Products

Solutions

EN

Articles

Unxpose Blog

Unxpose

Unxpose

Unxpose

February 27, 2024

Leaked credentials are vectors for Different Types of Automated Attacks. Learn About Them and How to Protect Yourself

Leaked credentials are vectors for Different Types of Automated Attacks. Learn About Them and How to Protect Yourself

Leaked credentials are vectors for Different Types of Automated Attacks. Learn About Them and How to Protect Yourself

In January 2024, Microsoft experienced a cyberattack that exploited a weak password on a device within its network, granting access to employees' emails and documents. This attack, known as password spraying, is a straightforward technique where criminals test common passwords across multiple accounts.

Unxpose

Unxpose

Unxpose

July 3, 2023

What is SaaS Security Posture Management (SSPM)?

What is SaaS Security Posture Management (SSPM)?

What is SaaS Security Posture Management (SSPM)?

The SSPM from Unxpose checks security best practices on platforms like Google Workspace and Microsoft 365, detects credential leaks, and consolidates an overview of employees' security posture, promoting protection and compliance with easy integration.

Unxpose

Unxpose

Unxpose

April 18, 2023

Is It Possible to Calculate the ROI of Cybersecurity Investments?

Is It Possible to Calculate the ROI of Cybersecurity Investments?

Is It Possible to Calculate the ROI of Cybersecurity Investments?

With 103 billion attempted attacks in 2022, cybersecurity has become an unavoidable necessity for businesses. Investing in prevention is more cost-effective than dealing with breaches, which can cost millions and ruin reputations.

Unxpose

Unxpose

Unxpose

March 1, 2023

Understand rules for sanctions of the LGPD published by the ANPD

Understand rules for sanctions of the LGPD published by the ANPD

Understand rules for sanctions of the LGPD published by the ANPD

The resolution published on February 27 is the final step in holding offenders accountable. The document establishes the categories of infractions and the rates of sanctions.

Unxpose

Unxpose

Unxpose

November 23, 2022

Research: the Danger of Attacks on Brazilian Startups and SMEs

Research: the Danger of Attacks on Brazilian Startups and SMEs

Research: the Danger of Attacks on Brazilian Startups and SMEs

SMEs and startups in Brazil are facing a rise in cyber attacks due to vulnerabilities that hackers are exploiting. Solutions such as password managers, cybersecurity training, and digital asset mapping help reduce risks.

Unxpose

Unxpose

Unxpose

October 20, 2022

Cloud and Brazilian General Data Protection Law (LGPD): 6 Configurations to help achieve Compliance.

Cloud and Brazilian General Data Protection Law (LGPD): 6 Configurations to help achieve Compliance.

Cloud and Brazilian General Data Protection Law (LGPD): 6 Configurations to help achieve Compliance.

The article discusses how companies can comply with the LGPD in cloud environments, highlighting practices such as encryption, access management, and privacy governance. It provides practical solutions for protecting personal data and meeting legal requirements.

Unxpose

Unxpose

Unxpose

September 27, 2021

Checklist to keep Google Workspace secure

Checklist to keep Google Workspace secure

Checklist to keep Google Workspace secure

Google Workspace (formerly G Suite) brings together cloud applications for productivity and collaboration. Certain configurations of Google Workspace applications can directly impact the security and privacy of organizational data. Here are 5 initiatives that can be adopted by both account administrators and regular users to ensure the security of Google Workspace.

Josemando Sobral

Josemando Sobral

Josemando Sobral

March 21, 2022

Do know what attack surface monitoring is?

Do know what attack surface monitoring is?

Do know what attack surface monitoring is?

Understanding concept of attack surface is vital for companies of all sizes. The idea is related to continuous visibility over the company's exposed assets, what the threats are, the actual impact on the business, and how to fix the issues.

Unxpose

Unxpose

Unxpose

October 25, 2021

Health techs targeted by cybercriminals: users and patient data are at risk

Health techs targeted by cybercriminals: users and patient data are at risk

Health techs targeted by cybercriminals: users and patient data are at risk

Wellness apps and medical service platforms attract cybercriminals interested in the most sensitive and valuable type of data: patient information. But is it possible to strengthen the cybersecurity of health startups without incurring significant costs or having a specialized team on the matter?

Thiago Zaninotti

Thiago Zaninotti

Thiago Zaninotti

October 18, 2021

Open Banking in Brazil: security challenges and lessons from the external market

Open Banking in Brazil: security challenges and lessons from the external market

Open Banking in Brazil: security challenges and lessons from the external market

The new banking technology arrives in the country raising many questions. It is necessary to learn from the lessons of Europe to discuss the implementation of Open Banking in Brazil and then prepare the market for the new security challenges that will come.

Unxpose

Unxpose

Unxpose

October 30, 2021

Secure Cloud Checklist: 7 Cloud Security Tips.

Secure Cloud Checklist: 7 Cloud Security Tips.

Secure Cloud Checklist: 7 Cloud Security Tips.

Protecting data and operations in the cloud is a challenge. However, many security disasters could be avoided with simple tips that do not create bottlenecks for the technology team and instead foster innovation.

Josemando Sobral

Josemando Sobral

Josemando Sobral

January 23, 2021

Building a Realistic Security Policy for Your Business.

Building a Realistic Security Policy for Your Business.

Building a Realistic Security Policy for Your Business.

The challenge for many managers in the field is to create an effective Information Security Policy that prevents and mitigates incidents while ensuring the company complies with market standards and regulations, such as ISO 27001 and the LGPD (General Data Protection Law). Moreover, the policy needs to be current, aligned with the business reality, and not hinder processes. Is it possible?

Josemando Sobral

Josemando Sobral

Josemando Sobral

September 16, 2021

First Steps: 7 Initiatives to Ensure Customer Data Security

First Steps: 7 Initiatives to Ensure Customer Data Security

First Steps: 7 Initiatives to Ensure Customer Data Security

Implementing security processes for the first time can leave any manager feeling confused or even lost. However, we have outlined some basic steps and created a roadmap of essential elements that should not be overlooked.

Unxpose

Unxpose

Unxpose

October 16, 2021

Is to prevent a cyberattack before it happens?

Is to prevent a cyberattack before it happens?

Is to prevent a cyberattack before it happens?

Malwares are among the biggest concerns for companies worldwide. Preventing a cyberattack may seem impossible, but using the right technologies to strengthen people and processes can drastically reduce a company's risk of exposure.

Unxpose

Unxpose

Unxpose

October 26, 2021

Intelligent Prioritization: is it possible to discover and fix vulnerabilities while reducing hours of work?

Intelligent Prioritization: is it possible to discover and fix vulnerabilities while reducing hours of work?

Intelligent Prioritization: is it possible to discover and fix vulnerabilities while reducing hours of work?

With exponential increase in cyber threats, companies are faced with the challenge of effectively managing security vulnerabilities. Unxpose offers an automated prioritization solution that takes into account the impact, likelihood, and context of the assets, saving valuable time for teams and optimizing resources to protect what truly matters to the business.

Unxpose

Unxpose

Unxpose

November 14, 2024

Startups and SMEs are prime targets for ransomware attacks

Startups and SMEs are prime targets for ransomware attacks

Startups and SMEs are prime targets for ransomware attacks

With attacks on the rise globally, small businesses and startups are becoming preferred targets due to inadequate protection. Learn how this crime operates, the financial and reputational damages it can cause, and discover best practices to safeguard your company against these threats.

Laranja Flor
Laranja Flor
Laranja Flor

Tiago Assumpção

Tiago Assumpção

Tiago Assumpção

August 20, 2021

Asset Discovery: What It Is and Its Importance in Modern Cybersecurity

Asset Discovery: What It Is and Its Importance in Modern Cybersecurity

Asset Discovery: What It Is and Its Importance in Modern Cybersecurity

In today's landscape, the exposure surface of companies is continually expanding, presenting new challenges for digital security. Asset Discovery becomes a vital strategy, automating the identification of exposed assets and allowing organizations to proactively mitigate risks. Explore how this practice can revolutionize the way you safeguard your business!

Laranja Flor
Laranja Flor
Laranja Flor
Purple Flower
Purple Flower
Purple Flower

Unxpose

Unxpose

Unxpose

August 20, 2021

District report maps the cybersecurity market in Brazil and highlights Unxpose

District report maps the cybersecurity market in Brazil and highlights Unxpose

District report maps the cybersecurity market in Brazil and highlights Unxpose

In this highlighted section, CEO Josemando Sobral discusses the impacts of digital transformation and remote work on corporate security, emphasizing the challenges that Brazilian companies need to face.

Purple Flower
Purple Flower
Purple Flower
Lilac Flower
Lilac Flower
Lilac Flower

Unxpose

Unxpose

Unxpose

August 20, 2021

Unxpose CEO discusses the advantages of automating cybersecurity

Unxpose CEO discusses the advantages of automating cybersecurity

Unxpose CEO discusses the advantages of automating cybersecurity

In an interview with Estadão, Josemando Sobral, CEO of Unxpose, explains how the solution automates the identification of exposed assets and the correction of security vulnerabilities.

Lilac Flower
Lilac Flower
Lilac Flower

Josemando Sobral

Josemando Sobral

Josemando Sobral

August 20, 2021

The impact of cybersecurity on the growth of startups

The impact of cybersecurity on the growth of startups

The impact of cybersecurity on the growth of startups

Cybersecurity is fundamental for startups. Besides preventing attacks, it protects reputation, elevates valuation, and opens doors to significant business opportunities. Discover how security can be a strategic differentiator and ensure the sustainable growth of your company.