Archivi categoria : Utility e Varie

Brevi note sul rapporto tra trojan horse e libertà di autodeterminazione Emanuele Salvatore Murone – 12/02/2021 Cass., Sez. V, 30 settembre 2020, (dep. 11 novembre 2020), n. 31604

Con la pronuncia in oggetto, la Corte di legittimità ribadisce che il captatore informatico non costituisce un autonomo mezzo di ricerca della prova, ma solo una particolare modalità tecnica per effettuare l’intercettazione delle conversazioni tra presenti. Di conseguenza, il trojan horse non può rientrare tra i metodi il cui utilizzo, per l’effetto di pressione sulla libertà fisica…
Read more

The Core Phases of Incident Response & Remediation

Planning and preparing for unexpected security incidents is perhaps one of the most difficult challenges for security practitioners. With a robust incident response (IR) plan, professionals can follow a foundation or standard for handling incidents. Preparation A security team needs to prepare for a security incident whenever necessary. Preparation is one of the most essential…
Read more

5 Helpful Incident Response Checklists

Once you have a good understanding of the phases of incident response, it’s time to start developing and implementing incident response checklists that are customized for your business. IR checklists can help your security team efficiently respond to incidents by following a systematic process. Preparation Checklist Your incident response checklist for the preparation phase sets the…
Read more

25 Tips for Protecting PII and Sensitive Data

We’re inundated  with requests for our personally identifable information (PII) and even sensitive data yet we sometimes don’t put in the right controls to protect these assets. Organizations are constantly collecting, storing, and distributing PII and sensitive data but many individuals and even organizations still don’t quite understand the repercussions of mishandled data. Here are…
Read more