News & Events

Corporate Cybersecurity Strategies: USA vs Europe Cybersecurity Comparison

25 Nov , 2024  |  News & Events

In an ever-evolving digital landscape, corporate cybersecurity strategies are crucial for the protection and competitiveness of businesses globally. With the increase in cyber threats and the growing complexity of international regulations, small, medium, and large companies must develop security strategies that are effective and compliant with various jurisdictions. However, the approach to cybersecurity varies significantly […]

How to protect intellectual property, technical & commercial capital in business offers

6 Nov , 2024  |  News & Events

If you are a freelancer, run a business, or hold a commercial role, you know how crucial the formulation of offers, project presentations, and negotiation of agreements are to securing new clients. These are delicate phases that require precision and foresight: your company must be able to translate its know-how and project vision into a clear, competitive, and personalized offer. The formulation of a quotation often results from days, if not weeks, of technical work, design, strategic analysis, and the combination of multidisciplinary skills. It is a process that can involve various professionals and entails the creation of complex and valuable documents.

Dossiering: Implications and Prospects for Businesses

29 Oct , 2024  |  Highlights, News & Events

With the implementation of the NIS 2 directive, the European Union raises the bar for cybersecurity. This regulation extends and strengthens the previous NIS directive, ensuring a common and advanced level of cybersecurity across member states, involving a broader range of companies compared to the previous regulation. This change was necessary to address increasingly complex threats in the digital landscape, especially for critical infrastructures and companies operating in key sectors such as energy, transport, and healthcare.

NIS 2: how to join the new European cybersecurity standard

18 Oct , 2024  |  News & Events

With the implementation of the NIS 2 directive, the European Union raises the bar for cybersecurity. This regulation extends and strengthens the previous NIS directive, ensuring a common and advanced level of cybersecurity across member states, involving a broader range of companies compared to the previous regulation. This change was necessary to address increasingly complex threats in the digital landscape, especially for critical infrastructures and companies operating in key sectors such as energy, transport, and healthcare.

Cybersecurity and Healthcare: Threats, Risks and Possible Solutions for an Industry Increasingly in Hackers’ Cross-hairs

19 Dec , 2023  |  News & Events

Healthcare was the most affected industry by cybercrime in 2022. This is confirmed by the Clusit 2023 report (Clusit is the Italian Association for IT Security): worldwide, attacks on healthcare accounted for 17% of the total from January to March 2023, compared to 12% in 2022. In particular, attacks on medical-hospital facilities have tripled in […]

How do freelancers or small companies without an IT department manage cybersecurity?

6 Jun , 2023  |  News & Events

Large companies have recently begun to incorporate dedicated departments and staff specialised in the prevention and management of cyber risks. But micro-enterprises, freelancers and SMEs still ignore or neglect IT security all too often. Yet according to the latest findings, these are precisely the preferred targets of cyber criminals. Read the article and find out how to defend yourself!

Two-factor authentication: an indispensable tool for data security, also within the company

30 May , 2023  |  News & Events

Two-factor authentication is one of the most effective security systems for protecting our accounts, whether private or corporate. However complex it may be, relying on a single password is no longer sufficient today for guaranteeing exclusive, secure access to web accounts, especially if they contain confidential or sensitive data. Strong authentication, indeed better known as […]