1. Home
  2. /
  3. Blog

Blog

Deda Cloud becomes Deda Tech: a new name for an even broader and more innovative vision

A new name to support business growth and security in the Italian digital landscape

Leggi di più
deda tech’s advice to CIOs on AI4Business

A few weeks ago our Head of Sales & Customer Solutions Roberto Fassina with his contribution declined deda tech’s top tips for today’s CIOs.

Leggi di più
Artificial intelligence, security, sustainability: the three challenges of today’s CIOs

The Chief Information Officer (CIO) is one of the key players within the company, a custodian of IT infrastructure, both in terms of choice and efficiency.

Leggi di più
We dissected the Astaroth malware, here’s what came out!

There is an insidious malware, known as Astaroth or Guildma, increasingly present in the Italian corporate landscape that, using outdated programming languages, circumvents security controls and steals sensitive information.

Leggi di più
Malware Analysis: what it is and why it is important for enterprise cybersecurity

Since 2020, cybersecurity attacks on businesses have experienced a continuous escalation, really sparing no one, both in the public and private sectors.

Leggi di più
Ransomware: what they are, how to avoid and eliminate them

At a time when digital security remains a major concern for IT managers, ransomware is emerging as one of the most dangerous threats to businesses, institutions, and even individual users.

Leggi di più
Data Strategy: what it is, how to apply it, and why

In a world increasingly driven by data but dominated by great uncertainty, following a well-defined data strategy is critical for any company, regardless of size or the industry in which it operates.

Leggi di più
Enterprise network: what it is, types and how it is configured

Enterprise networks are one of the most important infrastructures in the IT context as they ensure the connectivity of data and applications, elements that are now indispensable for the operation of any information system.

Leggi di più
ETL: meaning, operation and benefits

In a data-driven world, companies need data to understand what is going on inside and outside their business, make informed decisions, and improve their operations and market presence.

Leggi di più
Network Access Control (NAC): what is it and why is it important?

In implementing a robust and effective security strategy, a key role is played by NACs, Network Access Control, solutions that allow monitoring of devices and users trying to access the network, limiting access to resources to unauthorized users and, most importantly, cybercriminals, hackers or attackers.

Leggi di più
Multi tenancy: definition, examples and advantages

In recent years we are witnessing the great spread of cloud-based service models.

Leggi di più
SaaS: meaning, examples and benefits

Software-as-a-Service and service-based models in general have gained considerable popularity and spread thanks to the cloud.

Leggi di più