IT Security: what is a Pen test?
The Pen Test is an IT attack used to assess the security level of a system or network. Its main purpose is to identify and indicate any flaws that may lead to vulnerability.
![]()
The Pen Test is an IT attack used to assess the security level of a system or network. Its main purpose is to identify and indicate any flaws that may lead to vulnerability.
Web APIs (or Application Programming Interfaces) are software intermediaries which are generally grouped into sets of specific tools, whose main purpose is to carry out certain tasks within programs.
For some time, the so-called CIO (Chief Information Officer) has become an increasingly popular topic of discussion. A kind of manager reporting directly to the CEO (Chief Executive Officer), he or she has the task of moving forward initiatives
The term industry 4.0 refers to that process which will make the entire industrial production interconnected and automated.
In IT, an IP address is a series of numbers which identify a device known as a host, connected to a network which uses Internet Protocol as its network protocol.
How fast is internet connection in Italy? According to research, in the first trimester of 2017 Italy climbed 13 percentage points compared to the previous year
Nowadays it is almost impossible not to have heard of artificial intelligence. As shown in the case of Alpha Go Zero developed by Google, IAs are now able to play board games without the help of human beings.
Cloud Computing is a mix of different technologies which allow data to be produced and stored using online resources
What would happen if the world was suddenly without Internet for one or more days? Despite the risk that a lot of people might go crazy in such a situation, the real impact on society and the economy would be almost negligible, according to a study by the BBC.
A Blockchain is a database in which all Bitcoin transactions carried out since 2009 are registered: a sort of accounting ledger based on peer-to-peer technology, which as well as being accessible to all via the web, enables its users to establish network nodes.
A DNS (Domain Name System) is the term given to a group of folders arranged into a hierarchical order, used to manage the so-called namespace
The term malvertising refers to a type of advertising which is designed and sent out with the purpose of spreading malware
This website uses cookies to enhance your experience. Some are essential for site functionality, while others help us analyze and improve your usage experience. Please review your options and make your choice.
If you are under 16 years old, please ensure that you have received consent from your parent or guardian for any non-essential cookies.
Your privacy is important to us. You can adjust your cookie settings at any time. For more information about how we use data, please read our privacy policy. You may change your preferences at any time by clicking on the settings button below.
Note that if you choose to disable some types of cookies, it may impact your experience of the site and the services we are able to offer.
Some required resources have been blocked, which can affect third-party services and may cause the site to not function properly.
This website uses cookies to enhance your browsing experience and ensure the site functions properly. By continuing to use this site, you acknowledge and accept our use of cookies.