CLUSIT e il team Giacomo Lanzi

CLUSIT: our collaboration for better services

Estimated reading time: 5 minutes

Cyber security is an important point for all companies that use the network as a communication tool. This is why we have decided to carry out a fundamental operation that allows us to offer a better service to our customers . We have partnered with CLUSIT to make our services even more professional.

CLUSIT logo

A fundamental-collaboration to improve and improve

The network, as we know, is a world where evolutions are constant and take little time to become operational and standardize . This is due to the constantly and exponentially evolving technology.

It is easy to deduce that there is, therefore, always an opportunity to make a network, an infrastructure, ever more performing and efficient. However, the same reasoning must be made for the related issues. When we talk about new technology standards, new implementations and strategies, they are also applied to unsafe environments. Here, then, that a novelty that helps the company in managing data or connections, can also become a weak point, the “open side” offered to hackers.

To compensate for this benefit / risk combination, new implementations must be accompanied by a constant search for solutions to potential problems that may arise . In fact, it would be useless to only take security measures against attacks designed some time ago. In fact, they would be easily overcome by attacks based on advanced and modern technologies.

It is therefore necessary to guarantee greater protection, adequately designed, the result of well-considered research and analysis. To succeed in this enterprise we have decided to associate with CLUSIT and collaborate with this body in the field of information technology and online security . We can thus prevent the unpleasant situations that can occur due to lack of security updates.

What is CLUSIT?

CLUSIT is an association that has made IT security its goal for over twenty years.

Awareness, training, continuous professional updating and the exchange of information are the most effective tools for dealing with IT security problems.

from the Clusit

CLUSIT was born on the basis of the experiences of other European associations for information security and has several objectives:

  • Spreading & nbsp; the culture of IT security among Companies, Public Administration and citizens.
  • Participate & nbsp; in the processing of laws, rules and regulations involving IT security, both at EU and Italian level.
  • Contribute & nbsp; to the definition of training courses for the preparation and certification of the various professional figures operating in the ICT security sector.
  • Promote & nbsp; the use of methodologies and technologies that allow to improve the security level of the various realities.

Among the activities of CLUSIT that are particularly useful for us and for our customers, there are training ones. The association organizes training events, promotes the drafting of updating and dissemination documents. In general CLUSIT is an important point of reference for always being updated and trained in the field of IT security.

A collaboration synonymous with constant improvement

There are various reasons why we have decided to join CLUSIT. First of all, to have the opportunity to collaborate with various colleagues operating in the world of information security. Sharing knowledge allows all those working in the field to improve their services.

This creates a relationship in which we receive insights and information that is always up to date, but we can also report problems, new exploits and security risks. The result, for our customers, is a service that is always at the top, geared towards training and constant updating. Our engineers are invited to keep up to date and also achieve certifications to guarantee the quality of the service.

Thanks to the webinars and documentation created by CLUSIT, we can learn more information that allows us to improve our services.

Your company data will always be protected thanks to SOD , which can boast constant training thanks to CLUSIT. This collaboration allows us to distinguish ourselves as a company that offers a safe and detailed service from every point of view like few others.

To guarantee this, those who visit our pages will be able to see the CLUSIT logo, synonymous with professionalism and constant updating. The world of IT security represents a world in constant evolution, we have decided to always be up to date to offer the best in our services.

CLUSIT and the team

Security and the services we offer

Thanks to this collaboration with CLUSIT, we are committed to offering the best possible services. Not being up to date would be synonymous with lack of professionalism for us. We are sure you will agree too.

With this partnership, we aim to guarantee a better service from every point of view.
This entails a series of indirect advantages: accurate advice , risk mitigation increasingly specific, use of cutting-edge tools for the safety of our customers.

You can therefore be sure that for you there is the advantage of relying on a team that works with precision and professionalism and that prevents any potential negative situation in the shortest possible time.

If your company is interested in understanding how we can also offer you superior service, do not hesitate to contact us, we will be happy to answer any questions.

Useful links:

