News

Trellix Advanced Research Center Discovers a New Privilege Escalation Bug Class on macOS and iOS

Since the first version of iOS on the original iPhone, Apple has enforced careful restrictions on the software that can run on their mobile devices. Only applications that were cryptographically signed by a developer certificate trusted by Apple could be executed, and scripting languages like AppleScript were not found on iOS. https://www.trellix.com/en-us/about/newsroom/stories/research/trellix-advanced-research-center-discovers-a-new-privilege-escalation-bug-class-on-macos-and-ios.html
Read more

Create a new and more comprehensive ITSM (IT Service Management)

Normally IT service management, often referred to as ITSM, is simply how IT teams manage the end-to-end delivery of IT services to customers. This includes all the processes and activities involved in designing, creating, delivering, and supporting IT services. With this in mind, Tylla Sistemi has begun designing a new ITSM that takes into account…
Read more

LINEE GUIDA PER IL DISASTER RECOVERY DELLE PUBBLICHE AMMINISTRAZIONI

Il CAD sancisce che gli uffici pubblici devono essere organizzati in modo che sia garantita la digitalizzazione dei servizi (art. 15 “Digitalizzazione e riorganizzazione”). Da tale indicazione consegue, per la Pubblica Amministrazione (nel prosieguo PA), anche l’obbligo di assicurare la continuità dei processi che presiedono alla erogazione dei propri servizi, quale presupposto per garantire il…
Read more

HOW TO DESIGN YOUR SECURITY OPERATIONS CENTER (SOC) TO WORK SMARTER, NOT HARDER

In today’s digital economy, data isn’t just ameans to create value, it has value itself. If banks were the target of the last century, data is the target of this century. The increasing use of tactics like social engineering and deep fakes,coupled with the ever-present threats of global warfare and infrastructure attacks endanger everything from…
Read more