Stiamo tostando un nuovo caffe' !



send Newsletter card_giftcard Membri PRO

I link a disposizione dei "caffeinomani" per approfondire alla fonte. Vuoi collaborare ?

Principali categorie trovate in 12 risorse su max:12 di oltre 500 in totale
Tutti / Cybersecurity: bluetooth cnil cybernews cybersec cybersecurity degoogled english europe european gafam geofencing indagini intelligenza artificiale nis2 privacydb rag smartphone software sorveglianza
Blog | Wazuh
2026-02-04 · Wazuh.com 5 min Incident management with Wazuh and RootlyJanuary 29th 2026 / EngineeringIncident management with Wazuh and RootlyBy Incident management involves detecting, responding to, and resolving unplanned events efficiently across systems and teams. It is important for organizations aiming
ICE Is Going on a Surveillance Shopping Spree
2026-02-02 · Eff.org 15 min Read more about how enterprising hackers have started projects to do counter surveillance against ICE, and learn how to follow the Homeland Security spending trail.U.S. Immigration and Customs Enforcement (ICE) has a new budget under the current administration, and they are goin
TikTok US venture to collect precise user location data
2026-01-26 · Bbc.com 3 min TikTok US venture to collect precise user location data2 days agoLily JamaliNorth America Technology correspondent, San FranciscoGetty ImagesTikTok's new US joint venture has made changes to its privacy policy that include expanding the type of location data the company can colle
RAG Evidenza vs Autorità: come l’IA gestisce informazioni contrastanti nel nuovo paper del CERT AGID ReTeDigitale
2026-01-23 · Retedigitale.gov.it 3 min Come reagiscono i sistemi di Retrieval Augmented Generation (RAG) quando il contesto che fornisce loro informazioni contiene istruzioni fuorvianti o in conflitto con i fatti?  Questa è la domanda al centro della nuova analisi del CERT-AgID, dal titolo “Bias di autoritÃ
Hijacking Bluetooth Accessories Using Google Fast Pair
2026-01-22 · Whisperpair.eu 6 min Google Fast Pair enables one-tap pairing and account synchronisation across supported Bluetooth accessories. While Fast Pair has been adopted by many popular consumer brands, we discovered that many flagship products have not implemented Fast Pair correctly, introducing a flaw th
NIS2 e oneri documentali e procedimentali
2026-01-12 · Protezionedatipersonali.it 16 min L'avvento della NIS2 ha introdotto una serie di nuovi oneri documentali e procedimentali in materia di cyber sicurezza.1. Introduzione: la cybersicurezza come processo formale L’avvento della Direttiva (UE) 2022/2555, comunemente nota come NIS2, e il suo recepimento nell’ord
OPENVAS feed comparison – COMMUNITY vs. ENTERPRISE
2025-12-23 · Greenbone.net < 1 min Features OPENVAS COMMUNITY FEED(Basic Coverage) OPENVAS ENTERPRISE FEED(Extended Coverage) We show vulnerabilities for consumer products (e.g. AVM Fritzbox, MS Office, Ubuntu Linux) German IT Security Standard (IT-Grundschutz) We show vulnerabilities for enterprise produ
OPENVAS Open Vulnerability Assessment Scanner
2025-12-23 · Openvas.org 6 min @layer { html { background-color: var(--darkreader-background-ffffff, #000000) !important; } html { color-scheme: dark !important; } iframe { color-scheme: dark !important; } html, body { background-color: var(--darkreader-background-ffffff, #000000); } html, body
Rapid7 Managed cybersecurity: Outpace Attackers
2025-12-23 · Rapid7.com 1 min CustomersAI-DRIVENRapid7 command platformThe only endpoint to cloud, unified cybersecurity platformMDR with unlimited incident responseGain 24x7 XDR monitoring, remediation, and DFIR from experts that extend your team to help secure your extended ecosystem.Explore serviceExposure
Nessus Vulnerability Scanner: Network Security Solution | Tenable®
2025-12-23 · Tenable.com 6 min The first tool in your cybersecurity toolboxExpose and close weaknesses across your constantly changing attack surface with the industry’s most trusted vulnerability assessment solution.Try Tenable Nessus for freeUnlimited vulnerability assessments you can use anywhereKnow your
Everything to know about FantomApp
2025-12-16 · Cnil.fr 3 min Home FantomApp: the mobile app helps 10- to 15-year-olds to protect themselves on social media 16 December 2025The FantomApp mobile app helps you maintain control over your social media data through practical advice and tools.FantomApp: practical tools to maintain control over yo
Get us off Microsoft! Lawmakers press EU Parliament to change in house IT. – POLITICO
2025-11-26 · Politico.eu 145 min @layer { html { background-color: var(--darkreader-background-ffffff, #000000) !important; } html { color-scheme: dark !important; } iframe { color-scheme: dark !important; } html, body { background-color: var(--darkreader-background-ffffff, #000000); } html, bo
Principali categorie trovate in 12 risorse su max:12 di oltre 500 in totale
Tutti / Cybersecurity: bluetooth cnil cybernews cybersec cybersecurity degoogled english europe european gafam geofencing indagini intelligenza artificiale nis2 privacydb rag smartphone software sorveglianza


foto Valentino Spataro
Tutti i giorni alle 8.30 by Valentino Spataro; dal 2008

diventa Membro; ascoltaci sul sito oppure su:

cerca caffe20 on Spreaker caffe20 on Spotify Twitter Alexa caffe20 on Estensione caffe20 on iTunes caffe20 on Google Calendar