tag:blogger.com,1999:blog-75872214477273232522024-03-13T19:55:03.760-03:00SECURITY SERVER INFOUnknownnoreply@blogger.comBlogger36125tag:blogger.com,1999:blog-7587221447727323252.post-8278059241871789092013-08-02T11:48:00.001-03:002013-08-02T11:56:11.823-03:00
You have the employees, contractors, temporary right for your area?In the area of IT and IS it is almost complete compatibility between the person and the technology used by your corporation. The hiring is hard to fit you personality, certifications and experience coupled with the confidence provided by theapplicant for a position in IT or IS.Much of the interaction between Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7587221447727323252.post-34415464242248378792013-06-22T11:18:00.001-03:002013-06-22T11:18:27.576-03:00
For the first time in its history, Brazil, a country of few demonstrations, carries massive protests organized spontaneously through the social network Facebook, in a country that uses this type voraciously channel, now a broad political outlook.
The last time you lived a social situation was similar in 1992 when outrage over the economic and political situation of the country thousands of Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7587221447727323252.post-16304288330156533272013-03-19T14:33:00.001-03:002013-03-19T14:36:53.075-03:00
Y Career
This is for all Systems Engineers, DBAs and network administrators who think of earning money in the technical area.In
large companies (Bradesco, Votorantim, Sony, GM or any company that has
a large number of technology personnel) rolls they call career in Y. This
parade was created for professionals who do not want to spend the
administration can continue moving up the company inUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-7587221447727323252.post-39193472211757805322012-09-06T10:35:00.001-03:002012-09-06T10:39:10.712-03:00
A REAL STORY
Alarming results were announced after a recent survey conducted by the Ponemon Institute Research and Juniper Networks. The
result is related to what we have seen in the media recently, hackers
are almost always successful in their efforts to invade a site, and
stopping them is no easy task.The news shows that 90% of companies suffered some kind of attack in the last 12 Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-7587221447727323252.post-12033488182826445442012-02-22T12:19:00.000-02:002012-02-22T12:19:28.333-02:00Access Control.
I never imagined how big of a problem when a corporation has no control over the access control. I leave aside the physical control for another opportunity. At this time I will talk a little about Access Control.We live in a globalized world where converge within the IT Access Control to see that if there is investment in controls, fraud and other threats actually happen.Evaluating closely, Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7587221447727323252.post-69185464195723329462012-02-12T20:51:00.004-02:002012-02-16T09:21:06.346-02:00ANONYMOUS SAYShttp://www.bbc.co.uk/news/world-us-canada-16993488Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7587221447727323252.post-90426811309473235122011-11-24T20:06:00.001-02:002011-12-13T17:49:35.310-02:00people management
Do You have the employees, contractors, temporary right for your area?In the area of IT and IS it is almost complete compatibility between the person and the technology used by your corporation. The hiring is hard to fit you personality, certifications and experience coupled with the confidence provided by the applicant for a position in IT or IS.Much of the interaction between employeesUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-7587221447727323252.post-82476449238044671472011-10-26T19:41:00.001-02:002011-10-28T08:58:27.521-02:00UNIVERSITY - SECURITY AND QUALITYThe quality of the IT environment provide our customers for their education institution is sufficient to serve its students, teachers and contractors?
Institutions of Higher Education, have been driven to invest in IT. Many higher education institutions provide Internet access to students in order to research, training and application in items related to the courses offered. But thisUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-7587221447727323252.post-90590875024511964772011-10-18T14:38:00.006-02:002011-10-18T14:39:48.127-02:00SECURITY OFFICER - THIS IS THE GUY......
Do not think that managing an area of Information Security is an irrelevant fact and conditional. Unlike what many think, the poor suffer SI Manager in relation to other areas trying to do their best work in research and audit. Yes, SI has also audits. The manager lives in this area pointing out the problems and trying to solve them as best as possible. Unfortunately, and especially the IT Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7587221447727323252.post-46764228308750561042011-08-23T19:35:00.006-03:002011-08-23T19:46:22.951-03:00CRACKER X HACKER - original in http://www.tiespecialistas.com.br/2011/08/cracker-x-hacker/
In my last article I explained to you what I mean about hackers and crackers, different as they are in good and bad. Some people questioned me about the two words here and spend a little history and comments."CRACKER ... wafer is not and has no taste, an invasion occurs only when there is that we learn of what tastes.The bitter taste of all that building was destroyed. " In the Wikipedia Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7587221447727323252.post-6617588299234547772011-08-09T19:28:00.006-03:002011-08-09T19:38:49.430-03:00hacker attacks in Brazil
There are about two to three years I was with Mr Julio Semeghini and Dr Renato Opice Blum in a debate on computer crime law by Decision Report.
In this debate were also Cristine Hoepers CERT.BR the other guests, follows a link to verify a portion of the transmission; http://www.youtube.com/watch?v=wjXF50ZWKcM&feature=player_embedded
Even then, in 2009, the project was of long Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7587221447727323252.post-58879806919304523162011-08-03T20:38:00.002-03:002011-08-03T20:41:50.531-03:00A TRUE STORY
Alarming results were announced after a recent survey by the Ponemon Institute Research and Juniper Networks. The result is related to what we have seen in the media recently, hackers are almost always successful in their efforts to invade a site, and stop them is no easy task. The news shows that 90% of companies suffered some type of attack in the last 12 months. Over 77% who had actually Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7587221447727323252.post-3296425654910772212011-08-01T09:25:00.001-03:002013-02-05T11:14:45.114-02:00Segurança em T,I.Assegurar que seus dados estejam protegidos é mais que necessário nos dias de hoje. Validar informações, monitorar e adequar a niveis de segurança aceitaveis é nosso papel em ajuda-los.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7587221447727323252.post-36191046731547184952011-07-31T21:13:00.000-03:002011-07-31T21:13:01.000-03:00UMA HISTORIA REALResultados alarmantes foram anunciadas depois de uma recente pesquisa realizada pelo Ponemon Institute Research e Juniper Networks. O resultado tem relação com o que temos visto na mídia recentemente; hackers são quase sempre bem sucedidos em seus esforços para invadir um site, e pará-los não é tarefa fácil.
