Loading...
The country's digital protection

Governance

NIS 2 Directive and the National Cyber Security Strategy

20 December 2024

The 2022-2026 National Cyber security Strategy is a cornerstone for Italy's cyber resilience and digital protection. The objectives of the national cyber security strategy include: :  Ensuring a high level of security for critical infrastructures, protecting strategic sectors such as…
NIS Directive to NIS 2

Governance

ACN: National Competent Authority for NIS 2 in Italy 

20 December 2024

The growing complexity of networks and IT systems requires a coordinated approach to network security at both national and international levels.  With the introduction of the EU Directive 2022/2555, also known as NIS 2, European Union member states are tasked…
L’agenzia per la cybersicurezza nazionale (ACN).

Governance

The Cyber Security Core: what it is and what it does 

20 December 2024

As often highlighted on this blog, cyber security is a strategic priority for the security of the Republic.  At the center of this protective network lies the Cyber Security Core, established within the National Cyber Security Agency (ACN).  It plays…
Protection from cyber threats

Governance

CSIRT: the heart of cyber security 

20 December 2024

CSIRT, an acronym for Computer Security Incident Response Team, is a critical entity in managing cyber security incidents and protecting against cyber threats. It is a specialized unit that intervenes in the event of cyber incidents, providing technical support, coordinating…

Most Viewed

Latest Posts

Guides

Tabnabbing: the invisible threat in cyber security 

In recent years, cyber security has become a central issue, particularly due to the rise in sophisticated phishing attacks. Recently, there have been numerous reports of attacks on popular platforms where hackers successfully extract users' sensitive data without them immediately realizing it.  Among these threats, tabnabbing has emerged—a sneaky form of [...]

Guides

Dossiering and cyber security: protection and prevention 

Dossiering and information security: how to protect and prevent illegal activities.  Recently, Italy has witnessed numerous cases of dossiering involving prominent figures, including politicians and VIPs. One of the most notable cases, the Perugia investigation into dossiering, has attracted the attention of the national anti-mafia directorate and the Milan prosecutor's office. [...]

Guides

Clone phishing: how to defend against this type of fraud 

Clone phishing is a sophisticated cyberattack that aims to compromise access credentials and other sensitive data of its victims. It is an advanced variant of traditional phishing attacks, where the cybercriminal almost identically replicates a previous phishing email or other legitimate communication, but changes links or attachments to trick the [...]

Guides

The complete guide to the NIS2 Directive 

The NIS2 Directive is part of the European Union's strategy to protect its digital infrastructure and enhance cyber security. Published as an evolution of the first NIS Directive from 2016, NIS2 sets even more ambitious goals and came into effect on January 17, 2023. In Italy, NIS2 took effect on October [...]

Guides

Money muling: risks and scams related to money laundering 

Money muling is becoming increasingly common in cyber fraud and money laundering. But what exactly is money muling? Money muling refers to an illegal activity where a person, called a "money mule," agrees to transfer or deposit funds on behalf of others, often unaware they’re participating in criminal activity. In practice, [...]

News

Quishing: the dangers of phishing via QR codes 

In recent years, with the rise of mobile devices, a new cyber threat has emerged: quishing. This term refers to a specific type of phishing that uses QR codes to deceive users, encouraging them to scan a fraudulent QR code that redirects them to malicious websites. What is quishing and how [...]

Guides

How to create a SPID: complete guide

Table of contents The SPID (Public System for Digital Identity) is a digital authentication system that allows Italian citizens to securely and quickly access online services offered by public administrations and participating private entities. With a digital identity, you can manage numerous activities without having to physically visit offices or [...]

Guides

How to verify the authenticity of a website: an essential guide

Table of contents In an increasingly digital world, knowing how to verify the authenticity of a website is essential for protecting your personal data and sensitive information. The threat of fraudulent websites is real, and thousands of people fall victim to online scams every day. However, by following the correct [...]

Guides

Defending against session fixation: guide and remedies 

Session fixation is a type of cyberattack that occurs when a malicious actor forces a session identifier (session ID) onto a user before they log into a web application. This technique allows the attacker to gain access to the user's session once the user has authenticated. Although it is often [...]

Guides

Protect yourself from ‘Man in the Browser’

The Man in the Browser (MITB) attack represents a sneaky and increasingly prevalent threat in the world of cyber security.This type of attack occurs within web browsers, where a malicious actor manages to compromise the web pages viewed by the user, altering them without the user realizing it. The primary [...]

Guides

Security in peer-to-peer connections: advantages and risks 

Peer-to-peer connections (often abbreviated as P2P) represent a type of network in which computers, known as nodes, communicate directly with each other without the need for a central server. This distributed model offers numerous advantages but also presents some challenges, especially in terms of security.  The peer-to-peer model is different [...]

Guides

Defending web sessions: how to avoid session hijacking 

Session hijacking is one of the most insidious threats in the world of cybersecurity. This type of attack allows a malicious actor to take control of a user's web session, granting unauthorized access to sensitive data and restricted functionalities of a website or application. Session hijacking is particularly concerning for [...]

To top