NIS2 in Practice: An Operational Checklist to Comply Without Slowing Down the Business
Over the past few months, we’ve talked extensively about NIS2: what it requires, which sectors are affected, and why it represents a major shift in the way security is managed. The picture is now clear: the directive is no longer a topic reserved for specialists—it is a concrete requirement that impacts processes, suppliers, and management responsibilities
13 Apr

NIS2 in Practice: An Operational Checklist to Comply Without Slowing Down the Business
Over the past few months, we’ve talked extensively about NIS2: what it requires, which sectors are affected, and why it represents a major shift in the way security is managed. The picture is now clear: the directive is no longer a topic reserved for specialists—it is a concrete requirement that impacts processes, suppliers, and management responsibilities
13 Apr

Dossiering: Implications and Prospects for Businesses
The current investigation on dossiering has profoundly shaken the business world, revealing questionable practices that could have significant repercussions for companies. Dossiering, the collection and use of confidential information for unethical purposes, has become a central topic of discussion, raising questions about transparency and integrity in business. Context of the Investigation The investigation began with...
29 Oct

The Zero Trust Model: an increasingly common corporate cybersecurity approach
What is the Zero Trust model? It is an advanced corporate network protection strategy based, precisely, on the key principle of zero trust. With this approach, access to a company’s files, documents and – more generally – IT systems is only granted if deemed absolutely necessary. Each request is strictly authenticated, authorised and encrypted, even...
01 Aug

Cybersecurity in the United States: New Threats and New Strategies
The increasingly delicate geopolitical situation and technological innovations linked to the development of artificial intelligence have turned the spotlight back on the subject of cybersecurity in the United States too, and with urgency. Our company is based in Milan, but we have worked with customers all over the world for years. Among others, institutions of...
27 Feb