Share


RSS

More Articles…

Categories …

Tags

RSS darkreading

RSS Full Disclosure

  • SEC Consult SA-20240220-0 :: Multiple Stored Cross-Site Scripting Vulnerabilities in OpenOLAT (Frentix GmbH) February 21, 2024
    Posted by SEC Consult Vulnerability Lab, Research via Fulldisclosure on Feb 20SEC Consult Vulnerability Lab Security Advisory < 20240220-0 > ======================================================================= title: Multiple Stored Cross-Site Scripting Vulnerabilities product: OpenOLAT (Frentix GmbH) vulnerable version:
  • Re: Buffer Overflow in graphviz via via a crafted config6a file February 21, 2024
    Posted by Matthew Fernandez on Feb 20The fix for this ended up landing in Graphviz 10.0.1, available at https://graphviz.org/download/. Details of this CVE (CVE-2023-46045) are now published, but the CPEs are incomplete. For those who track such things, the affected range is [2.36.0, 10.0.1).
  • CVE-2024-24681: Insecure AES key in Yealink Configuration Encrypt Tool February 21, 2024
    Posted by Jeroen J.A.W. Hermans via Fulldisclosure on Feb 20CloudAware Security Advisory CVE-2024-24681: Insecure AES key in Yealink Configuration Encrypt Tool ======================================================================== Summary ======================================================================== A single, vendorwide, hardcoded AES key in the configuration tool used to encrypt provisioning documents was leaked leading to a compromise of confidentiality of provisioning documents....
  • Microsoft Windows Defender / Backdoor:JS/Relvelshe.A / Detection Mitigation Bypass February 21, 2024
    Posted by hyp3rlinx on Feb 20[+] Credits: John Page (aka hyp3rlinx) [+] Website: hyp3rlinx.altervista.org [+] Source: https://hyp3rlinx.altervista.org/advisories/Windows_Defender_Backdoor_JS.Relvelshe.A_Detection_Mitigation_Bypass.txt [+] twitter.com/hyp3rlinx [+] ISR: ApparitionSec [Vendor] www.microsoft.com [Product] Windows Defender [Vulnerability Type] Detection Mitigation Bypass Backdoor:JS/Relvelshe.A [CVE Reference] N/A [Security Issue] Back in 2022 I released a...
  • Microsoft Windows Defender / VBScript Detection Bypass February 21, 2024
    Posted by hyp3rlinx on Feb 20[+] Credits: John Page (aka hyp3rlinx) [+] Website: hyp3rlinx.altervista.org [+] Source: https://hyp3rlinx.altervista.org/advisories/MICROSOFT_WINDOWS_DEFENDER_VBSCRIPT_TROJAN_MITIGATION_BYPASS.txt [+] twitter.com/hyp3rlinx [+] ISR: ApparitionSec [Vendor] www.microsoft.com [Product] Windows Defender [Vulnerability Type] Windows Defender VBScript Detection Mitigation Bypass TrojanWin32Powessere.G [CVE Reference] N/A [Security Issue]...
  • Microsoft Windows Defender / Trojan.Win32/Powessere.G / Detection Mitigation Bypass Part 3 February 21, 2024
    Posted by hyp3rlinx on Feb 20[+] Credits: John Page (aka hyp3rlinx) [+] Website: hyp3rlinx.altervista.org [+] Source: https://hyp3rlinx.altervista.org/advisories/MICROSOFT_WINDOWS_DEFENDER_TROJAN.WIN32.POWESSERE.G_MITIGATION_BYPASS_PART_3.txt [+] twitter.com/hyp3rlinx [+] ISR: ApparitionSec [Vendor] www.microsoft.com [Product] Windows Defender [Vulnerability Type] Windows Defender Detection Mitigation Bypass TrojanWin32Powessere.G [CVE Reference] N/A [Security Issue]...
  • 44CON 2024 September 18th - 20th CFP February 15, 2024
    Posted by Florent Daigniere via Fulldisclosure on Feb 1544CON is the UK&apos;s largest combined annual Security Conference and Training event. Taking place 18,19,20 of September at the Novotel London West near Hammersmith, London. We will have a fully dedicated conference facility, including catering, private bar, amazing coffee and a daily Gin O’Clock break.         _  […]
  • SEC Consult SA-20240212-0 :: Multiple Stored Cross-Site Scripting vulnerabilities in Statamic CMS February 14, 2024
    Posted by SEC Consult Vulnerability Lab, Research via Fulldisclosure on Feb 13SEC Consult Vulnerability Lab Security Advisory < 20240212-0 > ======================================================================= title: Multiple Stored Cross-Site Scripting vulnerabilities product: Statamic CMS vulnerable version: =3.4.17 CVE number: CVE-2024-24570 impact: high homepage: https://statamic.com/...
  • Stored XSS and RCE - adaptcmsv3.0.3 February 14, 2024
    Posted by Andrey Stoykov on Feb 13# Exploit Title: Stored XSS and RCE - adaptcmsv3.0.3 # Date: 02/2024 # Exploit Author: Andrey Stoykov # Version: 3.0.3 # Tested on: Ubuntu 22.04 # Blog: http://msecureltd.blogspot.com *Description* - It was found that adaptcms v3.0.3 was vulnerable to stored cross site scripting - Also the application allowed the […]
  • OXAS-ADV-2023-0007: OX App Suite Security Advisory February 14, 2024
    Posted by Martin Heiland via Fulldisclosure on Feb 13Dear subscribers, We&apos;re sharing our latest advisory with you and like to thank everyone who contributed in finding and solving those vulnerabilities. Feel free to join our bug bounty programs for OX App Suite, Dovecot and PowerDNS at YesWeHack. This advisory has also been published at https://documentation.open-xchange.com/appsuite/security/advisories/html/2023/oxas-adv-2023-0007.html. […]

Customers

Newsletter

{subscription_form_1}