A segurança da informação é um dos pilares essenciais para qualquer organização que lida com dados sensíveis. Se você trabalha com tecnologia, gestão de dados, compliance ou é responsável por processos de segurança digital, este conteúdo é para você. Saber o que é data leakage e como evitá-lo é fundamental...
Category: Uncategorized
NSFOCUS Recognized as a Representative Vendor in the Gartner® Market Guide for Network Detection and Response
SANTA CLARA, Calif., April 15, 2024 – NSFOCUS, a global leader in cybersecurity solutions, has been named a representative vendor in the 2024 Gartner Market Guide for Network Detection and Response. As a key strategic product, NSFOCUS's network threat detection and response solutions have rapidly evolved and delivered exceptional performance,...
Turkey Companies Targeted by RedBeard with Phishing Attacks
I. Summary Recently, NSFOCUS Security Labs observed some phishing attacks targeting Turkish companies, including the Turkish industrial group Borusan Holding, communication operator Turkcell, bank Vakıf Katılım, and online lottery service company Nesine. The attacker placed different types of phishing documents and new Trojan programs in this group of activities to...
Security Knowledge Graph | Cyberspace Mapping Strengthens Tailor-Made Security
The security knowledge graph, a knowledge graph specific to the security domain, is the key to realizing cognitive intelligence in cyber security, and it also lays an indispensable technological foundation for dealing with advanced, continuous and complex threats and risks in cyberspace. NSFOCUS will publish a series of articles about...
Security Knowledge Graph | Build an APT Group Graph to Avoid the Information Island Effect
The security knowledge graph, a knowledge graph specific to the security domain, is the key to realizing cognitive intelligence in cyber security, and it also lays an indispensable technological foundation for dealing with advanced, continuous and complex threats and risks in cyberspace. NSFOCUS will publish a series of articles about...
Cutting-Edge Technologies Empowering Security and Compliance of User Privacy Data
Compliance has seen radical changes in the requirements and driving force of data security and a broader category of data objects under data security protection. Application scenarios covered by data security will become more diversified, and data security requirements will cover all phases of the data lifecycle. In order to...




