Home / Blog

Protection stories.

It is not another job. It is a conscious commitment that has become our mission: Data Protection.

This is why we want to share our passion through posts, videos, white papers, and everything you need to discuss data protection.

Welcome to the Boole Blog.

Virtualizzazione del lavoro e sicurezza informatica

HIGHLIGHTS

What is ethical hacking and why is it a valid tool for preventing cyber attacks?

Ethical hacking is aimed at discovering any vulnerabilities in a company’s computer system. It is a cyber attack for all intents and purposes. Nomen omen, after all: ethical hacking. A breach of the computer systems of the company in question is simulated from the hacker’s perspective, and all possible flaws, shortcomings and vulnerabilities that represent more or less serious IT security risks are brought to light.

Read more

The latest news from the Boolebox world

Home / Blog

Protection stories.

It is not another job. It is a conscious commitment that has become our mission: Data Protection.

This is why we want to share our passion through posts, videos, white papers, and everything you need to discuss data protection.

Welcome to the Boole Blog.

Highlights

Virtualizzazione del lavoro e sicurezza informatica

What is ethical hacking and why is it a valid tool for preventing cyber attacks?

Ethical hacking is aimed at discovering any vulnerabilities in a company’s computer system. It is a cyber attack for all intents and purposes. Nomen omen, after all: ethical hacking. A breach of the computer systems of the company in question is simulated from the hacker’s perspective, and all possible flaws, shortcomings and vulnerabilities that represent more or less serious IT security risks are brought to light.

The latest news from the Boolebox world

What is ethical hacking and why is it a valid tool for preventing cyber attacks?

Ethical hacking is aimed at discovering any vulnerabilities in a company’s computer system. It is a cyber attack for all intents and purposes. Nomen omen, after all: ethical hacking.

Work virtualisation and IT security. VDI solutions are becoming increasingly popular: what are the advantages for companies? And the threats?

If most cutting-edge companies were already starting to move in this direction in 2019, today remote working is an everyday occurrence even in smaller, less structured companies.

Data Loss Prevention (DLP) for corporate data protection: tools and recommendations for an effective DLP strategy

Home / Blog / Data Loss Prevention (DLP) for corporate data protection: tools and recommendations for an effective DLP strategy Data Loss Prevention (DLP) for corporate data protection: tools and recommendations for an effective DLP strategy 03 agosto 2022Share Data...

Cyber Security in the PA: risks, planned interventions, solutions

Cybersecurity affects everyone and involves both private and public entities. Within the public administration, the topic of cyber security now presents a sense of urgency. How to solve the critical issues present? Let’s find out in this article.

Remote Working: how your employees can work from home while keeping data safe

Remote working is becoming increasingly important for companies. In this article we look at how working from home has affected IT security, and how you can enable your employees to do smart working safely.

Encryption and ransomware: how to prevent attacks and increase cybersecurity in business

The central topics of this article are encryption and ransomware: we will analyze, in particular, the relationship between the two and the fundamental role that the use of cryptographic keys plays in protecting the business of companies.

White paper – The poor digital data culture

In the on-life dimension, cybersecurity is also placed in a new perspective. The traditional view sees it as an increasingly… Find out more

White Paper – How does the scenario change with Joe Biden?

Will Biden and BIG TECH employees dismember the overwhelming power of Facebook, Google, Apple, Amazon and Microsoft? Find it out…

“Europe: a blissful island in the war between the us and china”

The old continent chooses the “datacentric” path in privacy and data protection, while the clash between washington and beijing rages on the issue.
Download the white paper…