NIS and NIS2, what changes for the logs?

NIS and NIS2, what changes for the logs?

The NIS (Directive 2016/1148/EC) is a 2016 European directive that became effective in 2018, aimed at strengthening cybersecurity in certain sectors considered essential for the European Union. Recently, the latest version of the NIS (NIS2) was published by the EU, which will replace the NIS1 and…

  • log
  • log management
  • regulatory compliance
>
Clusit Report for the first semester of 2022: Cybersecurity in Italy worsens

Clusit Report for the first semester of 2022: Cybersecurity in Italy worsens

While waiting for the complete Clusit report for the whole year 2022, we can read the partial data on the quality of cybersecurity in Italy and around the world for the first half of this year. The situation is not good: the number of attacks continues to grow, although the…

  • HTS
  • Safety
>
Log management and GDPR, how are they related?

Log management and GDPR, how are they related?

When the “ADS Provision” (27 November 2008, published in the Official Gazette n. 300 of 24 December 2008) was issued a few years ago, there was little consensus because it was considered of little use. The request of the provision was only to track the login, logout, and login attempts…

  • log
  • log management
  • regulatory compliance
>
The AgID minimum measures and log management

The AgID minimum measures and log management

The AgID minimum measures are a practical reference used to evaluate the current level of security of the Public Administration and provide indications for raising it to a higher standard. The purpose, of course, is to counter the ever-increasing and frequent cyber threats that aim to obtain sensitive data from…

  • log
  • log management
  • regulatory compliance
>
The “System Administrators” provision and the registration of access logs

The “System Administrators” provision and the registration of access logs

The “System Administrators” provision is one of the fundamental steps for protecting personal data in organizations. It is still in force today, like the GDPR and the minimum measures of AGID, and is of central relevance in log management. The System Administrators provision The System Administrators provision was introduced…

  • log
  • log management
  • regulatory compliance
>
HTS supports the Mimesis Festival

HTS supports the Mimesis Festival

Today marks the start of the ninth edition of the Mimesis Festival, which we at HTS are supporters of. This year, the festival will take place from today, Thursday, October 27th, until Saturday, October 29th, in Udine, Cervignano del Friuli, Tolmezzo, Gorizia, and Monfalcone, all located in the Friuli Venezia…

  • HTS
  • Mimesis Festival
>
Today HTS turns 10 years old!

Today HTS turns 10 years old!

It has been 10 years since October 18, 2012, the first day of HTS’s activities. 10 years of cybersecurity and regulatory compliance products and services for both private and public organizations. Our mission remains the same: to ensure a balance between the need for security and people’s privacy. What has…

  • HTS
>
What is log management?

What is log management?

Log management is the management of log records of a computer system. Specifically, it involves the need to manage the chronological recording of activities within an IT infrastructure consisting of various sources such as files, servers, machines, nodes, devices, etc. for inspection, security, and privacy protection purposes. In the field…

  • log
  • log management
>
User provisioning, what it is and its advantages

User provisioning, what it is and its advantages

User provisioning is an IT process that defines the configuration of an IT infrastructure. It can refer to servers, networks, devices, applications, services, and users. In this article, we will focus on the latter. Foto di Gerd Altmann da Pixabay…

  • IAM
  • identity access management
>
What is an IAM (Identity and Access Management) software?

What is an IAM (Identity and Access Management) software?

An IAM (Identity and Access Management) software is a tool that defines who the users that can access a network are and what they can do, see and use The principle is that of the airport security officer: the IAM software is its digital version, and…

  • IAM
  • identity access management
>