Blog
Cybersecurity in the enterprise:
everything you need to know
Arduino is a world leader in open-source hardware and software, with millions of developers worldwide. The Arduino ecosystem has been chosen for IoT, Industry 4.0, AI and ML projects on…
By 2030, it is estimated that there will be over 29 billion connected devices worldwide (source: Statista). Inevitably, these devices will need to be as secure as possible to avoid…
Quantum computing represents a transformative breakthrough in computational science, harnessing the principles of quantum mechanics to perform calculations at speeds that were previously thought to be impossible. Its proficiency in…
In the not-so-distant past, enterprises operated within the confines of a distinct perimeter that delineated a secure, trusted zone from an external, unprotected one. However, the contemporary business landscape tells…
In the initial half of 2023, Italy experienced a concerning surge in successful cyber-attacks, witnessing a 40% increase compared to the corresponding period in the previous year. This negative scenario,…
The partnership between HWG Sababa and Vilnius Gediminas Technical University (VILNIUS TECH) - an important research centre in the field of computer engineering with a strong presence in the cybersecurity…
The OT sector is undergoing a profound transformation driven by key trends that promise to reshape the industry's landscape, such as the increase in machine connectivity, the growing prevalence of…
In the ever-evolving landscape of cybersecurity, the role of a Penetration Tester has become paramount. According to the European Union Agency for Cybersecurity, these professionals play a crucial role in…
Cybersecurity is gradually becoming more complex, which leads to an increase in responsibilities and, therefore, cybersecurity functions in organizations. Recently, the European Union Cybersecurity Agency (ENISA) published a classification report,…
Protecting an ICS environment, including PLCs, is not trivial, as these systems are not designed to be resilient to cyber attacks. This means that you have to somehow integrate cybersecurity…
Sign up for newsletter