Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit

Crime As A Self Service

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Security
  • Post comments:2 Comments
  • Reading time:4 mins read
  • Post published:February 3, 2012

One of the most visionary information security predictions for 2012, was the one issued by Fortinet which defined the term…

Continue ReadingCrime As A Self Service

La Città (Verde) Tra Le Nuvole

  • Post author:
  • Post last modified:March 11, 2011
  • Post category:Security
  • Post comments:0 Comments
  • Reading time:6 mins read
  • Post published:March 11, 2011

Il titolo dell'articolo apparentemente richiama la romantica Cloud City, città tra le nuvole che contraddistingue le gesta di Han Solo…

Continue ReadingLa Città (Verde) Tra Le Nuvole

Tecnologia e Normativa: Le Due Facce Del Cloud

  • Post author:
  • Post last modified:February 22, 2011
  • Post category:Cloud
  • Post comments:1 Comment
  • Reading time:6 mins read
  • Post published:February 22, 2011

In queste ore IDC ha pubblicato un interessante documento "Accelerate Hybrid Cloud Success: Adjusting the IT Mindset" (sponsorizzato da VMware)…

Continue ReadingTecnologia e Normativa: Le Due Facce Del Cloud
Copyright 2022 - HACKMAGEDDON.COM