top of page
![](https://static.wixstatic.com/media/e57e4d_c95cf7add3e2484d805320941c90cd65~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e57e4d_c95cf7add3e2484d805320941c90cd65~mv2.webp)
![NDR: Quais os benefícios de uma solução de Network Detection and Response?](https://static.wixstatic.com/media/e57e4d_c95cf7add3e2484d805320941c90cd65~mv2.jpg/v1/fill/w_340,h_255,fp_0.50_0.50,q_90,enc_auto/e57e4d_c95cf7add3e2484d805320941c90cd65~mv2.webp)
![](https://static.wixstatic.com/media/e57e4d_31a4104e7e69492383e95f7436e5d111~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e57e4d_31a4104e7e69492383e95f7436e5d111~mv2.webp)
![Monitoramento de Fluxo de Rede: Vantagens e Benefícios](https://static.wixstatic.com/media/e57e4d_31a4104e7e69492383e95f7436e5d111~mv2.jpg/v1/fill/w_339,h_255,fp_0.50_0.50,q_90,enc_auto/e57e4d_31a4104e7e69492383e95f7436e5d111~mv2.webp)
![](https://static.wixstatic.com/media/e57e4d_2f38a89429434bbda914732fee7215fb~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e57e4d_2f38a89429434bbda914732fee7215fb~mv2.webp)
![Ataques DDoS: Orientações para preparar sua defesa cibernética](https://static.wixstatic.com/media/e57e4d_2f38a89429434bbda914732fee7215fb~mv2.jpg/v1/fill/w_340,h_255,fp_0.50_0.50,q_90,enc_auto/e57e4d_2f38a89429434bbda914732fee7215fb~mv2.webp)
![](https://static.wixstatic.com/media/e57e4d_3a6a9a2f14294d5d85298b28aa394a8b~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e57e4d_3a6a9a2f14294d5d85298b28aa394a8b~mv2.webp)
![Zero Trust Network Access (ZTNA): A Evolução da VPN](https://static.wixstatic.com/media/e57e4d_3a6a9a2f14294d5d85298b28aa394a8b~mv2.jpg/v1/fill/w_339,h_255,fp_0.50_0.50,q_90,enc_auto/e57e4d_3a6a9a2f14294d5d85298b28aa394a8b~mv2.webp)
Buscar
![](https://static.wixstatic.com/media/e57e4d_b346ac15b01d43328c3324c2a2bfbe3f~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e57e4d_b346ac15b01d43328c3324c2a2bfbe3f~mv2.webp)
![Ransomware Hive: Hackers receberam US$ 100 milhões de empresas em todo o mundo](https://static.wixstatic.com/media/e57e4d_b346ac15b01d43328c3324c2a2bfbe3f~mv2.jpg/v1/fill/w_428,h_321,fp_0.50_0.50,q_90,enc_auto/e57e4d_b346ac15b01d43328c3324c2a2bfbe3f~mv2.webp)
International IT
18 de nov. de 20222 min de leitura
Ransomware Hive: Hackers receberam US$ 100 milhões de empresas em todo o mundo
O grupo de hackers por trás do ransomware Hive realizou ataques contra mais de 1.300 empresas em todo o mundo, recebendo US$ 100 milhões...
![](https://static.wixstatic.com/media/e57e4d_76fab94103824ac4bcc51ca04c42b1ff~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e57e4d_76fab94103824ac4bcc51ca04c42b1ff~mv2.webp)
![Microsoft Exchange Server: Hackers exploram falhas ProxyLogon e ProxyShell](https://static.wixstatic.com/media/e57e4d_76fab94103824ac4bcc51ca04c42b1ff~mv2.jpg/v1/fill/w_428,h_321,fp_0.50_0.50,q_90,enc_auto/e57e4d_76fab94103824ac4bcc51ca04c42b1ff~mv2.webp)
International IT
22 de nov. de 20212 min de leitura
Microsoft Exchange Server: Hackers exploram falhas ProxyLogon e ProxyShell
Criminosos cibernéticos estão explorando vulnerabilidades ProxyLogon e ProxyShell em servidores Microsoft Exchange desatualizados através...
![](https://static.wixstatic.com/media/e57e4d_7a828904cd0c4babb04880cb5e8f5163~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e57e4d_7a828904cd0c4babb04880cb5e8f5163~mv2.webp)
![Lançamento: WS_FTP Professional 12.8](https://static.wixstatic.com/media/e57e4d_7a828904cd0c4babb04880cb5e8f5163~mv2.jpg/v1/fill/w_428,h_321,fp_0.50_0.50,q_90,enc_auto/e57e4d_7a828904cd0c4babb04880cb5e8f5163~mv2.webp)
International IT
29 de jul. de 20211 min de leitura
Lançamento: WS_FTP Professional 12.8
A International IT e a Progress tem o prazer de anunciar que a nova versão do WS_FTP Professional já está disponível. O protocolo de...
Confira todos os materiais gratuitos
bottom of page