Eng English >
Log in >
Support >
Download >
Studies and research
Collaboration as an IT security tool12/06/2018

Collaboration as an IT security tool

With the right tools, the company is truly protected from cybercrime 

TAG: IT Security, Insider threat
Cybersecurity, virtuous relationship between public and private sector required11/18/2018

Cybersecurity, virtuous relationship between public and private sector required

Security cannot be tackled by a single actor 

 
Boom in Cyberattacks10/17/2018

Boom in Cyberattacks

According to the Clusit Report, these have been the worst first two quarters ever for cybersecurity 

TAG: Cybercrime report, Cyber Attack
Fewer workers, lower IT security09/26/2018

Fewer workers, lower IT security

Understaffing has an impact on corporate IT protection 

TAG: IT Security, Insider threats
The need for cybersecurity experts increases07/27/2018

 The need for cybersecurity experts increases

However, it is the company itself that needs to be ready to protect from external attacks 

TAG: IT Security, GDPR
Cybercrime situation increasingly alarming03/14/2018

Cybercrime situation increasingly alarming

This is confirmed by the data in the preview of the 2018 report by CLUSIT (Italian Cybersecurity Association) 

TAG: Cybercrime report, IT Security
Hackers hunt for flaws in corporate systems02/13/2018

Hackers hunt for flaws in corporate systems

Yet companies are not ready to heed the alarm 

TAG: Cyber Attack, IT Security
Threats unrecognized by security professionals 10/24/2017

Threats unrecognized by security professionals

1 in 4 professionals does not know how to protect their company  

TAG: Insider threats, IT Security
Employees hide information security breaches from their employers10/03/2017

 Employees hide information security breaches from their employers

46% of IT security breaches are employee-generated 

TAG: Cyber Attack, Insider threats
Hacker attacks, even professional firms are affected08/10/2017

Hacker attacks, even professional firms are affected

It's not just companies that experience theft of sensitive data 

TAG: Cyber Attack, IT Security
Manufacturers and the costs of ineffective security 07/21/2017

Manufacturers and the costs of ineffective security

The number of industrial organizations suffering IT attacks is constantly rising  

TAG: IT Security
Italian businesses after the darkest month for information security 07/06/2017

Italian businesses after the darkest month for information security

April 2017 – Alarming situation for Information Security in Italy  

TAG: IT Security, Cyber Attack
Wannacry – 5 hot topics to know about this cyber attack05/15/2017

Wannacry – 5 hot topics to know about this cyber attack

BooleBox hints on how to protect from cyber attacks 

TAG: Sensitive data protection, Cyber Attack
Chief Information Security Officer – An important representative for an organization05/12/2017

 Chief Information Security Officer – An important representative for an organization

Today such a representative is still missing for Information Security 

TAG: IT Security
IT Security, missing a corporate strategy04/28/2017

IT Security, missing a corporate strategy

A proper strategic plan to protect organizations from Cyber Attacks is still missing 

TAG: IT Security
Cybercrime and IT Security: the trends for 201704/07/2017

Cybercrime and IT Security: the trends for 2017

Analysts and researches are on the same page: 2016 has been the worst year in terms of cyber-attacks. How to be ready for a more secure 2017? 

TAG: Cybercrime report
Healthcare is under attack. Cyber criminals steal our medical information03/18/2017

Healthcare is under attack. Cyber criminals steal our medical information

In 2016 healthcare is the industry with more attacks registered with a 102% increase 

TAG: health and public, Sensitive data protection
IT risks: safeguarding is useful. But preventing is better02/14/2017 - Boole Server

IT risks: safeguarding is useful. But preventing is better

A cyber-attack can be the cause of serious damages, not only financially speaking, that should be avoided, adpting efficient data security solutions. 

TAG: Sensitive data protection, Cyber risk insurance
More productivity or more security? The “business mobility” matter01/27/2017 - Boole Server

 More productivity or more security? The “business mobility” matter

The possibility to access business information , everywhere and at any time, also from portable devices, is a priority. But risks should not be underestimated. 

TAG: Sensitive data protection, Insider threats, Business mobility
Corporate insiders are the major threat to a company data security12/23/2016 - Boole Server

Corporate insiders are the major threat to a company data security

1 out of 50 employees can be considered a potential source of attack on company data security, said a recent survey conducted by Imperva. 

TAG: Sensitive data protection, Insider threats
Cyberattacks: not only financial damages12/15/2016 - Boole Server

Cyberattacks: not only financial damages

The result of a recent study released by Rand Corp. risks to give out a wrong message in the world of cyber security.  

TAG: Sensitive data protection
Public Authorities: the computer security is a priority, but specialization lacks11/29/2016 - Boole Server

Public Authorities: the computer security is a priority, but specialization lacks

Even if the rules are forcing Companies to use outsourcing partners, nevertheless, only 1 PA out of 3 manages security with outsourcing partners.  

TAG: Sensitive data protection, Health and public
Lloyds Investigation: enterprises underestimates IT risks10/20/2016

Lloyds Investigation: enterprises underestimates IT risks

The security of sensitive data is still not a priority for many companies, particularly in the health and medical sector. 

TAG: Sensitive data protection, health and public
REQUEST INFO SIGN UP