Official Blog

SORINT.lab

Cloud Adoption

Illycaffè and SORINT.lab: A Model of Excellence in Digital Transformation

In the world of coffee, and especially for a giant like illycaffè, precision is everything. Not only in the production and quality of the product,…
IT Resiliency

User and Entity Behavior Analytics : The security reporting tool developed by SORINTians

Background Some key points to consider: SORINTians solved a long-standing problem for a client in the banking and finance sector, achieving a major result in…
IT Resiliency

NIS2 Directive: a 3-minute overview of everything you need to know

In today’s digital world, cyber threats are multiplying rapidly and affecting all kinds of organizations. That’s where NIS2, the new European cybersecurity directive, comes in.…
Application Modernization

Data, analytics and BI: SORINT.lab’s Augmented Analytics project is born

Important Note: In order to comply with many of our clients confidentiality agreements, in some cases it is not possible for us to mention their…
Application Modernization

Why your business needs custom management software: benefits and ROI

Custom management software development can become an incredible tool in the hands of organizations and businesses. It is an increasingly popular method of having applications…
Application Modernization

Why Open Source Software is revolutionizing business development

For software developers, open-source offers an unparalleled opportunity to learn from a global community, improving their skills and visibility. From the organization’s perspective, on the…
DevOps

Why is it important to periodically analyse the MongoDB log files?

When a problem occurs in a MongoDB, nstance, the log file can prove to be a key resource in resolving the problem. This may seem…
Cloud Adoption

When does the FinOps methodology really work? Vademecum for turning data into winning decisions

Imagine a world where very financial decision is supported by accurate and timely data, where resources are optimally deployed and costs are always under control.…
DevOps

What the Scrum methodology is and how a Scrum team works

Today, let’s find out what the Scrum methodology, uis, an essential tool for those who want to optimise project management and are organised in certain…
DevOps

Vulnerability assessment and penetration testing. The most prevalent enterprise attacks in 2024

In a cybersecurity strategy, identifying weaknesses in one’s IT infrastructure is a critical step in putting adequate protection in place. Typically, this involves two activities…