Walter FilhoThe Importance of PCI Certification for Sites with Credit Card TrafficWith the rise of online shopping, adult web content and electronic transactions, consumers need to trust that their personal and financial…5d ago15d ago1
Walter FilhoForward NGINX logs to a SIEM/SOARForwarding NGINX security logs to a SIEM (Security Information and Event Management) or SOAR (Security Orchestration, Automation, and…Sep 3Sep 3
Walter FilhoHow to improve cybersecurity in Lambda functionsIn the fast-paced world of technology, the concept of serverless computing is on the rise, and one of the most popular implementations is…Aug 20Aug 20
Walter FilhoImportance of protecting sensitive data from traffic and logging on SIEM toolsThe security of sensitive data is an absolute priority for any organization. Collecting, analyzing and monitoring logs are essential…Aug 7Aug 7
Walter FilhoThe importance of applying good cybersecurity training in companiesThe effectiveness of cybersecurity training is a widely studied topic, and several global statistics highlight its importance and positive…Aug 1Aug 1
Walter FilhoSecuring your LiteSpeed WebServer to properly host your web apps and APIsLiteSpeed Web Server (LSWS) is a powerful alternative to Apache known for its superior performance and efficiency. However, like any web…Jul 25Jul 25
Walter FilhoHow to try to stay PCI SSF compliantThe PCI Software Security Framework (SSF), previously known as the Payment Application Data Security Standard (PA-DSS), is a comprehensive…Jul 19Jul 19
Walter FilhoWhy are several companies fined for violating article 32 of the GDPR or article 7 of the LGPD?It can be noted that several organizations have received fines due to not correctly following the GDPR and LGPD regulations, part of which…Jul 12Jul 12
Walter FilhoHow to avoid direct vulnerabilities in the URL of a web application to be developedURLs (Uniform Resource Locators) are the addresses that users type into their browsers to access web pages. However, if not designed and…Jun 24Jun 24
Walter FilhoThe importance of validating text input fieldsIn the constantly evolving digital landscape, cybersecurity becomes increasingly crucial to protect systems, data and users against growing…Jun 14Jun 14