
Between data breaches and embarrassing communications
A few months after the entry into force of NIS 2, security shortcomings continue to be found in many commercial sectors that are impacted by the European Directive and beyond;
A few months after the entry into force of NIS 2, security shortcomings continue to be found in many commercial sectors that are impacted by the European Directive and beyond;
The purpose of this article is to reflect on how artificial intelligence can be used in a war context and subsequently introduced into a civil operational environment.
The purpose of this article is to suggest a simple and functional approach to cataloguing the risks arising from the implementation of artificial intelligence within organisations.
The purpose of this article is to show the evolution of ISO 27005, to present a compatible and alternative methodological paradigm for cyber risk management, and to observe some of
Italy is facing an increasing number of cyber threats both in quantity and complexity, yet there seems to be no equally effective evolution in terms of cybersecurity. Let us try
The European Union has an IT incident analysis tool called CIRAS. Let’s take a look at this not always well known tool.
In these hours stadium choruses are rising on social networks for and against the self-styled agreement with Elon Musk’s Space X company, wanted by Prime Minister Giorgia Meloni.
Welcome to the ‘Cyber Anti-Sec’ security report covering the year 2024, in which the most relevant data, trends and data breaches will be analysed.
AIAD is the Federation, member of Confindustria, representing Italian Aerospace, Defence and Security Companies.
The company INPS Servizi S.p.A. was the subject of a data breach by the LYNX collective, with data exfiltration and interruption of services. Let’s find out more.
NIS 2 is bringing a number of compliance activities by private companies and public administrations, sometimes not very consistent with the regulations. Let us try to make some reflections on
The Equalize case is filling the front pages of the national press and is spreading like wildfire. On social media, it is being talked about in a very technical way,
The newsletter of the Garante per la Protezione dei Dati Personali (Italian Data Protection Authority) publicises as news measure No. 572 of 4 July 2024 concerning the data breach suffered
On 17 October, Italy will transpose the NIS 2 Directive(CELEX EU 2022/2555), and the expectation surrounding this directive raises a doubt: will the directive have any real usefulness or have
For a few months now, we have been beginning to read articles that seem to re-propose the importance of certain technologies that have been much talked about until now. Among
The idea that hackers only target the most industrially powerful countries is wrong; certainly the United States, China, Europe, are constantly at the centre of cyber attacks, but there are
A lot of information is circulating these hours about the arrest of the founder of the messaging service Telegram: Pavel Durov. Not all this information is correct, let’s try to
On 26 July 2024, the Agency for National Cybersecurity (ACN) published the ‘Guide to Reporting Incidents to CSIRT Italy’. It is a 56-page document that gathers some interesting information that
The Everest Group hit a notary firm and this data breach is likely to have truly dramatic connotations considering the type of target and the amount of data exfiltrated. Let
In Italy, there is a major problem in restoring health services following a computer incident, and it matters little whether the incident is caused by negligence or malicious intent. In
We are constantly talking about technologies such as blockchain and artificial intelligence, but we also have to assess the energy consumption and pollution related to their deployment. Let us try to get into the numbers with the aim of understanding the real importance of these technologies but also the heavy impact they have on the environment and available resources. We must use them wisely!
After the analysis carried out in 2021 and reported in the article‘Videos of animal violence are increasing on the net‘, it was decided to return to the subject a few
It is a term little known to the uninitiated, but dwell time is perhaps one of the most important elements to know for those working in cybersecurity.
Another data breach to the detriment of public health has hit the Lombardy region, this time it is the turn of ASST Rhodense, let’s try to understand what happened.
On 24 May, the final event of the Mastercourse 2024 organised by ANORC took place in Milan: the event is called MEDDLE. On that occasion, I had the opportunity to
As many will know, in April the Synlab facility was attacked by the BlackBasta collective. Among the data exfiltrated, in addition to identity documents and internal information on the facility,
Apart from the legal obligations in the event of a data breach and thus the notification to be made to the Data Protection Authority, it is necessary to understand how
It has now been a few days since the Banca Sella data breach, and it is time to make a few remarks about what happened, outside of any controversy but
On the portal of the Garante per la Potezione dei Dati Personali (Italian Data Protection Authority), the measures against the Lazio Region, the company LazioCrea S.p.A. and ASL Roma 3
In recent years, a current has emerged against the purification process resulting from audio/video digitisation. It is an argument that music and film enthusiasts are familiar with, and it has