AI Tech Update

AI Tech Update

Guida al GDPR per chi non ne vuol sapere: raschia raschia rimane il rischio 😊

Ma se ti dico “rischio” tu che mi rispondi? Er… no non intendo la sequela di insulti o le minacce più o meno velate a cu stai quasi sicuramente pensando, stavo cercando di parlare di GDPR… No, no, GDPR non è una parolaccia, calmiamoci. Insomma volevo solo chiedere che cosa associate alla idea di rischio indicata dal GDPR. Ne parlo qui perché ultimamente ho avuto modo di vedere come molti non hanno bene chiaro cosa sia questo fantomatico rischio di cui si parla. Allora cerchiamo di fare un poco di chiarezza ad un livello che persino io possa capire di…

hit by “wannacry” (may be you deserve it) …

Guys Again a ransomware outbreak on the news. May I say I am not surprised at all? And may I say that the media coverage has been ridiculous and instead of presenting the event as something that should highlight the incompetent behaviour of managers targeted by this issue they claims about “cyberattack” which is a completely different thing. And yet people asking why? how come? how this can be possible? again really? We know that CyberSecurity is always a side though from most of the management no matter where. The proof, beside the claims from CEO, IT Managers and generally speaking CxO,…

NFV network function virtualization security considerations

I have been asked to write down a few things related to NFV and security. NFV is relatively a new thing in the IT world. It has been on the news in 2012 and since then it has followed the developing path common to the virtualization technologies. Virtualization has made dramatic improvement in the last years. It all started at first with simple virtualization platforms, of course VMware on top of our mind, but not only. The idea was to abstract HW platforms from software ones. Developing the idea, the abstraction growth covering multiple hw platforms moving also to the…

Firewall: Traditional, UTM and NGFW. Understanding the difference

Firewall: Traditional, UTM and NGFW. Understanding the difference One of the problem nowadays when we talk about firewalls is to understand what actually a firewall is and what means the acronym that are used to define the different type of firewalls. The common definition today recognizes 3 main types of firewalls: • Firewalls • UTM • NGFW But what are the differences (if any) between those things? Let’s start with the very basic: what a firewall is. Firewall: A firewall is software used to maintain the security of a private network. Firewalls block unauthorized access to or from private networks…

Caro HR Manager: Storia di un CV e della sua privacy (GDPR lo dici a tua sorella)

Caro HR Manager: Storia di un CV e della sua privacy (GDPR lo dici a tua sorella) Sono un poco preoccupato, perché la mia impressione è che in Italia, a fronte di una delle legislazioni più severe d’Europa e i nuovi vincoli introdotti od in via di introduzione dal GDPR, il concetto di privacy sia altamente sottovalutato. Il problema ovviamente è insito nella storica sottovalutazione italica dell’impatto delle strutture informatiche all’interno dei processi produttivi, decisionali e manageriali. Insomma non ci si interessa, non si capisce, e non si valuta. Di conseguenza non si correggono comportamenti errati e, allo stesso tempo,…

Pretty Good Privacy (PGP)

Pretty Good Privacy (PGP) Pretty Good Privacy or PGP is a popular program used to encrypt and decrypt email over the Internet, as well as authenticate messages with digital signatures and encrypted stored files. Previously available as freeware and now only available as a low-cost commercial version, PGP was once the most widely used privacy-ensuring program by individuals and is also used by many corporations. It was developed by Philip R. Zimmermann in 1991 and has become a de facto standard for email security. How PGP works Pretty Good Privacy uses a variation of the public key system. In this…

Dataprivacyasia: Antonio Ieranò at Asia’s premier data protection, privacy and cybersecurity conference. Watch videos

Missed @AntonioIerano at Asia‘s premier #dataprotection, #privacy and #cybersecurity conference? Watch videos — Data Privacy Asia (@dataprivacyasia) December 10, 2016 from http://twitter.com/dataprivacyasia Missed @AntonioIerano at Asia's premier #dataprotection, #privacy and #cybersecurity conference? Watch videos at https://t.co/h1920sHGPF pic.twitter.com/MiCcqkFpOy — Data Privacy Asia (@dataprivacyasia) December 10, 2016   Related articles How Businesses Are Preparing for the GDPR (cmswire.com) Related posts: Berlusconi ed il popolo dei brainless FW SPAM: hello, i see your profile at (linkedin.com) Evento V-Valley con MICROSOFT-JUNIPER-PLANTRONICS World Dictionary New Words and Meaning: Communist Related posts brought to you by Yet Another Related Posts Plugin.

unhappy employee are a cyber security concern

Have you ever considered the fact that the “best place to work” is something a security chap should take into serious consideration? A lot of people keep thinking that security is all about one of that technology, most of those expert master perfectly one of another specific technology and think they have the sacred graal of security. Since I am not so a big tech expert I am allowed to think that security isn’t in that specific technology, but in a systemic approach where technology cover just one part, and is just a part of a whole process. One of the aspect…

Cryptography, keeping on the big lie

So Cryptography would be a National Security Issue? I’m tired to be polite and politically correct when talking about encryption. Let us be clear and honest, all those crypto_war is a pile of crap. Every time I heard someone claiming that we should not enforce strong cryptography I wonder: to they have the slightest idea what they are talking about? Probably not, considering also most of the objections against cryptography I heard. Listening to those “enlighten” minds it seems that without cryptography the world be a sort of heaven where intelligence could have the possibility to solve any criminal case. And…

The IoT Files: The need for cryptography

The IoT Files: The need for cryptography One of the main arguments that should be touched by IoT discussion is cryptography. There is an undisputed consensus that cryptography is a mandatory requirement to preserve security and privacy in the IoT world, but we are far away for a general consensus on how to operate. The need for cryptography in IoT comes from two main aspects: Data security Data privacy The first need is clear; encryption is a mandatory requirement when we want to implement any form of authentication and non repudiation. Encryption is widely used even if we don’t know…

Posts navigation
Stop censorship
%d bloggers like this: