Loading...
VPN for smart working active

Guides

Smart working and cyber security: risks and solutions

23 December 2024

In recent years, remote work has become an integral part of many companies' work strategies, transforming the way employees perform their daily tasks.  This new way of working, known as smart working, offers greater flexibility but also introduces new challenges…
Protection from cyber threats

Governance

CSIRT: the heart of cyber security 

20 December 2024

CSIRT, an acronym for Computer Security Incident Response Team, is a critical entity in managing cyber security incidents and protecting against cyber threats. It is a specialized unit that intervenes in the event of cyber incidents, providing technical support, coordinating…
Cyber Solidarity Act

Governance

A new EU cyber security package is coming 

20 December 2024

On December 2, 2024, the European Council announced a new cyber security package adopted by the Council of the European Union, marking a crucial step toward a safer and more resilient Europe against cyber threats.  This initiative, comprising the Cyber…
Sicurezza delle reti e dei sistemi

Governance

NIS Cooperation Group: what it is and how it works 

20 December 2024

The NIS Cooperation Group, established under Article 14 of Directive (EU) 2022/2555, serves as a strategic tool to promote network and system security across the European Union.  Formed with the aim of facilitating strategic cooperation and information exchange among Member…

Most Viewed

Latest Posts

Guides

Adware: what it is, how to remove it, and how to protect yourself

Adware, or ‘advertising software’, is a type of software that displays advertisements as the main method of generating revenue. It is often found in installation packages of free software and can be installed either voluntarily or unintentionally. While some adware is transparent about its function, others can install themselves without [...]

Guides

What is LockBit Ransomware and how does it work?

LockBit Ransomware is a very dangerous malware that encrypts files in victims' operating systems, rendering them inaccessible and demanding a ransom for their recovery. First appearing in 2019, it has quickly established itself as one of the most serious threats in cybersecurity. LockBit's attacks are notable for their speed and [...]

Guides

What are trojans and how to protect yourself 

Trojans are a type of malware that masquerades as a legitimate application to trick users into downloading and installing them. Although they do not replicate themselves like viruses, Trojans are very dangerous because once installed, they can take control of the operating system and perform malicious actions. This malware can [...]

Guides

Pharming and phishing: what’s the difference?

Pharming and phishing are two forms of cyber attack with similar objectives but different methodologies. Phishing involves deceiving users through fraudulent communications, such as e-mails or messages, to induce them to provide personal information. Pharming, on the other hand, manipulates the DNS address of a site to redirect users to [...]

News

What is a worm: understanding this type of malware

Worms are a type of malware distinguished by their ability to self-replicate and spread autonomously through networks, without the need to attach themselves to executable files. This characteristic makes them particularly dangerous as they can quickly infect many devices. They spread through e-mail, instant messages, file sharing and compromised websites, [...]

News

What is cyber security? A necessary introduction

Cyber security protects computer systems from threats such as ransomware attacks and data breaches, ensuring the security of information.

Guides

Whaling: spear phishing of the “big fish”

Whaling, or phishing whaling, is an insidious cyber threat that focuses on specific targets, the ‘big fish’. Unlike traditional phishing, which indiscriminately targets many people, whaling targets high-profile individuals within an organisation, such as executives and CEOs.

News

WPA encryption: security and protection of wireless networks

Wi-Fi Protected Access (WPA) encryption and its evolution WPA2 are fundamental security protocols to protect wireless networks. WPA replaced the less secure WEP protocol by introducing dynamic encryption keys that change regularly, making it difficult for hackers to intercept communications. WPA2 further improved security by adopting the AES (Advanced Encryption [...]

News

What is the European Union Agency for Cybersecurity?

The European Union Agency for Cybersecurity (ENISA), founded in 2004 and based in Athens, is an essential body for cybersecurity in the European Union. Its task is to raise the levels of network and information security in the member states. ENISA works with national cybersecurity authorities, EU institutions and other [...]

Guides

Smart speakers and security: how and where to position them

Smart speakers such as Amazon Echo, Google Home, and Apple HomePod are becoming increasingly popular for their voice recognition capabilities and integration with streaming services. It is essential to position them correctly to maximize audio quality and security. Strategic placement ensures effective voice recognition and protects the Wi-Fi network and [...]

News

Chief Information Security Officer (CISO): who they are and what they do

The Chief Information Security Officer (CISO) is a crucial figure within companies, responsible for cybersecurity. His or her main job is to protect sensitive data and develop strategies to combat cyber threats and ensure system resilience. The CISO must possess advanced technical skills, a deep understanding of cyber threats, and [...]

News

AES Encryption: what it is and how it works 

AES (Advanced Encryption Standard) is a symmetric block encryption algorithm developed by Belgian cryptographers Joan Daemen and Vincent Rijmen and adopted in 2001 by the US National Institute of Standards and Technology (NIST) as the successor to DES (Data Encryption Standard). This algorithm, widely used in areas ranging from military [...]

To top