HWG srl
  • Services
    • Cyber defense
      • Security Awareness
      • File Integrity Monitoring
      • Network Security
      • Browser Isolation
      • Email Security
      • Endpoint Security
    • Machine intelligence
      • SIEM
      • EDR
      • SOAR
      • Anomaly Behavior Analysis
      • Cyber Threat Intelligence
      • Deception
      • Threat Data Feeds
      • Vulnerability Management
      • ICS Security
    • Human expertise
      • Security Assessment
      • Incident Response
      • Security Monitoring
      • Threat Hunting
  • About us
  • Blog
  • Resource Center
  • Contacts
  • Careers
  • en
    • it
HWG Incident Response
HWG srl
  • Services
    • Cyber defense
      • Security Awareness
      • File Integrity Monitoring
      • Network Security
      • Browser Isolation
      • Email Security
      • Endpoint Security
    • Machine intelligence
      • SIEM
      • EDR
      • SOAR
      • Anomaly Behavior Analysis
      • Cyber Threat Intelligence
      • Deception
      • Threat Data Feeds
      • Vulnerability Management
      • ICS Security
    • Human expertise
      • Security Assessment
      • Incident Response
      • Security Monitoring
      • Threat Hunting
  • About us
  • Blog
  • Resource Center
  • Contacts
  • Careers
  • en
    • it
HWG srl
HWG Incident Response
  • Services
  • About us
  • Blog
  • Resource Center
  • Contacts
  • en
    • it

Blog

IT security in the company: everything you need to know

Spear Phishing, Zero Trust

Not trusting is better: here's the Zero Trust approach

Trust no one. If a cybersecurity expert should give an advice to a user or company on how to...
2 minute read
Read more
Incident Response

Incident Response: more than just the technical aspect

"The truth is simple: when you've suffered an attack and you've been damaged, the sooner you accept...
3 minute read
Read more
Incident Response

Incident response: how to react and prepare for legal action

Incident response is the serie of procedures used to deal with a cyber attack. Indeed, responding...
2 minute read
Read more
Compromise assessment

Compromise assessment: the most effective against cyber attacks

What do you do when you don't feel well but don't know the cause of your sickness? You will go to a...
2 minute read
Read more

HWG appoints Cyber-Industry veterans to its board to empower growth

Verona, April 11, 2022 - HWG, Italy’s leading cybersecurity company is pleased to announce the...
1 minute read
Read more
SOC, security assessment

The first step towards security: the Security Assessment

The urgency of having a solid IT security structure is demonstrated by two simple facts: the first...
2 minute read
Read more
Vulnerability Management

Threat Hunting: what it takes to hunt down hackers

Usually, in the field of cybersecurity, there are two distinct figures: attackers who try to obtain...
3 minute read
Read more
SOC, security operation center

Security Operation Center (SOC), is it really essential?

Increasingly frequent and sophisticated threats to the IT security system of enterprises have...
2 minute read
Read more
Industry 4.0, operational technology

Operational Technology: How to Avoid Production Downtime

In addition to the risk of information theft or intellectual property infringement, in the...
2 minute read
Read more

Investcorp acquires Italy’s leading cybersecurity company, HWG

The acquisition marks the third cybersecurity transaction in two years for Investcorp Technology...
3 minute read
Read more

Subscribe to our blog!

Popular post

  • 11 Apr 2022
    HWG appoints Cyber-Industry veterans to its board ...
  • 01 Mar 2022
    Investcorp acquires Italy’s leading cybersecurity ...
  • 16 Feb 2022
    OT Security: how to reconcile business continuity ...
  • 17 Mar 2022
    Security Operation Center (SOC), is it really esse...
  • 09 Feb 2022
    SOC as a service: how to choose the best one

Topics

  • CEO Fraud (1)
  • Compromise assessment (1)
  • cyber resilience (1)
  • cyber risk (1)
  • Dark Web (1)
  • Incident Response (3)
  • Industry 4.0 (3)
  • IoT (2)
  • operational technology (1)
  • security assessment (1)
  • security operation center (1)
  • SOC (3)
  • Spear Phishing (2)
  • Vulnerability Management (1)
  • Zero Trust (1)
1 2
HWG
  • ISO certified company
  • ISO
  • clusit
  • Services
  • About us
  • Blog
  • Resource Center
  • Contacts
HWG Incident Response
2021 © HWG Srl

HWG Srl | Via Enrico Fermi, 15/E - 37135 Verona | P.IVA 03820790230

  • 231/2001 Model
  • Privacy Policy