Skip to content

Blog

Cybersecurity in the enterprise:
everything you need to know

Blog post
  • TAGS

infostealers

While ransomware tends to dominate headlines, a quieter class of malware has taken centre stage in 2024: infostealers. Lightweight and insidious, these malware variants are designed not to destroy systems,…

digital twin

As the digital transformation of critical infrastructure accelerates, organizations across industries are facing a growing challenge: how to protect increasingly complex, interconnected cyber-physical environments from persistent and sophisticated cyber threats.…

observability

In cybersecurity, visibility is the starting line - not the finish. And as enterprise infrastructures sprawl across cloud, on-prem, remote, and hybrid domains, traditional monitoring systems, though still essential, are…

Crisis Management

According to the Clusit 2025 Report, 2024 marked a record year for cybercrime, with 3,541 reported cyberattacks worldwide. Italy was among the top targets, accounting for 10% of global attacks.…

5 minuti
cybersecurity trends

As we move into cybersecurity trends 2025, the landscape will reach unprecedented levels of complexity. Advanced technologies such as Artificial Intelligence (AI) and automation will take center stage - not…

5 minuti
SIEM Cybersecurity

The rapidly evolving nature of cybersecurity threats challenges organizations to adopt advanced tools to protect their data and infrastructure. Security Information and Event Management (SIEM) systems are at the forefront,…

6 minutes
cybersecurity roadmap transportation

The transportation sector is undergoing a digital transformation, integrating advanced technologies and smart systems to optimize roadways, railways, maritime routes, and air traffic. However, this increased connectivity comes with heightened…

5 minutes
OT Vulnerabilities

Cyber threats to OT systems are escalating at an alarming rate, with nearly 73% of organizations reporting an intrusion impacting either OT alone or both OT and IT systems in…

3 minutes
cybersecurity in energy

As the world moves toward greater reliance on renewable energy, Italy is setting an example. In 2024, for the first time, solar and wind power supplied 43.8% of the country's…

4 minutes
cybersecurity in manufacturing

Cybersecurity in manufacturing is critical as OT and supply chains are targeted. In 2023, manufacturing was the most attacked sector worldwide. In fact, manufacturing was the most targeted sector globally…

4 minutes
ai in secops

Imagine a typical Security Operations Center – teams of analysts concentrated on screens, working to sort through countless alerts, struggling to stay ahead of potential threats. It is a race…

3 minutes
cybersecurity in healthcare

As the healthcare industry becomes increasingly digital, the importance of robust cybersecurity measures cannot be overstated. The sector's vulnerability to cybercrime, including ransomware and supply chain attacks, has escalated significantly…

4 minutes
iot cybersecurity

The Internet of Things (IoT) is transforming how we live, work, and interact with our environment. From smart homes and connected vehicles to industrial automation and healthcare monitoring, IoT devices…

4 minutes
5G and cybersecurity

The arrival of 5G technology marks a new era of connectivity, bringing with it promises of lightning-fast internet speeds, seamless communication and transformative advancements across various sectors. By 2025, 5G…

4 minutes
supply chain cybersecurity

In today’s interconnected digital landscape, organizations rely on complex supplier networks - making strong supply chain cybersecurity essential to prevent critical risks. A recent report from the World Economic Forum[1]…

3 minutes
deepfake

In an era where digital manipulation is predominant, the rise of deepfake technology has created a new frontier of deception. Deepfakes blur the lines between reality and fiction with unprecedented…

3 minutes
ransomware attacks in healthcare

In 2023, the healthcare industry was ranked as the fourth most impacted by successful and publicly disclosed cyber-attacks[1], falling behind Manufacturing, Professional/Scientific/Technical, and ICT industries. Accounting for 9% of the…

5 minutes
cybersecurity career

In today's digitally driven world, the demand for cybersecurity professionals is higher than ever, and this urgent need is underscored by projections indicating a potential shortfall of approximately 3.5 million…

4 minutes
cyber resilience act

By 2030, it is estimated that there will be over 29 billion connected devices worldwide (source: Statista). Inevitably, these devices will need to be as secure as possible to avoid…

2 minutes
quantum computing cryptography

Quantum computing represents a transformative breakthrough in computational science, harnessing the principles of quantum mechanics to perform calculations at speeds that were previously thought to be impossible. Its proficiency in…

