Loading...
Sicurezza delle reti e dei sistemi

Governance

NIS Cooperation Group: what it is and how it works 

20 December 2024

The NIS Cooperation Group, established under Article 14 of Directive (EU) 2022/2555, serves as a strategic tool to promote network and system security across the European Union.  Formed with the aim of facilitating strategic cooperation and information exchange among Member…
Le pubbliche amministrazioni nell'ambito NIS

Governance

Sectoral NIS authorities: functions and competencies 

20 December 2024

Sectoral NIS authorities play a fundamental role in protecting critical infrastructures and ensuring digital resilience in an era of increasing cyber threats.  With the adoption of Legislative Decree No. 138 of September 4, 2024, Italy aligned itself with the European…
The country's digital protection

Governance

NIS 2 Directive and the National Cyber Security Strategy

20 December 2024

The 2022-2026 National Cyber security Strategy is a cornerstone for Italy's cyber resilience and digital protection. The objectives of the national cyber security strategy include: :  Ensuring a high level of security for critical infrastructures, protecting strategic sectors such as…
NIS Directive to NIS 2

Governance

ACN: National Competent Authority for NIS 2 in Italy 

20 December 2024

The growing complexity of networks and IT systems requires a coordinated approach to network security at both national and international levels.  With the introduction of the EU Directive 2022/2555, also known as NIS 2, European Union member states are tasked…

Most Viewed

Latest Posts

Guides

End-to-end encryption: what it is and how it works 

End-to-end encryption has become one of the most effective solutions for protecting the privacy of online communications. But what exactly does end-to-end encryption mean, and why is it so important? This article explores in detail how this technology works, its benefits, and how it is used in everyday applications such [...]

Guides

NFC and security: protecting contactless payments 

NFC (Near Field Communication) is a technology that has revolutionized digital payments by enabling quick and contactless transactions by bringing two compatible devices close together. However, despite its convenience, this technology raises significant cybersecurity issues that must be carefully considered to protect users' sensitive data. NFC is a short-range communication technology [...]

Guides

Antivirus quarantine: what it is and what it’s for? 

Antivirus quarantine is a fundamental function in computing, but many users do not fully understand its purpose and how to use it correctly. This article will explain in detail what antivirus quarantine is, how it works, and why it is essential for protecting your system. Antivirus quarantine is a function designed [...]

News

Non-repudiation of data: A key aspect of cyber security

In the realm of cyber security, one of the fundamental aspects of protecting information is the concept of non-repudiation of data. This often-overlooked concept plays a crucial role in ensuring that none of the parties involved in an electronic transaction can deny having carried it out. But what exactly is [...]

News

The dangers of social network poisoning

Social networks have become a fundamental part of our daily lives. However, the growing use of social networks has also led to the emergence of new cyber security threats, one of which is social network poisoning. But what exactly is social network poisoning, and why does it pose such a [...]

News

History of the phreakers: phone phreaking and hacking

In the vast world of cyber security, there is a figure that left an indelible mark: the phreaker. But who are the phreakers, and why have they played such a significant role in the history of telecommunications? The term "phreaker" comes from the combination of “phone” and “hacker,” and is [...]

News

Network topology and cyber security 

The topology of a network is nothing more than the physical and logical arrangement of the nodes and links that form a network. It defines the structure of the connections between the various devices in a computer network, such as computers, servers and other nodes. This structure can be organised [...]

News

Polymorphic malware: an evolving threat

Polymorphic malware represents one of the most sophisticated and insidious cyber threats in the field of computer security. This type of malware is particularly dangerous because it is able to modify its code dynamically. This makes it difficult, if not impossible, for traditional anti-malware programmes to detect it. But what [...]

News

IT security protection: what it is and how to defend data 

IT security, practically synonymous with cyber security, has become a crucial element for the protection of personal and corporate data.  In simple terms, it refers to the set of measures and practices designed to safeguard computer systems and sensitive information from unauthorized access, damage, or attacks by cyber criminals.  With the rise [...]

News

Eavesdropping: what it is and what it does 

The term "eavesdropping" may not be widely known, but it plays a crucial role in the realm of cyber security.  But what is eavesdropping? In short, it is a cyber attack where a malicious actor intercepts communications between two or more parties, often without them noticing. Eavesdropping (a translation of [...]

News

GPS spoofing: what it is and how to protect yourself 

GPS spoofing is a growing threat in the world of computer security, capable of causing serious problems for both individuals and organizations. But what is GPS spoofing and how can we protect ourselves from it? It is the practice of sending false GPS signals (GPS spoofing) to a GPS receiver, [...]

News

Stakeholder attack on a network: what it is and how to defend yourself against it 

A new type of attack is emerging among cyber threats: the stakeholder attack on a network. n stakeholder attack occurs when one of the stakeholders voluntarily or involuntarily facilitates an intrusion into an organization's computer systems. Unlike traditional cyber attacks, which often come from cyber criminals outside the company, in [...]

To top