Skip to content
Linkedin-in Envelope Map-marker-alt
×
  • Italiano
  • Inglese
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di Cyber Security
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di Cyber Security
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di Cyber Security
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di Cyber Security
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti

Categoria: Data Protection

  1. Home
  2. Data Protection

Organizations Warned of Salesforce ‘Ghost Sites’ Exposing Sensitive Information

organizations-warned-of-salesforce-‘ghost-sites’-exposing-sensitive-information

Salesforce ghost sites — domains that are no longer maintained but still accessible — can expose personal information and business data.

The post Organizations Warned of Salesforce ‘Ghost Sites’ Exposing Sensitive Information appeared first on SecurityWeek.

Triple Threat: Insecure Economy, Cybercrime Recruitment and Insider Threats

triple-threat:-insecure-economy,-cybercrime-recruitment-and-insider-threats

A wave of layoffs, coupled with increased recruitment efforts by cybercriminals, could create the perfect conditions for insider threats to flourish

The post Triple Threat: Insecure Economy, Cybercrime Recruitment and Insider Threats appeared first on SecurityWeek.

Quantum Decryption Brought Closer by Topological Qubits

quantum-decryption-brought-closer-by-topological-qubits

Quantinuum claims the most powerful quantum computer currently available –through cloud-based access from Quantinuum, and available through Azure Quantum in June 2023.

The post Quantum Decryption Brought Closer by Topological Qubits appeared first on SecurityWeek.

Secure Messaging Arrives on Twitter – Sort of. ‘Don’t Trust It Yet,’ Musk Warns

secure-messaging-arrives-on-twitter-–-sort-of.-‘don’t-trust-it-yet,’-musk-warns

Twitter launched encrypted messaging, offering select users the ability to communicate more securely. But its new service is much more of a baby step than a giant leap forward.

The post Secure Messaging Arrives on Twitter – Sort of. ‘Don’t Trust It Yet,’ Musk Warns appeared first on SecurityWeek.

Senators Push Overhaul of Classification Rules After Trump, Biden Cases

senators-push-overhaul-of-classification-rules-after-trump,-biden-cases

Senators introduce bill to reform security classification system in the US to prevent mishandling of classified information and promote better use of intelligence.

The post Senators Push Overhaul of Classification Rules After Trump, Biden Cases appeared first on SecurityWeek.

IBM Delivers Roadmap for Transition to Quantum-safe Cryptography

ibm-delivers-roadmap-for-transition-to-quantum-safe-cryptography

IBM’s Quantum Safe Roadmap was designed to help federal agencies and business meet the requirements and the deadlines for quantum safe cryptography.

The post IBM Delivers Roadmap for Transition to Quantum-safe Cryptography appeared first on SecurityWeek.

Data Protection Startup Optery Raises $2.7 Million in Seed Funding

data-protection-startup-optery-raises-$2.7-million-in-seed-funding

Data protection startup Optery has raised $2.7 million in a seed funding round led by Bayhouse Capital.

The post Data Protection Startup Optery Raises $2.7 Million in Seed Funding appeared first on SecurityWeek.

Satori Releases Open Source Data Permissions Scanner for Enterprises

satori-releases-open-source-data-permissions-scanner-for-enterprises

Data security firm Satori has released a free and open source tool designed to help organizations find out who has access to what data and how.

The post Satori Releases Open Source Data Permissions Scanner for Enterprises appeared first on SecurityWeek.

Open Banking: A Perfect Storm for Security and Privacy?

open-banking:-a-perfect-storm-for-security-and-privacy?

Open banking can be described as a perfect storm for cybersecurity. At one end, small startups with financial acumen but little or no security expertise or resources, are rushing new products to market.

The post Open Banking: A Perfect Storm for Security and Privacy? appeared first on SecurityWeek.

Big Tech Crackdown Looms as EU, UK Ready New Rules

big-tech-crackdown-looms-as-eu,-uk-ready-new-rules

TikTok, Twitter, Facebook, Google, and Amazon are facing rising pressure from European authorities as London and Brussels advanced new rules Tuesday to curb the power of digital companies.

The post Big Tech Crackdown Looms as EU, UK Ready New Rules appeared first on SecurityWeek.

  • 1
  • 2
  • 3
  • ...
  • 41
  • Next
SecurityIT | Consulenza Sulla Sicurezza Informatica
Linkedin-in Envelope Map-marker-alt
Il gruppo
  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission
×
  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission
Servizi
  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di Threat Intelligence e Cyber Intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
×
  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di Threat Intelligence e Cyber Intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
© show.it | Tutti i diritti riservati | P.Iva 06984320017 | Privacy Policy | Cookie Policy | Realizzato da incio.it