BR +55 11 3069 3925 | USA +1 469 620 7643
Select Page

Blog

Explore our articles.

 

Zero Standing Privileges

Zero Standing Privileges

With the growth of cyberattacks, access credentials have become a strong attack vector. In 74% of cases of data breaches, companies confirm unauthorized access to a privileged account as its main cause. In addition, The Verizon Data Breach Investigations Report (DBIR)...

read more
The importance of Gartner’s Magic Quadrant

The importance of Gartner’s Magic Quadrant

Gartner is a company recognized for providing impartial, high-quality consulting and research on the IT market, as well as providing valuable information and insights to the entire technology community. Through its more than 15,000 employees, Gartner also contributes...

read more
LGPD: know what your company needs to do by August

LGPD: know what your company needs to do by August

As of August 1, 2021, the fines imposed by the LGPD (Brazilian General Data Protection Law) will be applied to companies that are not adapted to the new law. In order to prevent your company from being harmed, it is important to adapt it as soon as possible to the...

read more
Understanding Microsoft Exchange Server vulnerabilities

Understanding Microsoft Exchange Server vulnerabilities

Anyone who works with technology has certainly heard of or uses Microsoft Exchange, Microsoft's server solution for email and calendar. Exchange is used worldwide by companies of all sizes, being preferred for its versatility and ease of use, and billions of...

read more
How to Protect Remote Access with PAM

How to Protect Remote Access with PAM

The Covid-19 pandemic has caused massive adoption of remote working models in organizations of all sizes. Besides, security leaders have also accelerated the migration of their infrastructure to cloud environments. According to a study conducted in partnership by...

read more
How PAM can help against insider threats

How PAM can help against insider threats

Insider threats take many forms. Some are malicious agents looking for financial gain. Others are simply careless or unaware employees who click on suspicious links. An insider threat can be defined as someone close to an organization, with authorized access,...

read more

Risk associated with the lack of protection in Cloud access

The cloud concept is less and less a buzzword and more of a need. Everyone, from application developers, executives, and students, is benefiting from the flexibility and reliability of cloud-based solutions. Although the cloud has evolved a lot in recent years, there...

read more
The vulnerability of the Sudo APP in Linux

The vulnerability of the Sudo APP in Linux

In the late 1960s, AT&T Bell Labs launched Unix, its operating system. The new system, which uses a command-line interface, or CLI, soon became popular in companies around the world for having open source, in addition to allowing easy modification and good...

read more

Request a trial demonstration now and discover the benefits of senhasegura for your company

Copy link
Powered by Social Snap