Skip to content
Linkedin-in Envelope Map-marker-alt
×
  • Italian
  • English
SecurityIT | Cyber Security Consulting
 
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of cyber threat intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts
×
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of cyber threat intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts
SecurityIT | Cyber Security Consulting
 
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of cyber threat intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts
×
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of cyber threat intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts

Category: guidance

  1. Home
  2. guidance

Japan Issues OT Security Guidance for Semiconductor Factories

The 130-page document covers several important aspects and it’s available in both Japanese and English.

The post Japan Issues OT Security Guidance for Semiconductor Factories appeared first on SecurityWeek.

NIST Publishes Guide for Protecting ICS Against USB-Borne Threats

nist-publishes-guide-for-protecting-ics-against-usb-borne-threats

NIST Special Publication 1334 focuses on reducing cybersecurity risks associated with the use of removable media devices in OT environments.

The post NIST Publishes Guide for Protecting ICS Against USB-Borne Threats appeared first on SecurityWeek.

New Guidance Calls on OT Operators to Create Continually Updated System Inventory

new-guidance-calls-on-ot-operators-to-create-continually-updated-system-inventory

Agencies in several countries have created guidance titled ‘Creating and Maintaining a Definitive View of Your OT Architecture’.

The post New Guidance Calls on OT Operators to Create Continually Updated System Inventory appeared first on SecurityWeek.

US, Allies Push for SBOMs to Bolster Cybersecurity

SBOM adoption will drive software supply chain security, decreasing risks and costs, and improving transparency.

The post US, Allies Push for SBOMs to Bolster Cybersecurity appeared first on SecurityWeek.

CISA Requests Public Feedback on Updated SBOM Guidance

CISA has updated the Minimum Elements for a Software Bill of Materials (SBOM) guidance and is seeking public comment.

The post CISA Requests Public Feedback on Updated SBOM Guidance appeared first on SecurityWeek.

US Warns of Hackers Targeting ICS/SCADA at Oil and Gas Organizations

The US government warns of threat actors targeting ICS/SCADA systems at oil and natural gas organizations.

The post US Warns of Hackers Targeting ICS/SCADA at Oil and Gas Organizations appeared first on SecurityWeek.

CISA Issues Guidance After Oracle Cloud Hack

CISA is making recommendations for organizations and users in light of the recent Oracle legacy cloud environment hack.

The post CISA Issues Guidance After Oracle Cloud Hack appeared first on SecurityWeek.

Five Eyes Agencies Release Guidance on Securing Edge Devices

five-eyes-agencies-release-guidance-on-securing-edge-devices

Five Eyes cybersecurity agencies have released guidance on securing edge devices against increasing threats.

The post Five Eyes Agencies Release Guidance on Securing Edge Devices appeared first on SecurityWeek.

US, Allies Release Guidance on Securing OT Environments

New guidance provides information on how to create and maintain a secure operational technology (OT) environment.

The post US, Allies Release Guidance on Securing OT Environments appeared first on SecurityWeek.

Five Eyes Agencies Release Guidance on Detecting Active Directory Intrusions

Five Eyes cybersecurity agencies have released joint guidance on identifying Active Directory compromises.

The post Five Eyes Agencies Release Guidance on Detecting Active Directory Intrusions appeared first on SecurityWeek.

  • 1
  • 2
  • 3
  • 4
  • Next
SecurityIT | Cyber Security Consulting
Linkedin-in Envelope Map-marker-alt

The group

  • Company
  • ISO certified company
  • About Us
  • Team
  • Culture and values
  • Mission
×
  • Company
  • ISO certified company
  • About Us
  • Team
  • Culture and values
  • Mission

Services

  • Computer consulting services
  • Social media Security
  • Forensic analysis and investigation
  • Services of cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Vulnerability assessment consulting
  • Consulenza informatica in ambito privacy
  • ADVICE ISO / IEC 27001
  • Penetration test
×
  • Computer consulting services
  • Social media Security
  • Forensic analysis and investigation
  • Services of cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Vulnerability assessment consulting
  • Consulenza informatica in ambito privacy
  • ADVICE ISO / IEC 27001
  • Penetration test
© show.it | All Rights Reserved | VAT 06984320017 | Privacy Policy | Cookie Policy | Made by incio.it