News & Events

Threats 2025: How to Defend Against Malicious Digital Twins

14 May , 2025  |  News & Events, News & Events

Digital twins are highly accurate virtual models of real objects, processes, or people. Initially created to improve efficiency in areas such as industrial production, automation, and predictive maintenance, digital twins have become one of the most promising innovations in the IT field over the past decade. They enable advanced simulations, real-time monitoring, and data-driven decisions, leading to unprecedented operational efficiency.

Encryption Backdoors: A Cybersecurity Dilemma

27 Mar , 2025  |  News & Events, News & Events

After Chat GPT, Gemini, Copilot, and Claude, the advent of DeepSeek—a chatbot AI developed by the Chinese startup of the same name—marks a new chapter in the global competition on artificial intelligence. Generative AI is revolutionizing the business world, improving internal communication, optimizing workflows, and automating repetitive tasks and complex analyses

DeepSeek and the New Generative AI: How to Best Utilize Them in Business While Keeping Data Secure

24 Mar , 2025  |  News & Events, News & Events

The DORA regulation (Digital Operational Resilience Act) is a fundamental step in strengthening cybersecurity and operational resilience for financial institutions in Europe. In an increasingly digital world, the financial sector is at the heart of a technological transformation that, while offering new opportunities, also exponentially increases digital risks

DORA Regulation: What It Is, Where It Applies, and How Boolebox Can Help Businesses Achieve Compliance

20 Jan , 2025  |  News & Events, News & Events

The DORA regulation (Digital Operational Resilience Act) is a fundamental step in strengthening cybersecurity and operational resilience for financial institutions in Europe. In an increasingly digital world, the financial sector is at the heart of a technological transformation that, while offering new opportunities, also exponentially increases digital risks

How to protect intellectual property, technical & commercial capital in business offers

4 Nov , 2024  |  News & Events

If you are a freelancer, run a business, or hold a commercial role, you know how crucial the formulation of offers, project presentations, and negotiation of agreements are to securing new clients. These are delicate phases that require precision and foresight: your company must be able to translate its know-how and project vision into a clear, competitive, and personalized offer. The formulation of a quotation often results from days, if not weeks, of technical work, design, strategic analysis, and the combination of multidisciplinary skills. It is a process that can involve various professionals and entails the creation of complex and valuable documents.

Dossiering: Implications and Prospects for Businesses

29 Oct , 2024  |  Highlights, News & Events

With the implementation of the NIS 2 directive, the European Union raises the bar for cybersecurity. This regulation extends and strengthens the previous NIS directive, ensuring a common and advanced level of cybersecurity across member states, involving a broader range of companies compared to the previous regulation. This change was necessary to address increasingly complex threats in the digital landscape, especially for critical infrastructures and companies operating in key sectors such as energy, transport, and healthcare.

NIS 2: how to join the new European cybersecurity standard

18 Oct , 2024  |  News & Events, News & Events

With the implementation of the NIS 2 directive, the European Union raises the bar for cybersecurity. This regulation extends and strengthens the previous NIS directive, ensuring a common and advanced level of cybersecurity across member states, involving a broader range of companies compared to the previous regulation. This change was necessary to address increasingly complex threats in the digital landscape, especially for critical infrastructures and companies operating in key sectors such as energy, transport, and healthcare.

Corporate Cybersecurity Strategies: USA vs Europe Cybersecurity Comparison

9 Oct , 2024  |  News & Events

In an ever-evolving digital landscape, corporate cybersecurity strategies are crucial for the protection and competitiveness of businesses globally. With the increase in cyber threats and the growing complexity of international regulations, small, medium, and large companies must develop security strategies that are effective and compliant with various jurisdictions. However, the approach to cybersecurity varies significantly […]

Cybersecurity and Healthcare: Threats, Risks and Possible Solutions for an Industry Increasingly in Hackers’ Cross-hairs

19 Dec , 2023  |  News & Events

Healthcare was the most affected industry by cybercrime in 2022. This is confirmed by the Clusit 2023 report (Clusit is the Italian Association for IT Security): worldwide, attacks on healthcare accounted for 17% of the total from January to March 2023, compared to 12% in 2022. In particular, attacks on medical-hospital facilities have tripled in […]

How do freelancers or small companies without an IT department manage cybersecurity?

6 Jun , 2023  |  News & Events

Large companies have recently begun to incorporate dedicated departments and staff specialised in the prevention and management of cyber risks. But micro-enterprises, freelancers and SMEs still ignore or neglect IT security all too often. Yet according to the latest findings, these are precisely the preferred targets of cyber criminals. Read the article and find out how to defend yourself!

Two-factor authentication: an indispensable tool for data security, also within the company

30 May , 2023  |  News & Events

Two-factor authentication is one of the most effective security systems for protecting our accounts, whether private or corporate. However complex it may be, relying on a single password is no longer sufficient today for guaranteeing exclusive, secure access to web accounts, especially if they contain confidential or sensitive data. Strong authentication, indeed better known as […]