4 minutes
supply chain cybersecurity

In the not-so-distant past, enterprises operated within the confines of a distinct perimeter that delineated a secure, trusted zone from an external, unprotected one. However, the contemporary business landscape tells…

3 minutes
new machinery regulation

The OT sector is undergoing a profound transformation driven by key trends that promise to reshape the industry's landscape, such as the increase in machine connectivity, the growing prevalence of…

2 minutes
penetration tester

In the ever-evolving landscape of cybersecurity, the role of a Penetration Tester has become paramount. According to the European Union Agency for Cybersecurity, these professionals play a crucial role in…

3 minutes
cybersecurity roles

Cybersecurity is gradually becoming more complex, which leads to an increase in responsibilities and, therefore, cybersecurity functions in organizations. Recently, the European Union Cybersecurity Agency (ENISA) published a classification report,…

7 minutes
penetration test on a PLC

A Penetration Test on a PLC highlights how protecting an ICS environment is not trivial, as these systems weren’t designed to resist cyber attacks. This means that you have to somehow integrate…

3 minutes
cybersecurity for smb

In 2025, small and midsize businesses (SMBs) are facing a cybersecurity crossroads. The rapidly evolving threat landscape, combined with economic uncertainty and increasingly complex IT environments, is challenging traditional approaches…

1 minute
digital forensics

The rise of cybercrime poses significant threats to individuals, organisations, and nations. Amidst this digital battleground, Digital Forensics Investigators employ their expertise to expose the truth hidden within the digital…

3 minutes
differences between OT e IT

Before diving into Google Dorks, let’s take a step back and understand why Google is such a powerful tool for information discovery. It is estimated that Google has stored more…

4 minutes
differences between OT e IT

For those coming from IT, securing ICS systems can be frustrating at the beginning. This is because the technologies used and the ways of working are very different when it…

3 minutes
cybersecurity risk manager

In today's hyper-connected world, where technology fuels every aspect of our lives, the need for robust cybersecurity measures has never been more critical . Businesses, governments, and individuals are increasingly…

3 minutes
cybersecurity researchers

As the digital landscape becomes increasingly complex and interconnected, the demand for individuals who specialise in fortifying the digital world against evolving cyber threats has skyrocketed. This is where the…

4 ways to steal money from your corporate account

Robbers with guns and masks carrying cash out of an office window are heroes of old movies. Modern criminals conduct remote cyber-attacks to steal money. It can take them just…

phishing attacks

There is something in common between cyber-attacks targeting companies. Most of them are phishing attacks, starting silently with a carefully crafted spear phishing email. Though the messages look quite ordinary,…

manipulation of human emotions

Manipulation of human emotions is one of the most powerful tools in a cybercriminal’s arsenal - especially when it comes to phishing attacks. By exploiting fear, urgency, curiosity, or trust,…

VPN

Talking about VPN or Virtual Private Network, without using technical terms and providing useful information even to non-professionals, is not an easy thing. Often these definitions are used to describe…

public wi-fi

Working on the go is increasingly common. Whether traveling for business, meeting clients, or simply working remotely, professionals often find themselves needing to connect quickly to the internet. In many…

rooting and jailbreaking

Rooting and Jailbreaking – you have certainly heard these two words present on blogs dedicated to Android and iPhone. In this article we will find out what they mean. We…

lock screen

Smartphones are an essential part of modern life, storing everything from private conversations and photos to sensitive business information and banking credentials. For this reason, setting up a secure lock…

shoulder surfing

Working in public places, such as airports, restaurants and bars, large offices, and spaces dedicated to smart working presents a series of security risks. It requires some measure adoption to…

carbanak

According to multiple estimations Carbanak has generated around 1 billion dollars by hitting banks worldwide. It was mainly attacking companies in Europe, the United States, and China between 2013 and…

tailgating and piggybacking

Tailgating and Piggybacking are two social engineering practices. They exploit the human factor to violate areas reserved for authorized personnel. It brings consequent risk for security of both physical and…

gdpr easy guide

The General Data Protection Regulation (GDPR) – Regulation 2016/679 – came into full force on May 25, 2018, revolutionizing how organizations handle personal data across the European Union. In this…

Back To Top