Cyber Security

What we do

Cyber Security 2018-02-01T14:48:19+00:00

AS LONG AS ATTACKS ON PRIVACY AND DATA INCREASE, SPENDING ON CYBERSECURITY WILL NOT BE ENOUGH AS BUSINESSES LOOK TO STAY ONE STEP AHEAD OF HACKERS.

Lavoriamo in diverse aree della Cyber Security attraverso Segment, un’azienda del nostro gruppo, che offre non solo servizi di protezione dai rischi cibernetici ma anche istruttori che possono educare i tuoi dipendenti sulle best practice della sicurezza informatica. Noi aiutiamo i nostri clienti a mettere in sicurezza tutta l’attrezzatura informatica da attacchi sofisticati, attraverso soluzioni e servizi basati sull’innovazione tecnologica e un’eccellente professionalità.
La continua crescita dell’azienda in questo settore è possibile grazie ad un gruppo di hacker, etici ed altamente specializzati, capaci di prevenire – o almeno ridurre – il rischio di perdere dati e di assicurare la sicurezza nel digitale, che attualmente è una grande preoccupazione per le aziende.

FOCUS

Etical Hacker

One of our main aims, being ethical hackers, is to research vulnerabilities affecting systems and communicating them for users and companies’ safety.
The list of our research activities is long. A recent on is about the Remote Code Execution bug which affects Mac users with Microsoft RDC installed.
Its importance lies on the fact that it was possible to totally compromise a vulnerable computer remotely by triggering a user into opening a web link.
Our company coordinated the Microsoft Security Team in fixing the bug.

DEVELOPMENT AREAS

In order to improve the quality of the analysis and support the IT department, Segment proposes as a partner able to offer MSS services. These represent a systematic approach to managing an organization’s security needs. Our focus is on monitoring and support / addressing remediation activities.

A Penetration Test is intended to identify and correlate security issues by simulating attack methodologies used by individuals (hackers) or malware to compromise confidentiality, Availability and Integrity of Data and / or Corporate systems.
We analyse different perimeters, both networks and web applications, in order to evaluate their security status and consequently, prioritizing the resolution of any highlighted bug.

We offer a 360 degrees support in solving and restoring data after a Crytpo Ransomware infection, as we have been working on such attacks for many years experience.
Crypto Ransomware is a kind of malicious software that prevent the victim from accessing to data until a ransom is paid, displaying a ransom message. A simple ransomware may lock the system in a way which is not difficult for a knowledgeable person to reverse. More advanced malwares use a technique called cryptoviral extortion, in which the victim’s files are encrypted and makes them inaccessible.
Our team can support the victims in both occasions

In the event of a computer security incident, one or more specialists may be required to investigate the degree of impairment and to assist the client in the most effective mitigation and resolution of the problem.
We monitor the customer network and the correlations of the logs / alarms that come from them, the SOC is able to generate prior alarms based on the interpretation of alert information that it can receive from its own Systems, identifying any failures of one or more network components, mapping anomalous and dangerous security activity.

The Security Tutor service offers an external figure specializing in security analysis and aims to identify, correlate, and analyze vulnerabilities in business processes and organizational issues in order to highlight the possible criticalities.
We intend to assist both management and technical departments, to take the actions and measures needed to strengthen their defenses.
In addition we may also offer personalized training courses to prevent computer intrusions, physical, data loss, or industrial espionage.

Business continuity and recovery encompasses planning and preparation to ensure that an organization can continue to operate in case of serious incidents or disasters and is able to recover to an operational state within a reasonably short period.
We help your business by restoring servers or mainframes with backups, re-establishing private branch exchanges (PBX) or provisioning local area networks (LANs) to meet immediate business needs.

— NEWS

HTCAP

Htcap is a web application scanner able to crawl single page application (SPA) in a recursive manner by intercepting ajax calls and DOM changes.
It is focused on the crawling process and uses external tools to discover vulnerabilities. It is designed to be a tool for both manual and automated penetration test of modern web applications.

DISCOVER MORE

By | February 16, 2018|

MEETUP BITCOIN VENICE: THE DIGITAL RUSH

Read more

By | February 14, 2018|

E-PAYMENT’S DISRUPTION IN THE ENERGY SECTOR

Read more

By | February 14, 2018|

E-PAYMENT’S DISRUPTION IN THE ENERGY SECTOR – Part II

Read more