ManageEngine Desktop Central Cloud - Review & Test Drive
IIS - How to setup the web.config file to send HTTP Security Headers with your web site (and score an A on securityheaders.io)

Should you be worried about your passwords getting hacked? Choosing a strong password is a must, but it might not be enough: here's a list of common password flaws and some tips to prevent them from being hijacked

Most IT security specialists define passwords as “the keys to our Digital Home”: that’s a pretty good metaphore, especially considering that our “digital home” is getting bigger as the time …

Read More
IIS - How to setup the web.config file to send HTTP Security Headers with your web site (and score an A on securityheaders.io)
Lean Development: principi di base e best practice

Lean Development: core principles and best practices Introduction to the Lean Software Development approach, a set of software development principles and best practices based on lean thinking and waste reduction

Lean Software Development is an agile development methodology inspired by the principles of lean manufacturing (also known as lean production), a production philosophy that aims to minimize waste and eliminate …

Read More
MS Exchange - ripristino database con ESEUTIL, KERNEL e Stellar Utilities

Why you should migrate to Exchange Online A list of the main benefits of migrating from an existing on-premise MS Exchange Server to Exchange Online

If you’ve come across this article, chances are you’re considering replacing your existing MS Exchange Server architecture (or any other on-premise mail server) with a new cloud-based solution managed through …

Read More
Want Real Cyber Protection? Get a Private Email Account

Email Security – Why e-mail messages are a privacy threat? A detailed analysis of the main security issues affecting the e-mail service and the transmission protocols on which it is based

Since the day of its invention, E-mail has been the main communication tool used on the Internet: its use has increased exponentially year after year, mostly thanks to attachment files, …

Read More
Scrivere software sicuro: le linee guida AgID e OWASP per la qualità del codice

Writing secure software: OWASP guidelines for code quality An overview of secure software development and some practical guidelines from the OWASP community

In this article we will analyze a series of guidelines promoted by Agenzia per l’Italia Digitale (AgID) for the development of secure software in the public administration. The guidelines are …

Read More
Windows Native Data Encryption At-Rest with BitLocker

Windows Native Data Encryption At-Rest with BitLocker How to encrypt at-rest your Windows 10 PC drives without third-party software (even without a TPM hardware module)

Implementing Data Encryption at-rest on all clients and server machine became a fundamental pillar of the IT Security policy of most companies. In this article we’ll see how we can …

Read More