Skip to content
Linkedin-in Envelope Map-marker-alt
×
  • Italian
  • English
SecurityIT | Cyber Security Consulting
 
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of Threat Intelligence e Cyber Intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts
×
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of Threat Intelligence e Cyber Intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts
SecurityIT | Cyber Security Consulting
 
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of Threat Intelligence e Cyber Intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts
×
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of Threat Intelligence e Cyber Intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts

Author: SecurityIT

  1. Home
  2. Author Archives: SecurityIT

Consolidate Vendors and Products for Better Security

consolidate-vendors-and-products-for-better-security

Instead of deploying new point products, CISOs should consider sourcing technologies from vendors that develop products designed to work together as part of a platform. 

The post Consolidate Vendors and Products for Better Security appeared first on SecurityWeek.

Pharmaceutical Giant Eisai Takes Systems Offline Following Ransomware Attack

pharmaceutical-giant-eisai-takes-systems-offline-following-ransomware-attack

Japanese pharmaceutical company Eisai says it has taken systems offline after falling victim to a ransomware attack.

The post Pharmaceutical Giant Eisai Takes Systems Offline Following Ransomware Attack appeared first on SecurityWeek.

Vulnerabilities in Honda eCommerce Platform Exposed Customer, Dealer Data

vulnerabilities-in-honda-ecommerce-platform-exposed-customer,-dealer-data

Vulnerabilities found by a researcher in a Honda ecommerce platform used for equipment sales exposed customer and dealer information.

The post Vulnerabilities in Honda eCommerce Platform Exposed Customer, Dealer Data appeared first on SecurityWeek.

North Korean Hackers Blamed for $35 Million Atomic Wallet Crypto Theft

north-korean-hackers-blamed-for-$35-million-atomic-wallet-crypto-theft

Researchers believe North Korea-linked Lazarus Group has stolen at least $35 million in cryptocurrency from Atomic Wallet.

The post North Korean Hackers Blamed for $35 Million Atomic Wallet Crypto Theft appeared first on SecurityWeek.

Cisco Patches Critical Vulnerability in Enterprise Collaboration Solutions

cisco-patches-critical-vulnerability-in-enterprise-collaboration-solutions

Cisco releases fixes for a critical-severity vulnerability in Expressway series and TelePresence Video Communication Server (VCS).

The post Cisco Patches Critical Vulnerability in Enterprise Collaboration Solutions appeared first on SecurityWeek.

Barracuda Urges Customers to Replace Hacked Email Security Appliances

barracuda-urges-customers-to-replace-hacked-email-security-appliances

Barracuda Networks is telling customers to immediately replace hacked ESG email security appliances regardless of the patches they installed.

The post Barracuda Urges Customers to Replace Hacked Email Security Appliances appeared first on SecurityWeek.

BBC, British Airways, Novia Scotia Among First Big-Name Victims in Global Supply-Chain Hack

bbc,-british-airways,-novia-scotia-among-first-big-name-victims-in-global-supply-chain-hack

The Cl0p cyber-extortion gang’s hack of the MOVEit file-transfer program popular with enterprises could have widespread global impact.

The post BBC, British Airways, Novia Scotia Among First Big-Name Victims in Global Supply-Chain Hack appeared first on SecurityWeek.

Sysdig Introduces CNAPP With Realtime CDR

sysdig-introduces-cnapp-with-realtime-cdr

Sysdig is launching what it claims to be the first CNAPP with end-to-end detection and response, consolidating CNAPP and CDR.

The post Sysdig Introduces CNAPP With Realtime CDR appeared first on SecurityWeek.

Stay Focused on What’s Important

stay-focused-on-what’s-important

Staying the course and sticking to strategic goals allows security professionals to steadily and continually improve the security posture of their organization.

The post Stay Focused on What’s Important appeared first on SecurityWeek.

VMware Plugs Critical Flaws in Network Monitoring Product

vmware-plugs-critical-flaws-in-network-monitoring-product

VMware ships urgent patches to cover security defects that expose businesses to remote code execution attacks.

The post VMware Plugs Critical Flaws in Network Monitoring Product appeared first on SecurityWeek.

  • 1
  • 2
  • 3
  • ...
  • 342
  • Next
SecurityIT | Cyber Security Consulting
Linkedin-in Envelope Map-marker-alt
The group
  • Company
  • ISO certified company
  • About Us
  • Team
  • Culture and values
  • Mission
×
  • Company
  • ISO certified company
  • About Us
  • Team
  • Culture and values
  • Mission
Services
  • Computer consulting services
  • Social media Security
  • Forensic analysis and investigation
  • Services of Threat Intelligence e Cyber Intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Vulnerability assessment consulting
  • Consulenza informatica in ambito privacy
  • ADVICE ISO / IEC 27001
  • Penetration test
×
  • Computer consulting services
  • Social media Security
  • Forensic analysis and investigation
  • Services of Threat Intelligence e Cyber Intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Vulnerability assessment consulting
  • Consulenza informatica in ambito privacy
  • ADVICE ISO / IEC 27001
  • Penetration test
© show.it | All Rights Reserved | VAT 06984320017 | Privacy Policy | Cookie Policy | Made by incio.it