Emergency Covid-19, smart working: train to digital awareness
The Coronavirus emergency has accelerated the use of remote work and study methods. The advantages offered by these new forms of activity are numerous but the risks related to IT security are often underestimated. During the Covid-19 emergency there was [...]
Island hopping: a new cybersecurity threats for Italian organizations
The mentioned recent survey executed by Opinion Matters on a sample of 2,000 firms about the cybersecurity in the Italian enterprises put the accent on the most common cyber threats. From the survey it results the most frequent cause of [...]
The pros and the cons of the democratization of cybersecurity: the need of a solid framework
We may wonder whether the increasingly popularity of cybersecurity is a benefit or a problem itself? Sometimes when awareness raises, there is also an increasing in considering a very serious discipline which impacts technical and legal issues as a mere [...]
A survey reports: increase of cyberattacks to Italian enterprises in the last 12 months
In the last 12 months the Italian enterprises have been targeted with a an increasing of cyberattacks both in terms of volumes and in terms of level of violation. As a consequence, the Italian enterprises, in order to mitigate cyber [...]
Year 2019 as the “The Year of Ransoming Governments” accordingly with “2020 Cybersecurity Outlook Report”
The recent “2020 Cybersecurity Outlook Report” published by VM Carbon Black focuses on new cybersecurity threats. The report includes an in-depth analysis of the various sources and forms of cyberattacks. A notable fact is the 2019 could be considered could [...]
Collateral Benefits and Advantages of conducting a PIA/DPIA?
When being faced with the necessity of conducting a privacy impact assessment / data processing impact assessment (PIA/DPIA), the first considerations are usually devoted to the potentially substantial effort involved.However, from an information security point of view, this might also [...]
The CS-AWARE system and dependency graph
One of the challenges of CS-AWARE was to be able to represent analysis results of socio-technical system and dependency analysis, which is highly depended on the individual organization that is analysed, in a structured and machine readable form so that [...]
Greeks are vulnerable to internet threats
It is difficult to underestimate the importance and role of the Internet in modern relationships - keeping in touch with friends and acquaintances, family friends or looking for romantic partners. While a whole new world of possibilities has opened up, [...]
COVID-19: The new reality in cybersecurity
Most companies do not have adequate security systems to support remote work and now have to face the new reality of COVID-19, which includes a wider range of attacks and less secure devices. Many companies also had to quickly adapt [...]