Articles
Blockchain in HTS Software Development
The blockchain utilizes the features of a computer network and allows for the unique and secure management and updating of a ledger containing data and information (such as monetary transactions) in an open, shared, and distributed manner without the need for a central controlling and verifying entity. The increasing interest…
- cybersecurity
- HTS
Articles
NIS and NIS2, what changes for the logs?
The NIS (Directive 2016/1148/EC) is a 2016 European directive that became effective in 2018, aimed at strengthening cybersecurity in certain sectors considered essential for the European Union. Recently, the latest version of the NIS (NIS2) was published by the EU, which will replace the NIS1 and…
- log
- log management
- regulatory compliance
News
Clusit Report for the first semester of 2022: Cybersecurity in Italy worsens
While waiting for the complete Clusit report for the whole year 2022, we can read the partial data on the quality of cybersecurity in Italy and around the world for the first half of this year. The situation is not good: the number of attacks continues to grow, although the…
- HTS
- Safety
Articles
Log management and GDPR, how are they related?
When the “ADS Provision” (27 November 2008, published in the Official Gazette n. 300 of 24 December 2008) was issued a few years ago, there was little consensus because it was considered of little use. The request of the provision was only to track the login, logout, and login attempts…
- log
- log management
- regulatory compliance
Articles
The AgID minimum measures and log management
The AgID minimum measures are a practical reference used to evaluate the current level of security of the Public Administration and provide indications for raising it to a higher standard. The purpose, of course, is to counter the ever-increasing and frequent cyber threats that aim to obtain sensitive data from…
- log
- log management
- regulatory compliance
Articles
The “System Administrators” provision and the registration of access logs
The “System Administrators” provision is one of the fundamental steps for protecting personal data in organizations. It is still in force today, like the GDPR and the minimum measures of AGID, and is of central relevance in log management. The System Administrators provision The System Administrators provision was introduced…
- log
- log management
- regulatory compliance
News
HTS supports the Mimesis Festival
Today marks the start of the ninth edition of the Mimesis Festival, which we at HTS are supporters of. This year, the festival will take place from today, Thursday, October 27th, until Saturday, October 29th, in Udine, Cervignano del Friuli, Tolmezzo, Gorizia, and Monfalcone, all located in the Friuli Venezia…
- HTS
- Mimesis Festival
News
Today HTS turns 10 years old!
It has been 10 years since October 18, 2012, the first day of HTS’s activities. 10 years of cybersecurity and regulatory compliance products and services for both private and public organizations. Our mission remains the same: to ensure a balance between the need for security and people’s privacy. What has…
- HTS
Articles
What is log management?
Log management is the management of log records of a computer system. Specifically, it involves the need to manage the chronological recording of activities within an IT infrastructure consisting of various sources such as files, servers, machines, nodes, devices, etc. for inspection, security, and privacy protection purposes. In the field…
- log
- log management
Articles
User provisioning, what it is and its advantages
User provisioning is an IT process that defines the configuration of an IT infrastructure. It can refer to servers, networks, devices, applications, services, and users. In this article, we will focus on the latter. Foto di Gerd Altmann da Pixabay…
- IAM
- identity access management