Ok I know many of us experienced this kind of trip once in a lifetime. I have travelled acquisition a lot of times, when mondadori informatica was absorbed by the mother comany mondadori, when brightmail become part of symantec, when symantec acquired veritas software and moved all european management to veritas, and at the end when cisco systems acquired Ironport. All acquisitions means change and most of the changes are not well accepted, but I’m a long traveller on the seas of IT company and I’m quite used to changes so what has meant to me an acquisition? The last…
Like this:
Like Loading...
Big company are really suited for security? This is what comes to my mind when we see what Cisco, HP and Co. do when we talk about security. Are they really able to focus on the innovation and development that security require? I can talk about what I know so i will express my mixed feeling about Cisco and Security. For long times Cisco has not been perceived as a big player in the security space, beside the fact PIXASA is the most sold firewall in the world. But honestly we should not only consider the magnitude of the numbers but also why and how companies buy a product. Alas…
Like this:
Like Loading...
Diritto dell’informazione / Ritorna lo spettro del SOPA all’italiana: Cementero – il “SOPA all’italiana” attraverso il quale si minaccia di imbrigliare la libertà di comunicazione sul web in nome della pur legittima difesa del diritto d’autore – dal loro proposito. L’iniziativa legislativa che – dopo gli insuccessi sin … Guarda tutti gli articoli su questo argomento » Related posts: Atti di fede razionale (Update) Società da tenere d’occhio : EASYCLOUD.IT Bring Your Own Device – parte 4 (dal webminar che ho tenuto per (ISC)2) Attacchi alla sicurezza informatica – pubblicato il rapporto 2011 … Odio le elezioni Powered by YARPP.
Like this:
Like Loading...
Sicurezza informatica: l’Italia è ancora indietro: Troppo scarse le misure sul fronte della prevenzione da attacchi informatici prese dalle Pmi. I dati Clusit, Associazione Italiana per la Sicurezza Informatica ha reso noti risultati di un’indagine sulla preparazione delle imprese italiane sul fronte … Guarda tutti gli articoli su questo argomento » Related posts: CLUSIT: Rapporto della sicurezza informatica aziendale nel 2012 Forensic Software Tools Security in a Virtual World V-Valley Security: Cloud e Information Technology GDPR and the technology market Powered by YARPP.
Like this:
Like Loading...
Attacchi alla sicurezza informatica – pubblicato il rapporto 2011 … Attacchi alla sicurezza informatica – pubblicato il rapporto 2011. 10 Maggio 2012. Pubblicato da Symantec il raporto sulla sicurezza in internet nel 2011. www.rissc.it/…/attacchi-alla-sicurezza-informatica-pubblicato-i… Related posts: Atti di fede razionale (Update) Leonardo da Vinci, Obama e Berlusconi Gli Aspetti legali della sicurezza informatica – Epeople Academy … Diritto dell’informazione / Ritorna lo spettro del SOPA all’italiana Xiadani, Rika and Omarita in Marradi Powered by YARPP.
Like this:
Like Loading...
Gli Aspetti legali della sicurezza informatica – Epeople Academy …: L’informatica si è diffusa ormai in ogni aspetto della vita sociale ma, insieme al suo uso, si moltiplicano con il tempo le minacce e i pericoli che mettono a rischio … www.epeopleacademy.com/…/gli-aspetti-legali-della-sicurezza… Related posts: Attacchi alla sicurezza informatica – pubblicato il rapporto 2011 … Atti di fede razionale (Update) e l’Italia scoprì PRISM Ma davvero siamo corrotti? Richiesta di aiuto 🙂 Powered by YARPP.
Like this:
Like Loading...
Image via CrunchBase Whoops! Check Point lets checkpoint.com expire: By Tim Greene | Network World US | 03 April 12 It’s got to be a little embarrassing for a security company steeped in paying attention to details like opening and closing firewall ports and monitoring whether applications are behaving oddly to overlook … Related articles Check Point Takes Security Products To Amazon Check Point in domain expiry snafu Check Point supports cloud security for Amazon Web Services Sentrigo Achieves OPSEC Certification From Check Point Check Point supports cloud security for Amazon Web Services How To Evaluate Next-Generation Firewalls Email cock-up…
Like this:
Like Loading...
Ise Training day 2 « The Puchi Herald: A.I. Tech Update Ise Training day 2 March 20, 2012antonio ieranoEditLeave a commentGo to comments Ok my turn to talk today: We talked about one of the most interesting features of ISE, profiling. Worth to explain a little what profiling is, and what discovery and classification means. it is a very useful and powerful engine but it needs to be understood, also on what it means and why should be used. other great new, finally ise 1.1 is available on CCO, worth the upgrade absolutely. http://www.cisco.com/en/US/docs/security/ise/1.1/release_notes/ise1.1_rn.html new stuffs:…. Related articles APTs, hacktivists…
Like this:
Like Loading...
Introduction To Network Security – Part 1: Introduction By Sahir Hidayatullah – Firewall.cx Security Advisor As more and more people and businesses have begun to use computer networks and the Internet, the need for a secure computing environment has never been greater. Right now, information security professionals are in great demand and the importance of the field is growing every day. All the industry leaders have been placing their bets on security in the last few years. All IT venodors agree today that secure computing is no longer an optional component, it is something that should be integrated into every…
Like this:
Like Loading...
La sicurezza informatica 22 anni fa | KYKit: Questo video prodotto da AT&T 22 anni fa mostra i rischi connessi alla mancanza di sicurezza nei sistemi informativi. Mutatis mutandis, i temi sono …kyk.it/la-sicurezza-informatica-22-anni-fa-30901 Related posts: Security Costs and Security Budgets Digging it up on Security Costs and Security Budgets – part1 Forensic Software Tools A.I. Talking Points : Security Week Review Security and Risks Updated Powered by YARPP.
Like this:
Like Loading...
You must be logged in to post a comment.