Skip to content
Secure Your Data
  • Blog (Elementor)
  • Collaborations
  • Contacts
  • Contacts
  • Contacts (Elementor)
  • Contacts Creative
  • Contacts Creative (Elementor)
  • Elementor #1055
  • Glossary
  • Home Classic (Elementor)
  • Home Creative (Elementor)
  • Home Image (Elementor)
  • Home OnePage (Elementor)
  • Home Slider (Elementor)
  • Home Video (Elementor)
  • Privacy Policy
  • Resume (Elementor)
  • Resume Creative
  • Resume Creative (Elementor)
  • Secure Your Data
  • The Inventor
    • Francesco Russo
  • Works
  • Works (Elementor)
  • Works Classic
  • Works Classic (Elementor)
  • Works Creative
  • Works Creative (Elementor)

    Author: Francesco Russo

    This author has written 7 articles
    1. Home>
    2. Blog>
    3. Francesco Russo
    Read more about the article Securing Windows 10 – Part Two “Cryptography”
    Enigma Machine

    Securing Windows 10 – Part Two “Cryptography”

    • Post author:Francesco Russo
    • Post published:09/17/2020
    • Post category:Cybersecurity
    • Post comments:0 Comments

    Today we are going to explore the possibilities offered by one of the most important conquers when it comes to protect (personal) data at rest, the encryption, which is the…

    Continue ReadingSecuring Windows 10 – Part Two “Cryptography”

    Cookie – User’s “Consent” to Data Controller “legitimate interest”?

    • Post author:Francesco Russo
    • Post published:09/10/2020
    • Post category:Cybersecurity
    • Post comments:0 Comments

    In recent months, in accessing websites, we are seeing a new way of presenting cookies more and more frequently.Next to the well-known banner with the button: "accept cookies" there is…

    Continue ReadingCookie – User’s “Consent” to Data Controller “legitimate interest”?

    Securing Windows 10 – Part One “Least Privilege”

    • Post author:Francesco Russo
    • Post published:08/06/2020
    • Post category:Cybersecurity
    • Post comments:0 Comments

    Recent events turned a light on IT security threats, not only for companies who usually pay higher attention to this type of topics, but also for end users. The rapid…

    Continue ReadingSecuring Windows 10 – Part One “Least Privilege”

    10 TOOLS FOR DIGITAL FORENSICS AND VULNERABILITY ASSESSMENT

    • Post author:Francesco Russo
    • Post published:07/10/2020
    • Post category:Sicurezza IT
    • Post comments:0 Comments

    The advent of the GDPR in Europe and the CCPA in the United States have raised emphasis on PII processing, and on data breaches increasing every. This is where a…

    Continue Reading10 TOOLS FOR DIGITAL FORENSICS AND VULNERABILITY ASSESSMENT

    Recent Posts

    • Securing Windows 10 – Part Two “Cryptography”
    • Cookie – User’s “Consent” to Data Controller “legitimate interest”?
    • Securing Windows 10 – Part One “Least Privilege”
    • Cookie Policy, banner, consent – how to be compliant with the GDPR
    • 10 TOOLS FOR DIGITAL FORENSICS AND VULNERABILITY ASSESSMENT
    Lorem ipsum dolor sit amet consectetur ni adipiscing elit.
    Get In Touch Opens in a new tab
    • Lorem ipsum dolor sit amet.

    Iscriviti alla nostra Newsletter

    Ricevi tutti i nostri contenuti direttamente nella tua mail
    Email is required Email is not valid
    Thanks for your subscription.
    Failed to subscribe, please contact admin.
    Facebook-f Twitter Youtube
    Sito realizzato da Francesco Achille Russo

    Log in

    Become a part of our community!
    Forgot your password? Get help
    Privacy Policy

    Reset password

    Recover your password
    A password reset link will be e-mailed to you.
    Privacy Policy
    Back to
    Login
    ×
    Close Panel
    Facebook Twitter
    Dribbble Medium

    Available To Get Hired

    contact@support.com
    Jacob

    By continuing to use this website, you consent to the use of cookies in accordance with our Cookie Policy.

    Accept