Keyword

ICT Security

28.10.2010

Event

Security Conference 2010

Cloud Computing and new threats on the networks. These was the main themes at the 2010 Security Conference, which was attended by Spike Reply and Communication Valley Reply, held in Rome at the Sheraton Hotel the 28th of October.

Best Practice

Information monitoring

Monitoring is a fundamental stage in the security life cycle since it allows for a verification of the efficacy of the protection technologies used, the check of their correct functioning and the indication of the improvement interventions which could further strengthen security.