1. Home
  2. /
  3. Blog

Blog

Deda Tech and Arkivum: a new partnership for Digital Preservation innovation

The partnership agreement between Deda Tech and Arkivum

Leggi di più
Your cloud base, future-proofed: discover Google Cloud Platform with Deda Tech.
Leggi di più
Efficiency or habit? Learn about IBM FlashSystem the IT, a valuable resource for your future
Leggi di più
Third installment of Deda Tech Vibes: Digital Threat Intelligence

Is it possible to anticipate the moves of cyber criminals? Andrea Lalli and Giorgio Fiore discuss this in the third installment of Deda Tech Vibes.

Leggi di più
Second installment of Deda Tech Vibes: Managed IaaS.

The cloud is not all the same. In the new installment of Deda Tech Vibes we discuss this with Yamandù Correa and Giorgio Fiore.

Leggi di più
First installment of Deda Tech Vibes: MDR

But what exactly is MDR? With some simplicity and a little imagination, we have tried to render the idea

Leggi di più
Deda Tech and Arkivum: a new partnership for Digital Preservation innovation

The partnership agreement between Deda Tech and Arkivum

Leggi di più
Deda Tech signs agreement with Google

The partnership agreement between Deda Tech and Google

Leggi di più
Deda Cloud becomes Deda Tech: a new name for an even broader and more innovative vision

A new name to support business growth and security in the Italian digital landscape

Leggi di più
deda tech’s advice to CIOs on AI4Business

A few weeks ago our Head of Sales & Customer Solutions Roberto Fassina with his contribution declined deda tech’s top tips for today’s CIOs.

Leggi di più
Artificial intelligence, security, sustainability: the three challenges of today’s CIOs

The Chief Information Officer (CIO) is one of the key players within the company, a custodian of IT infrastructure, both in terms of choice and efficiency.

Leggi di più
We dissected the Astaroth malware, here’s what came out!

There is an insidious malware, known as Astaroth or Guildma, increasingly present in the Italian corporate landscape that, using outdated programming languages, circumvents security controls and steals sensitive information.

Leggi di più