Skip to content
Linkedin-in Envelope Map-marker-alt
×
  • Italiano
  • Inglese
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti

Categoria: CISA

  1. Home
  2. CISA

CISA Releases Guidance on Adopting DDoS Mitigations

cisa-releases-guidance-on-adopting-ddos-mitigations

CISA has released new guidance to help federal agencies decide upon and prioritize DDoS mitigations based on mission and reputational impact.

The post CISA Releases Guidance on Adopting DDoS Mitigations appeared first on SecurityWeek.

CISA Hires ‘Mudge’ to Work on Security-by-Design Principles

cisa-hires-‘mudge’-to-work-on-security-by-design-principles

Peiter ‘Mudge’ Zatko joins the US government’s cybersecurity agency to preach the gospel of security-by-design and secure-by-default development principles.

The post CISA Hires ‘Mudge’ to Work on Security-by-Design Principles appeared first on SecurityWeek.

MITRE and CISA Release Open Source Tool for OT Attack Emulation

mitre-and-cisa-release-open-source-tool-for-ot-attack-emulation

MITRE and CISA introduce Caldera for OT, a new extension to help security teams emulate attacks targeting operational technology systems.

The post MITRE and CISA Release Open Source Tool for OT Attack Emulation appeared first on SecurityWeek.

Exploit Code Published for Critical-Severity VMware Security Defect

exploit-code-published-for-critical-severity-vmware-security-defect

Exploit code and root-cause analysis released by SinSinology documents the problem as a case where VMWare “forgot to regenerate” SSH keys.

The post Exploit Code Published for Critical-Severity VMware Security Defect appeared first on SecurityWeek.

CISA Releases Cyber Defense Plan to Reduce RMM Software Risks

cisa-releases-cyber-defense-plan-to-reduce-rmm-software-risks

CISA has published a cyber defense plan outlining strategies to help critical infrastructure organizations reduce the risks associated with RMM software.

The post CISA Releases Cyber Defense Plan to Reduce RMM Software Risks appeared first on SecurityWeek.

CISA Warns Organizations of Exploited Vulnerability Affecting .NET, Visual Studio 

cisa-warns-organizations-of-exploited-vulnerability-affecting.net,-visual-studio 

CISA has added CVE-2023-38180, a zero-day vulnerability affecting .NET and Visual Studio, to its Known Exploited Vulnerabilities Catalog.

The post CISA Warns Organizations of Exploited Vulnerability Affecting .NET, Visual Studio  appeared first on SecurityWeek.

CISA Unveils Cybersecurity Strategic Plan for Next 3 Years

cisa-unveils-cybersecurity-strategic-plan-for-next-3-years

CISA has unveiled its Cybersecurity Strategic Plan for the next 3 years, focusing on addressing immediate threats, hardening the terrain, and driving security.

The post CISA Unveils Cybersecurity Strategic Plan for Next 3 Years appeared first on SecurityWeek.

Head of US Cybersecurity Agency Sees Progress on Election Security, With More Work Needed for 2024

head-of-us-cybersecurity-agency-sees-progress-on-election-security,-with-more-work-needed-for-2024

CISA Director Jen Easterly says more is needed to defend the integrity and resiliency of the election process ahead of the 2024 election.

The post Head of US Cybersecurity Agency Sees Progress on Election Security, With More Work Needed for 2024 appeared first on SecurityWeek.

Microsoft Bows to Pressure to Free Up Cloud Security Logs

microsoft-bows-to-pressure-to-free-up-cloud-security-logs

Facing intense pressure after Chinese APT hack, Microsoft plans to expand logging defaults for lower-tier M365 customers.

The post Microsoft Bows to Pressure to Free Up Cloud Security Logs appeared first on SecurityWeek.

Exploit Code Published for Remote Root Flaw in VMware Logging Software

exploit-code-published-for-remote-root-flaw-in-vmware-logging-software

VMware confirmed that exploit code for CVE-2023-20864 has been published, underscoring the urgency for enterprise network admins to apply available patches.

The post Exploit Code Published for Remote Root Flaw in VMware Logging Software appeared first on SecurityWeek.

  • Previous
  • 1
  • ...
  • 9
  • 10
  • 11
  • Next
SecurityIT | Consulenza Sulla Sicurezza Informatica
Linkedin-in Envelope Map-marker-alt

Il gruppo

  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission
×
  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission

Servizi

  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
×
  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
© show.it | Tutti i diritti riservati | P.Iva 06984320017 | Privacy Policy | Cookie Policy | Realizzato da incio.it