System administration designation in the “System Administration” measure

System administration designation in the “System Administration” measure

In the digital age where the management of information and personal data plays an increasingly central role, the appointment of system administrators becomes crucial to ensure the security and integrity of computer systems and the data they process. This article aims to examine the importance of evaluating the experience, capability,…

  • log
  • log management
  • regulatory compliance
>
Who is the System Administrator?

Who is the System Administrator?

In the vast and complex world of information technology, there exists a professional figure that plays a crucial role in managing and maintaining computer systems – the system administrator. This technical expert has a vital role in ensuring the efficiency, security, and reliability of an organization’s computer networks. In this…

  • log
  • log management
>
Log management and Italian regulations

Log management and Italian regulations

The current regulations in force in Italy that require compliance with log management are: “System Administrators” Provision – November 27, 2008 Security of Telecommunications and Telematic Traffic Data – January 17, 2008 European Regulation 2016/679 (GDPR) AgID Minimum Measures “System Administrators” Provision – November 27, 2008 Within the “System Administrators”…

  • log management
  • regulatory compliance
>
Provision on the Security of Telephone and Telematic Traffic Data and Log Management

Provision on the Security of Telephone and Telematic Traffic Data and Log Management

The Provision on the “Security of Telephone and Telematic Traffic Data” issued on January 27, 2008, is a measure by the Italian Data Protection Authority (Garante Privacy). Its objective is to establish measures and precautions for electronic communication service providers to adopt in the storage of…

  • log
  • log management
  • regulatory compliance
>
Truthster, certifying the authenticity and consent of journalistic content with blockchain

Truthster, certifying the authenticity and consent of journalistic content with blockchain

In the current journalistic landscape, there is a lack of simple and effective tools to certify the authenticity and integrity of content such as video recordings, interviews, and photos, as well as to collect consent from the interviewees. Interviewed individuals are often unaware of their privacy rights and, consequently, unable…

  • software development
>
IdentyCard receives two recognitions from Confartigianato Udine and the Chamber of Commerce of Pordenone and Udine

IdentyCard receives two recognitions from Confartigianato Udine and the Chamber of Commerce of Pordenone and Udine

The IdentyCard project has received two special recognitions during the Confartigianato Udine event dedicated to San Giuseppe Artigiano (Saint Joseph the Worker). A commemorative photo of the award ceremony was taken. On March 19, 2023, in Tarcento, the event organized by Confartigianato Imprese Udine took place, where local artisan entrepreneurs…

  • identycard
>
Computer science log, what are they?

Computer science log, what are they?

In computer science, a log refers to a sequential and chronological record of operations performed by a computer system. Logs can originate from various sources such as a server, application, client, or software. They are stored in specific files called log files and form the basis of…

  • log
  • log management
>
Log Management and PCI-DSS

Log Management and PCI-DSS

Log management and PCI-DSS are connected for several reasons. PCI-DSS (Payment Card Industry Data Security Standard) is a set of compliance standards for the protection of consumer payments and financial data. Organizations that handle payment card information are required to comply with…

  • log
  • log management
  • regulatory compliance
>
Log Management in ISO 27001

Log Management in ISO 27001

ISO 27001 (or ISO/IEC 27001) is the primary international standard for information security. It provides guidelines on how to implement an effective Information Security Management System (ISMS). Specifically, the standard highlights the log management as a control tool. But first, an introduction…

  • log
  • log management
  • regulatory compliance
>
Blockchain in HTS Software Development

Blockchain in HTS Software Development

The blockchain utilizes the features of a computer network and allows for the unique and secure management and updating of a ledger containing data and information (such as monetary transactions) in an open, shared, and distributed manner without the need for a central controlling and verifying entity. The increasing interest…

  • cybersecurity
  • HTS
>