Tutto ciò che devi sapere sul Platform Engineering e perché la tua azienda dovrebbe implementarlo
Cloud Native Approach, scopri subito a che livello sei
Lavoriamo su ogni piattaforma. Scopri partnership e competenze
Scarica la Guida Cloud Native Application
Scopri gli strumenti per implementare il metodo.
> Ebook Scopri cos’è il Platform Engineering e perchè implementarlo
Servizi e tecnologie per la cloud security: privacy, protezione e compliance.
Scopri partner e tool per proteggere la tua infrastruttura
A breve disponibile
Risolvere le complessità attraverso la gestione e la distribuzione in contenitori.
> Introduzione alla piattaforma Kubernetes (a breve disponibile)
> Guida alle versioni di Kubernetes (a breve disponibile)
Scopri le 4 distribuzioni Kubernetes
Il nostro ultimo Blogpost
Tutti gli articoli del nostro blog
La nostra ultima novità
Lo storico di tutti i nostri articoli
La registrazione dell’ultimo webinar
Tutti i nostri webinar e workshop
7 regole per ottenere risultati efficaci
La Digital Transformation in azienda
Elenco completo dei contenuti scaricabili
Oltre la consulenza: affiancamento strategico, studio delle esigenze e delle strategie, delle pratiche e dei tool migliori per l’evoluzione digitale.
Scopri le attività di Cloud Transformation
Il pacchetto per la modernizzazione applicativa
Security, Cloud Security e DevSecOps
Da MSP a MSK: il Managed service by Kiratech comprende tutti i servizi MSP con qualcosa in più. Cogestione 24/7 sulla toolchain Cloud Native.
Scopri strategie e aree di intervento
Conosci il Tiger Team Kiratech (a breve disponibile)
Siamo reseller dei migliori software per la digital evolution. La nostra Toolchain è studiata su misura in base alle esigenze e ai progetti.
> Scopri i partner
> Guida ai tool
Scopri il catalogo
Scopri i partner
Un programma completo e autorevole di training per adottare l’approccio Cloud Native
Vedi le nostre training partnership
Vai all’elenco completo
Krateo è la piattaforma di automazione open source per aziende enterprise che devono standardizzare e aumentare l’adozione Cloud Native utilizzando le API Kubernetes standard.
Scopri come avere un unico ambiente di automazione comune.
Leggi i casi d'uso
Malware today is a Business! And the Enterprise answer still remains: “hoping not in my backyard”
by Michele
As Clusit Partner I attended the March 2015 Security Summit in Milan grabbing many figures and some very clear trends.
Let's start with the figures: in 2014 security attacks in the Italian Market increased about 10% and Fastweb highlights that the growth in security events was +2900% (5 mln in 2014 vs 172K in 2013) while the DdoS attacks growth was +1600% (16K in 2014 vs 1K in 2013) but …. what has dramatically changed has been the typology.
Maybe we were used to talk about SQL injections or hacktivism (now more oriented in terroristic attacks), but today the 1st place is strongly hold by Malware.
“Malware today is a Business” has been several times repeated. What does it means exactly?
Malware is strictly linked to the new concept of Cybercrime that is today a real a concrete business.
Cybercrime is a software provider itself with a structured organization (forget thinking about lonely geek working in his bedroom). And organization means a lot of profit by developing and providing walware focused on specific targets.
Malware is a business because is simply “makes a lot of money with very low risk”.
Who are today the main malware targets? First of all On-Line Services such us Cloud and Socials Networks followed by Health organizations, Retail and Gaming. And in the near future pay attention to the Internet of (Hacked) Things.
But many Italian companies reaction is still hoping that attacks will occur elsewhere, “not in my backyard”, but once I am hitted the “cleaning costs” (after) are several times higher then the “before” and “during” ones.
Many security investments are still driven by the mood of the top management that often read the last article on the newspaper where his competitor or neighbor has been attacked and seriously damage …. assuming the news has been made public!
So the final question is really simply: what can I do to prevent attacks?
Nobody can be 100% safe, despite high costs of investment. But the receipt is to use interoperable tools with its own top intelligence, from (anomaly) prevention to reaction, from visibility to detection.
Stop silos tools and many management consoles!