Skip to content
Linkedin-in Envelope Map-marker-alt
×
  • Italiano
  • Inglese
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti

Categoria: Government

  1. Home
  2. Government

CISA: CVE Program to Focus on Vulnerability Data Quality

CISA says it is time for the CVE Program to focus on improving trust, responsiveness, and the caliber of vulnerability data.

The post CISA: CVE Program to Focus on Vulnerability Data Quality appeared first on SecurityWeek.

US Offers $10 Million for Three Russian Energy Firm Hackers

Marat Tyukov, Mikhail Gavrilov, and Pavel Akulov targeted US critical infrastructure and over 500 energy companies in 135 countries.

The post US Offers $10 Million for Three Russian Energy Firm Hackers appeared first on SecurityWeek.

Nevada State Offices Closed Following Disruptive Cyberattack

State websites and phone lines were taken offline, but officials say emergency services and personal data remain unaffected.

The post Nevada State Offices Closed Following Disruptive Cyberattack appeared first on SecurityWeek.

FTC Calls on Tech Firms to Resist Foreign Anti-Encryption Demands

Tech giants have received a letter from the FTC urging them not to weaken security and privacy at the request of foreign governments.

The post FTC Calls on Tech Firms to Resist Foreign Anti-Encryption Demands appeared first on SecurityWeek.

Gabbard Says UK Scraps Demand for Apple to Give Backdoor Access to Data

Britain abandoned its demand that Apple provide backdoor access to any encrypted user data stored in the cloud.

The post Gabbard Says UK Scraps Demand for Apple to Give Backdoor Access to Data appeared first on SecurityWeek.

Hijacked Satellites and Orbiting Space Weapons: In the 21st Century, Space Is the New Battlefield

From hacked satellites to nuclear threats in orbit, the battle for dominance beyond Earth is redefining modern warfare and national security.

The post Hijacked Satellites and Orbiting Space Weapons: In the 21st Century, Space Is the New Battlefield appeared first on SecurityWeek.

US Announces $100 Million for State, Local and Tribal Cybersecurity

CISA and FEMA announced two grants of more than $100 million for state, local, and tribal governments looking to improve cybersecurity.

The post US Announces $100 Million for State, Local and Tribal Cybersecurity appeared first on SecurityWeek.

Sean Cairncross Confirmed by Senate as National Cyber Director

The US Senate voted to confirm Sean Cairncross as the National Cyber Director, five months after nominalization.

The post Sean Cairncross Confirmed by Senate as National Cyber Director appeared first on SecurityWeek.

Gene Sequencing Giant Illumina Settles for $9.8M Over Product Vulnerabilities

Illumina will pay $9.8 million to settle accusations that products provided to the US government were affected by cybersecurity flaws.

The post Gene Sequencing Giant Illumina Settles for $9.8M Over Product Vulnerabilities appeared first on SecurityWeek.

Bill Aims to Create National Strategy for Quantum Cybersecurity Migration

Two US senators introduced a bipartisan bill to help prepare federal government agencies for quantum computing threats.

The post Bill Aims to Create National Strategy for Quantum Cybersecurity Migration appeared first on SecurityWeek.

  • Previous
  • 1
  • 2
  • 3
  • ...
  • 32
  • Next
SecurityIT | Consulenza Sulla Sicurezza Informatica
Linkedin-in Envelope Map-marker-alt

Il gruppo

  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission
×
  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission

Servizi

  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
×
  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
© show.it | Tutti i diritti riservati | P.Iva 06984320017 | Privacy Policy | Cookie Policy | Realizzato da incio.it