Blog
Cybersecurity in the enterprise:
everything you need to know
As we move into 2025, the cybersecurity landscape will reach unprecedented levels of complexity. Advanced technologies such as Artificial Intelligence (AI) and automation will take center stage - not only…
The rapidly evolving nature of cybersecurity threats challenges organizations to adopt advanced tools to protect their data and infrastructure. Security Information and Event Management (SIEM) systems are at the forefront,…
The transportation sector is undergoing a digital transformation, integrating advanced technologies and smart systems to optimize roadways, railways, maritime routes, and air traffic. However, this increased connectivity comes with heightened…
Cyber threats to OT systems are escalating at an alarming rate, with nearly 73% of organizations reporting an intrusion impacting either OT alone or both OT and IT systems in…
As the world moves toward greater reliance on renewable energy, Italy is setting an example. In 2024, for the first time, solar and wind power supplied 43.8% of the country's…
The manufacturing sector is increasingly under threat from cyberattacks, with attackers targeting OT environments, industrial control systems, and supply chains. In fact, manufacturing was the most targeted sector globally in…
Imagine a typical Security Operations Center– teams of analysts concentrated on screens, working to sort through countless alerts, struggling to stay ahead of potential threats. It is a race against…
As the healthcare industry becomes increasingly digital, the importance of robust cybersecurity measures cannot be overstated. The sector's vulnerability to cybercrime, including ransomware and supply chain attacks, has escalated significantly…
The Internet of Things is transforming how we live, work, and interact with our environment. From smart homes and connected cars to industrial automation and healthcare monitoring, IoT devices are…
The arrival of 5G technology marks a new era of connectivity, bringing with it promises of lightning-fast internet speeds, seamless communication and transformative advancements across various sectors. By 2025, 5G…
In today's digitally interconnected landscape, organizations heavily depend on networks of suppliers and partners to maintain operations and foster innovation. However, without adequate attention to cybersecurity resilience in the supply…
In an era where digital manipulation is predominant, the rise of deepfake technology has created a new frontier of deception. Deepfakes blur the lines between reality and fiction with unprecedented…
In 2023, the healthcare industry was ranked as the fourth most impacted by successful and publicly disclosed cyber-attacks[1], falling behind Manufacturing, Professional/Scientific/Technical, and ICT industries. Accounting for 9% of the…
In today's digitally driven world, the demand for cybersecurity professionals is higher than ever, and this urgent need is underscored by projections indicating a potential shortfall of approximately 3.5 million…
By 2030, it is estimated that there will be over 29 billion connected devices worldwide (source: Statista). Inevitably, these devices will need to be as secure as possible to avoid…
Quantum computing represents a transformative breakthrough in computational science, harnessing the principles of quantum mechanics to perform calculations at speeds that were previously thought to be impossible. Its proficiency in…
In the not-so-distant past, enterprises operated within the confines of a distinct perimeter that delineated a secure, trusted zone from an external, unprotected one. However, the contemporary business landscape tells…
The OT sector is undergoing a profound transformation driven by key trends that promise to reshape the industry's landscape, such as the increase in machine connectivity, the growing prevalence of…
In the ever-evolving landscape of cybersecurity, the role of a Penetration Tester has become paramount. According to the European Union Agency for Cybersecurity, these professionals play a crucial role in…
Cybersecurity is gradually becoming more complex, which leads to an increase in responsibilities and, therefore, cybersecurity functions in organizations. Recently, the European Union Cybersecurity Agency (ENISA) published a classification report,…
Protecting an ICS environment, including PLCs, is not trivial, as these systems are not designed to be resilient to cyber attacks. This means that you have to somehow integrate cybersecurity…
Small and midsize businesses (SMBs) require resilient and robust security strategies that seamlessly blend technology, services, and training to combat evolving cyber threats. However, the current economic challenges have imposed…
The rise of cybercrime poses significant threats to individuals, organisations, and nations. Amidst this digital battleground, Digital Forensics Investigators employ their expertise to expose the truth hidden within the digital…
It is estimated that Google has stored more pages than any other search engine in the world. With more than billions of pages and a relatively low execution time, the…
For those coming from IT, securing ICS systems can be frustrating at the beginning. This is because the technologies used and the ways of working are very different when it…
In today's hyper-connected world, where technology fuels every aspect of our lives, the need for robust cybersecurity measures has never been more critical . Businesses, governments, and individuals are increasingly…
As the digital landscape becomes increasingly complex and interconnected, the demand for individuals who specialise in fortifying the digital world against evolving cyber threats has skyrocketed. This is where the…
Robbers with guns and masks carrying cash out of an office window are heroes of old movies. Modern criminals conduct remote cyber-attacks to steal money. It can take them just…
There is something in common between cyber-attacks targeting companies. Most of them are phishing attacks, starting silently with a carefully crafted spear phishing email. Though the messages look quite ordinary,…
“Congratulations! You have just won 30 million euros – follow the link to grab it!”, said the message I received last week. Honestly, it was too much to be true,…
Talking about VPN or Virtual Private Network, without using technical terms and providing useful information even to non-professionals, is not an easy thing. Often these definitions are used to describe…
Many professionals work outside the office when they go on business trips and meet customers. Sometimes they need to connect to the internet to send an urgent email or check…
“Rooting” and “jailbreaking” – you have certainly heard these two words present on blogs dedicated to Android and iPhone. In this article we will find out what they mean. We…
Smartphones keep much sensitive personal and work-related information. Therefore, it is important to defend it and prevent from getting into the wrong hands. To avoid strangers unlocking your mobile phone,…
Working in public places, such as airports, restaurants and bars, large offices, and spaces dedicated to smart working presents a series of security risks. It requires some measure adoption to…
According to multiple estimations Carbanak has generated around 1 billion dollars by hitting banks worldwide. It was mainly attacking companies in Europe, the United States, and China between 2013 and…
Tailgating and Piggybacking are two social engineering practices. They exploit the human factor to violate areas reserved for authorized personnel. It brings consequent risk for security of both physical and…
The 2016/679 European regulation (most known as GDPR) came into force in the end of May 2018. In this easy guide we will try to explain the key points of…
Sign up for newsletter