Skip to content

Blog

Cybersecurity in the enterprise:
everything you need to know

Blog post
  • TAGS

quantum computing cryptography

Quantum computing represents a transformative breakthrough in computational science, harnessing the principles of quantum mechanics to perform calculations at speeds that were previously thought to be impossible. Its proficiency in…

4 minutes
SASE 500x500

In the not-so-distant past, enterprises operated within the confines of a distinct perimeter that delineated a secure, trusted zone from an external, unprotected one. However, the contemporary business landscape tells…

3 minutes
cybersecurity predictions 2024

In the initial half of 2023, Italy experienced a concerning surge in successful cyber-attacks, witnessing a 40% increase compared to the corresponding period in the previous year. This negative scenario,…

4 minutes
partnership Vilnius tech_500x500

The partnership between HWG Sababa and Vilnius Gediminas Technical University (VILNIUS TECH) - an important research centre in the field of computer engineering with a strong presence in the cybersecurity…

3 minutes
New machinery regulation(500 x 500 px)

The OT sector is undergoing a profound transformation driven by key trends that promise to reshape the industry's landscape, such as the increase in machine connectivity, the growing prevalence of…

2 minutes
penetration tester

In the ever-evolving landscape of cybersecurity, the role of a Penetration Tester has become paramount. According to the European Union Agency for Cybersecurity, these professionals play a crucial role in…

3 minutes
cybersecurity roles

Cybersecurity is gradually becoming more complex, which leads to an increase in responsibilities and, therefore, cybersecurity functions in organizations. Recently, the European Union Cybersecurity Agency (ENISA) published a classification report,…

7 minutes
penetration test on a PLC

Protecting an ICS environment, including PLCs, is not trivial, as these systems are not designed to be resilient to cyber attacks. This means that you have to somehow integrate cybersecurity…

3 minutes
cybersecurity for small and midsize businesses

Small and midsize businesses (SMBs) require resilient and robust security strategies that seamlessly blend technology, services, and training to combat evolving cyber threats. However, the current economic challenges have imposed…

1 minute
Digital forensics investigators blog (2)

The rise of cybercrime poses significant threats to individuals, organisations, and nations. Amidst this digital battleground, Digital Forensics Investigators employ their expertise to expose the truth hidden within the digital…

3 minutes

Sign up for newsletter

    Marketing permissions
    Select all the ways you would like to receive information from HWG Sababa:


    I declare that I have read the privacy policy of HWG Sababa S.p.A. and I consent to the processing of my personal data for sending informative communications/newsletters by the same company.


    I agree to receive information and offers that may be of interest to me. In order to receive personalized communications, my preferences and behaviors and the use of HWG Sababa S.p.A. products and services will be analysed. The latter company can therefore contact me for promotional purposes at the e-mail address I have provided when filling this form.


    I consent to the forwarding of my data to independent third party data controllers, indicated in the privacy policy, for sending of their own promotional and marketing communications on their own or third party products and services.

    We use Salesforce as our marketing platform. By clicking below to sign up, you acknowledge that your information will be transferred to Salesforce for processing.

    Click here for more information about Salesforce's privacy policy.

    Back To Top