MS Exchange - ripristino database con ESEUTIL, KERNEL e Stellar Utilities

Why you should migrate to Exchange Online A list of the main benefits of migrating from an existing on-premise MS Exchange Server to Exchange Online

If you’ve come across this article, chances are you’re considering replacing your existing MS Exchange Server architecture (or any other on-premise mail server) with a new cloud-based solution managed through …

Read More
Want Real Cyber Protection? Get a Private Email Account

Email Security – Why e-mail messages are a privacy threat? A detailed analysis of the main security issues affecting the e-mail service and the transmission protocols on which it is based

Since the day of its invention, E-mail has been the main communication tool used on the Internet: its use has increased exponentially year after year, mostly thanks to attachment files, …

Read More
Scrivere software sicuro: le linee guida AgID e OWASP per la qualità del codice

Writing secure software: OWASP guidelines for code quality An overview of secure software development and some practical guidelines from the OWASP community

In this article we will analyze a series of guidelines promoted by Agenzia per l’Italia Digitale (AgID) for the development of secure software in the public administration. The guidelines are …

Read More
Check for Dangerous Root Certificates on Windows with SigCheck

Check for Dangerous Root Certificates on Windows with SigCheck How to protect your Windows machine from unsafe root certificates such as Superfish, Komodia, PrivDog, eDellRoot using the free SigCheck tool from Sysinternals

Have you ever heard about Superfish? If you’re a System Administrator, you probably do. However, here’s a quick recap: Superfish was an advertising company based in Palo Alto, California: it …

Read More
Windows Native Data Encryption At-Rest with BitLocker

Windows Native Data Encryption At-Rest with BitLocker How to encrypt at-rest your Windows 10 PC drives without third-party software (even without a TPM hardware module)

Implementing Data Encryption at-rest on all clients and server machine became a fundamental pillar of the IT Security policy of most companies. In this article we’ll see how we can …

Read More
Information Security: le linee guida ENISA

The 4 pillars of IT Security according to ENISA An extensive overview of the ENISA Technical Guidelines for the implementation of minimum security measures for Digital Service Providers, the reference standard for IT security in Europe

Four years after its publication (February 2017), the Technical Guidelines for the implementation of minimum security measures for Digital Service Providers published by the European Union Agency for Cybersecurity (ENISA) …

Read More