Virtual Event Today: Supply Chain Security Summit - Join Event In-Progress

Security Experts:

Connect with us

Hi, what are you looking for?



Brazilian Army To Get Cyberwarfare Training and Security Support from Panda Security

Brazilian Army Operational Agents  to Be Trained for the Fight Against Cyber terrorism, Online Crime and Strategic Preparation for Cyberwarfare

Brazilian Army Operational Agents  to Be Trained for the Fight Against Cyber terrorism, Online Crime and Strategic Preparation for Cyberwarfare

Panda Security today announced it has signed an agreement with the Brazilian Army to support the training of its operational agents involved in the fight against cyber-terrorism, digital crime and strategic intervention for cyberwarfare. Panda Security will also provide protection to 37,500 computers belonging to the Army’s Military Commands around the country with Panda Security for Enterprise, the company’s endpoint protection solution.

Brazilian Army Joins Forces with Panda Security to Combat Cyber-Warfare

The agreement was announced in Sao Paulo by Panda Security CEO Juan Santana and the Brazilian Army’s Commander of Communications and Cyber-Warfare, Brigadier General Antonino dos Santos Guerra Neto.

As part of this agreement, the Army’s Cyberwarfare Communication Center and PandaLabs, the anti-malware laboratory of Panda Security, will work together to train those involved in the scientific and forensic investigation of cybercrime. Additionally, Panda Security will provide a rapid response malware support and classification of malicious codes affecting Brazil.

“We have approximately 60,000 computers throughout the country and we suffer an average of 100 intrusion attempts each day across our 12 IT centers,” said to Brig. Gen. Santos Guerra. In comparison, the United States Department of Defense systems has more than 7 million systems that are “probed” by unauthorized users 250,000 times every hour, according to General Keith Alexander.

“Our experience with the Brazilian Army will help create a safer Web, which is one of our principal mission values and an integral part of our corporate social responsibility efforts,” said Juan Santana, CEO of Panda Security.

Brazillian Army & Panda Security Collaborate on Cybersecurity

From left to right: Joao Matos, Sales Director Panda Security Latam; Juan Santana, Panda Security CEO; Brig. Gen. Antonino dos Santos Guerra, Commander of Communications and Cyber-Warfare; Eduardo D’Antona and Ricardo Bachert, Directors of Panda Security Brazil.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...