Definite e pubblicate le linee guida che i 465 Operatori di Servizi Essenziali del paese individuati saranno chiamati a rispettare. The post Cybersecurity: Italia, le linee guida per gli OSE appeared first on Punto Informatico.
I’ve long maintained that security can and should be leveraged as a competitive advantage, regardless of industry. But I’d like to expound upon this mantra: it holds particularly true for the financial services industry. With consumers increasingly relying on web and mobile apps to conduct financial transactions, customer data has emerged as the new “oil” […]
Today’s infrastructure threats will have major impacts on tomorrow’s 5G commercial networks. 5G network slicing, virtualization and disaggregation introduce new levels of complexity to network security, requiring a high-level of automation in security on-boarding, scale-out and attack mitigation. 5G security is absolutely required to be thought about in a Day 1 network build and ‘weaved’ […]
The escalating intensity of global bot traffic and the increasing severity of its overall impact mean that dedicated bot management solutions are crucial to ensuring business continuity and success. This is particularly true since more sophisticated bad bots can now mimic human behavior and easily deceive conventional cybersecurity solutions/bot management systems. Addressing highly sophisticated and […]
Often, I find that only a handful of organizations have a complete understanding of where they stand in today’s threat landscape. That’s a problem. If your organization does not have the ability to identify its assets, threats, and vulnerabilities accurately, you’re going to have a bad time. A lack of visibility prevents both IT and […]
These days, data breaches are an everyday occurrence. Companies collect volumes of data about their customers, from basic contact information to detailed financial history, demographics, buying patterns, and even lifestyle choices. Effectively this builds a very private digital footprint for each customer. When this footprint is leaked, it not only erodes the trust between consumers […]
Il problema riguarda apparecchiature Huawei impiegate da Vodafone per la connettività nel nostro paese e sarebbe stato risolto nel periodo 2011-2012. The post Huawei: backdoor nelle reti Vodafone in Italia? appeared first on Punto Informatico.
By this point, we know that state-sponsored cyber attacks are a thing. Time and again, we see headlines to this effect, whether it’s election hacking, IP theft, or mega-breaches. For your average consumer, it’s troubling. But for executives at organizations that are targeted, it’s a nightmare. The accompanying PR headaches, customer churn, and operational and […]
Humans aren’t the only ones consumed with connected devices these days. Cows have joined our ranks. Believe it or not, farmers are increasingly relying on IoT devices to keep their cattle connected. No, not so that they can moo-nitor (see what I did there?) Instagram, but to improve efficiency and productivity. For example, in the […]
A couple of months ago, I was on a call with a company that was in the process of evaluating DDoS mitigation services to protect its data centers. This company runs mission critical applications and were looking for comprehensive coverage from various types of attacks, including volumetric, low and slow, encrypted floods, and application-layer attacks. […]