ptarzh-CNenfrdeitjarues

US Cyber ​​Attack on Iran Confirms Fragility of Critical Infrastructure

Published Events
Written by Monday, 24 June 2019 13: 48

Military computers were deactivated in retaliation for the overthrow of an American drone.

Education and awareness in industrial cyber security are fundamental

Published Events
Written by Wednesday, June 19 2019 17: 43

TI Safe announces calendar with upcoming classes and launches research on the 2020 CLASS.

Government signs with the possibility of reducing taxes in the ICT area

Published Events
Written by Wednesday, June 19 2019 17: 29

The goal is to increase the competitiveness and productivity of companies that use these equipment in their activities.

TI Safe launches cyber security intelligence and monitoring platform for the power sector.

Published Events
Written by Wednesday, June 19 2019 17: 23

TI Safe ICS-SOC makes available to its customers the Energy SIEM tool.

The future of network security is presented at the Palo Alto Ignite 19 Conference in Austin, USA.

Published Events
Written by Wednesday, June 19 2019 17: 02

At the event, which took place between 3 and 6 in June, TI Safe introduced the Zero Trust security model applied to edge safety of electric power grids.

General Data Protection Act (LGPD) in Utilities

Published Events
Written by Wednesday, June 19 2019 16: 09

Learn where to start

Zero Trust architecture - quick note

Published Network Security
Written by Thursday, 16 May 2019 19: 50

Introduced for the first time in a Forrester researchThe term Zero Trust This is a security model that allows greater control of threats by establishing network silos and communication always protected by next-generation firewall (NGFW), which acts as a core from the Web.

The advantages of the model include:

  • Greater control over network routing threats;
  • Fast adherence to the ISA / IEC 62443 zone and conduit model;
  • Restriction of traffic to only the necessary, being able to increase the efficiency of the network;
  • Security and network management (for zero trust segments) is integrated into only one solution.

Malware: growing global threat

Published Events
Written by Thursday, 16 May 2019 15: 37

Two years after WannaCry, attacks and malware sophistication wreak havoc throughout the world.

Copyright © 2007-2018 - IT Safe Information Security - All rights reserved.