Blog

Data Protection: our mission, born from a deep awareness.

Cybersecurity best practises

NIS2 in Practice: An Operational Checklist to Comply Without Slowing Down the Business

Over the past few months, we’ve talked extensively about NIS2: what it requires, which sectors are affected, and why it represents a major shift in the way security is managed. The picture is now clear: the directive is no longer a topic reserved for specialists—it is a concrete requirement that impacts processes, suppliers, and management responsibilities

13 Apr

Highlights

Dossiering: Implications and Prospects for Businesses

The current investigation on dossiering has profoundly shaken the business world, revealing questionable practices that could have significant repercussions for companies. Dossiering, the collection and use of confidential information for unethical purposes, has become a central topic of discussion, raising questions about transparency and integrity in business. Context of the Investigation The investigation began with...

29 Oct

Highlights

The Zero Trust Model: an increasingly common corporate cybersecurity approach

What is the Zero Trust model? It is an advanced corporate network protection strategy based, precisely, on the key principle of zero trust. With this approach, access to a company’s files, documents and – more generally – IT systems is only granted if deemed absolutely necessary. Each request is strictly authenticated, authorised and encrypted, even...

01 Aug

Highlights

Cybersecurity in the United States: New Threats and New Strategies

The increasingly delicate geopolitical situation and technological innovations linked to the development of artificial intelligence have turned the spotlight back on the subject of cybersecurity in the United States too, and with urgency. Our company is based in Milan, but we have worked with customers all over the world for years. Among others, institutions of...

27 Feb