Cloud Security PrinciplesThe Cloud is a reality now, not a future scenario. As already discussed, organizations - private...
Cybercrime: threat and attack landscapeIn order to understand the expectations regarding cyber threats and attacks in the current year, it...
Cybersecurity: the emerging threats of 2023The development trends in cybersecurity are driven, among other factors, by the emergence of new...
3 minute read
How cybersecurity evolves: trends for 2023Among the relevant data of the Report from Clusit, Italian Association for Computer Security,...
Electric mobility: the crucial issue of charging stationsThe vast world of the Internet of Things (IoT) offers new solutions every day, ranging various...
The development of the cyber risk assessment and the areas where it can be performedAll organizations - public and private - deal with cybersecurity on a daily basis, so much so that...
Not trusting is better: here's the Zero Trust approachTrust no one. If a cybersecurity expert should give an advice to a user or company on how to...
Incident Response: more than just the technical aspect"The truth is simple: when you've suffered an attack and you've been damaged, the sooner you accept...
3 minute read
Incident response: how to react and prepare for legal actionIncident response is the serie of procedures used to deal with a cyber attack. Indeed, responding...
Subscribe to our blog!
16 Feb 2022OT Security: how to reconcile business continuity ...
01 Mar 2022Investcorp acquires Italy’s leading cybersecurity ...
09 Feb 2022SOC as a service: how to choose the best one
11 Apr 2022HWG appoints Cyber-Industry veterans to its board ...
17 Mar 2022Security Operation Center (SOC), is it really esse...
- Automotive (1)
- CEO Fraud (1)
- cloud (3)
- cloud security (3)
- Compromise assessment (1)
- cyber resilience (1)
- cyber risk (4)
- cyber security (7)
- cyber security trends (2)
- cyber threats (1)
- cybercrime (1)
- Dark Web (1)
- electric mobility (1)
- Incident Response (3)
- Industry 4.0 (3)
- IoT (2)
- operational technology (1)
- risk assessment (1)
- security assessment (1)
- security operation center (1)
- SOC (3)
- Spear Phishing (2)
- Vulnerability Management (1)
- Zero Trust (1)