional de Cibersegurança de Portugal (CNCS) e é dedicado à nova Estratégia da União Europeia para a Cibersegurança.
Continue lendo