Monthly Archives: April 2021

Cyberattacks: a matter of war or disruption?

Cyberattacks: a matter of war or disruption?

Cyberattacks are a threat to national security. However, describing them as war is highly problematic. Critics of this stance often argue that armed conflict has been becoming virtual. They say that violence in post-modern conflicts has decreased, replaced by other forms of violence such as cyberattacks. However, war is a distinct activity with a particular nature. It is organized violence carried out by political units. Most cyberattacks are a type of non-military activity that falls under the broad banner of “strategy” or “grand strategy.” In other words, when sponsored by states, they may serve military activity as much as diplomacy does. Cyberspace is the fifth domain of conflict, entirely constructed […]

Smartworking: how to mitigate cyber risks

Smartworking: how to mitigate cyber risks

Smartworking is a  fertile ground for cyber threats and criminals. As steps to counter the coronavirus outbreak take effect, millions of workers across the globe have been sent home with their laptops many times. Cybercrime is a silent actor that attempts to exploit the vulnerabilities of remote working. Indeed, remote workers can potentially present a number of cybersecurity risks to organizations, and cybercriminals are finding more ways to exploit these weaknesses. With remote work, indeed, attack surfaces are be multiplied. As users we should not never let the guard down. A combination of procedures, tips, precautions, and training could mitigate risks to a great extent.   Read more on our […]

Erecting an IT fortress: strategies for resilience

Erecting an IT fortress: strategies for resilience

Erecting an IT fortress is an urgent need these days. Facing the surge in cyber-attacks of these times, companies will need to adopt new strategies, procedures and technologies to become more resilient to the onslaught of cybercrimes. The pandemic has shown how vulnerable many organizations are to organized malicious actors. Meanwhile, the increasing weight of digital transformation has increased the number and the extent of disruption that could occur. Indeed, being IT-resilient means keeping to a minimum any type of disruption and downtime and ensuring service continuity. Looking for an increased resilience, IT teams are re-evaluating their shortcomings and processes when it comes to building their organizations’ security infrastructure. Approaches […]

Utilizzando il sito, accetti l'utilizzo dei cookie da parte nostra. maggiori informazioni

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close