Skip to content

Blog

Cybersecurity in the enterprise:
everything you need to know

Blog post
  • TAGS

arduino opta cyber resilience

Arduino is a world leader in open-source hardware and software, with millions of developers worldwide. The Arduino ecosystem has been chosen for IoT, Industry 4.0, AI and ML projects on…

3 minutes
cyber resilience act

By 2030, it is estimated that there will be over 29 billion connected devices worldwide (source: Statista). Inevitably, these devices will need to be as secure as possible to avoid…

2 minutes
quantum computing cryptography

Quantum computing represents a transformative breakthrough in computational science, harnessing the principles of quantum mechanics to perform calculations at speeds that were previously thought to be impossible. Its proficiency in…

4 minutes
SASE

In the not-so-distant past, enterprises operated within the confines of a distinct perimeter that delineated a secure, trusted zone from an external, unprotected one. But now, it's SASE time! However,…

3 minutes
cybersecurity predictions 2024

In the initial half of 2023, Italy experienced a concerning surge in successful cyber-attacks, witnessing a 40% increase compared to the corresponding period in the previous year. This negative scenario,…

4 minutes
partnership Vilnius tech_500x500

The partnership between HWG Sababa and Vilnius Gediminas Technical University (VILNIUS TECH) - an important research centre in the field of computer engineering with a strong presence in the cybersecurity…

3 minutes
new machinery regulation

The OT sector is undergoing a profound transformation driven by key trends that promise to reshape the industry's landscape, such as the increase in machine connectivity, the growing prevalence of…

2 minutes
penetration tester

In the ever-evolving landscape of cybersecurity, the role of a Penetration Tester has become paramount. According to the European Union Agency for Cybersecurity, these professionals play a crucial role in…

3 minutes
cybersecurity roles

Cybersecurity is gradually becoming more complex, which leads to an increase in responsibilities and, therefore, cybersecurity functions in organizations. Recently, the European Union Cybersecurity Agency (ENISA) published a classification report,…

7 minutes
penetration test on a PLC

A Penetration Test on a PLC highlights how protecting an ICS environment is not trivial, as these systems weren’t designed to resist cyber attacks. This means that you have to somehow integrate…

3 minutes
Back To Top