A noticia mostra que 90% das empresas sofreram algum tipo de ataque nos Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7587221447727323252.post-69726912565164958642011-07-01T21:08:00.001-03:002011-07-08T11:40:03.301-03:00INVEST IN INFORMATION SECURITYOne of the most problematic areas in IT Information Security when it comes to IT-related area. In fact there are complications when the SI has to monitor and restrict the area of IT activity in favor of a clean and without detours. The fact is that there is no conflict of interest in terms of databases and tied with strong passwords, the corporation can be said that information security isUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-7587221447727323252.post-26033139029763730932011-07-01T20:20:00.002-03:002011-07-01T20:20:43.253-03:00INVESTIR EM SIAgora como articulista tambem em www.tiespecialistas.com.brUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-7587221447727323252.post-9123288523870769832011-06-27T12:39:00.000-03:002011-06-27T12:39:41.805-03:00Projeto e Gestão de Redes de ComputadoresProjeto e Gestão de Redes de ComputadoresUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-7587221447727323252.post-74257638254718219772011-06-04T10:26:00.000-03:002017-08-28T15:36:36.008-03:00Mapping of Risk Management in PMBOK, RUP and CMMI-SW
<!--[if gte mso 9]> Normal 0 21 false false false PT-BR X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--><!--[if gte mso 9]>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7587221447727323252.post-4446879557569292822011-06-04T09:26:00.000-03:002011-06-04T09:26:46.959-03:00Mapeamento do Gerenciamento de Riscos no PMBOK, CMMI-SW e RUP<!--[if gte mso 9]> Normal 0 21 false false false PT-BR X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--><!--[if gte mso 9]>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7587221447727323252.post-52208766518726798052011-05-16T17:22:00.000-03:002011-05-16T17:22:05.399-03:00ISO/IEC 27003 Information Technology Security Techniques<!--[if gte mso 9]> Normal 0 21 false false false PT-BR X-NONE X-NONE MicrosoftInternetExplorer4 <![endif]--><!--[if gte mso 9]>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7587221447727323252.post-82149161050904018592011-04-30T19:43:00.000-03:002011-04-30T19:43:14.095-03:00SARBANES-OXLEY ACTH. R. 3763
One Hundred Seventh Congress
of the
United States of America
AT THE SECOND SESSION
Begun and held at the City of Washington on Wednesday,
the twenty-third day of January, two thousand and two
An Act
To protect investors by improving the accuracy and reliability of corporate disclosures
made pursuant to the securities laws, and for other purposes.
Be it enacted by the Senate and House Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7587221447727323252.post-24168113676943247802011-03-20T11:42:00.001-03:002011-03-20T11:53:14.329-03:00:: Sarbanes-Oxley e o Impacto Sobre a Governança de TI
1. Governança Corporativa e Governança em TI Governança é, segundo os dicionários, o ato de governar-se. O conceito de Governança Corporativa surgiu nos EstadosUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-7587221447727323252.post-63552175729476863992011-03-18T18:12:00.002-03:002011-03-18T18:12:45.033-03:00E-mails sobre Viagra acabaram: Microsoft anuncia fim de rede de spamsAFP – sex, 18 de mar de 2011 14:08 BRT Conteúdo relacionadoO grupo de informática Microsoft anunciou o desmantelamento de uma complexa rede …
O grupo de informática Microsoft anunciou o desmantelamento de uma complexa rede de envio de e-mails "spam" (lixo eletrônico) que ofertavam medicamentos falsos, entre eles um suposto Viagra.
A rede Rustock usava cerca de um milhão de Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7587221447727323252.post-32273883195788625352011-03-11T09:16:00.001-03:002011-03-11T10:37:42.758-03:00Lutar contra botnets é como dar soco em fumaça, diz executivo de TI Por CSO / EUA Publicada em 11 de março de 2011 às 08h00
Entre na conversa Oferta fácil desse tipo de ataque ameaça empresas; estratégias de defesa incluem aumentar o nível geral de segurança e educar usuários. Um relatório de conteúdo assustador, publicado no início do ano pela empresa de segurança Panda Security, revela como as técnicas de cibercriminosos andam sofisticadas. Entre os achados: uma botnet que pode ser alugado para agir Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7587221447727323252.post-90571063149127079032011-03-02T18:43:00.002-03:002011-03-02T18:43:27.017-03:00Tenha controle absoluto sobre o Windows 7Security
Tony Bradley, PC World / EUA02-03-2011“GodMode” dá acesso fácil e em um só lugar a quase todas as ferramentas e ajustes disponíveis no sistema operacional.Entre na conversa Quem leu esta matéria também leu:Corte os supérfluos e deixe o Windows mais rápido
Ferramentas úteis para o Windows
LG mostra celular com tela 3D e tablet Android no Brasil
NT Drive Recovery - Recupere arquivos deUnknownnoreply@blogger.com0