
Operational Continuity and Resilience
One of the most discussed aspects related to data breaches and regulatory compliance is certainly that of business continuity; let’s try to learn more about it and get a good

One of the most discussed aspects related to data breaches and regulatory compliance is certainly that of business continuity; let’s try to learn more about it and get a good

Following the splendid DigEat Festival, organised by Digitalaw Srl in Lecce on 27-29 November, we feel it is useful to take a closer look at some of the topics discussed

Digital healthcare is still an absolutely critical element, also due to a non-federalised and heterogeneous organisation between regions. It is often the patients who suffer, but sometimes also the doctors.

The European Commission is to evaluate a proposal to reduce child abuse through mechanisms to control material on users’ devices. This initiative has raised a number of controversies and comments

Let us talk about e-mail and, in particular, ordinary e-mail and its reliability. Today we are talking about the reliability of a service that allows billions of messages to be

The ransomware threat has existed for more than ten years and in that time has developed into an increasingly sophisticated application logic that is difficult to detect and counter. Recently,

The relationship between data breach and the supply chain is often underestimated despite the fact that, for more than a decade, best practices have established useful methods and approaches to

On 19 December 2024, the National Cybersecurity Agency (NCA) published a document entitled‘Ransomware. Characteristics, preparation and response to ransomware attacks‘ with the aim of defining good practice for managing and

This summer was characterised by a number of quite interesting data breaches, including those against some Italian hotels.

The purpose of this article is to reflect on some aspects of artificial intelligence including prompting, i.e. the ability to correctly ask the artificial intelligence algorithm a question in order

On 31 July 2025, the data breach against the well-known company ACEA S.p.A. was published by the World Leaks group. The published data are many and would amount to some

We are approaching the summer period, an optimal time to draw some conclusions related to this first part of 2025, with a critical and never trivial look.

The Holy League is a cybergang involved in many socially motivated offensives: the main purpose of the Holy League is to protect certain Christian values. The Holy League is supposedly

The Sylhet Gang collective (also SG) has been involved in numerous cyber offensives such as the famous #OpIsrael and the even more famous #OpFreePalestine. It has very clear pro-Palestinian connotations

This is a fact sheet on the collective called Mr Hamza, which has been involved in numerous cyber attacks, including in collaboration with DieNet, discussed here.

The protracted war between Israel and Iran has also been characterised, predictably, by actions carried out on the cyber level. Let us try to delve into some of them in

The Municipality of Pisa was subject to a data breach by the NOVA collective. Let us try to understand what happened and the consequences of this action.

If you want, you can call it that, because in recent years it can be said that anything has become‘cyber‘; with the help of market opportunities and the ‘fashion’ of

As anyone interested in technology is well aware by now, there is a serious competitiveness problem in Europe compared to countries such as the U.S. and China. In Italy, in

NIS 2 came into force in Italy on 16 October 2024, following transposition through Legislative Decree No. 138 of 4 September 2024, published in the Official Gazette on 1 October

A few months after the entry into force of NIS 2, security shortcomings continue to be found in many commercial sectors that are impacted by the European Directive and beyond;

The purpose of this article is to reflect on how artificial intelligence can be used in a war context and subsequently introduced into a civil operational environment.

The purpose of this article is to suggest a simple and functional approach to cataloguing the risks arising from the implementation of artificial intelligence within organisations.

The purpose of this article is to show the evolution of ISO 27005, to present a compatible and alternative methodological paradigm for cyber risk management, and to observe some of

Italy is facing an increasing number of cyber threats both in quantity and complexity, yet there seems to be no equally effective evolution in terms of cybersecurity. Let us try

The European Union has an IT incident analysis tool called CIRAS. Let’s take a look at this not always well known tool.

In these hours stadium choruses are rising on social networks for and against the self-styled agreement with Elon Musk’s Space X company, wanted by Prime Minister Giorgia Meloni.

Welcome to the ‘Cyber Anti-Sec’ security report covering the year 2024, in which the most relevant data, trends and data breaches will be analysed.

AIAD is the Federation, member of Confindustria, representing Italian Aerospace, Defence and Security Companies.

The company INPS Servizi S.p.A. was the subject of a data breach by the LYNX collective, with data exfiltration and interruption of services. Let’s find out more.