Últimos posts em Learning and discovery
Cabos de rede conectados em appliance

NGFW and UTM Firewall: Find out the main differences

[rev_slider alias="ebook-10dicas-firewall-360-280"][/rev_slider] Since the late 1980s, when the first firewall concepts emerged, to this day, many...

Ler a notícia
Homem segurando uma xícara de café enquanto confere seus e-mails. Ele corre risco de cair em spear phishing

What is Spear Phishing and how to be protected?

[rev_slider alias="360x280-anti-spam-8-beneficios"][/rev_slider] The use of e-mail is a frequent reality in business routines, of all segments...

Ler a notícia
Dispositivos eletrônicos sobre mesa

Understanding the KRACK vulnerability in WPA2 protocol

[rev_slider alias="ebook-ransonware-360-280"][/rev_slider] On October 16tha serious vulnerability was revealed in the WPA2 communication protocol, and in...

Ler a notícia
Frente de um servidor

QoS: Techniques and Features

For the vast majority of companies, Internet access is essential, since the lack of this feature...

Ler a notícia