All posts by Tancredi Gentili

Cyberattacks: a matter of war or disruption?

Cyberattacks: a matter of war or disruption?

Cyberattacks are a threat to national security. However, describing them as war is highly problematic. Critics of this stance often argue that armed conflict has been becoming virtual. They say that violence in post-modern conflicts has decreased, replaced by other forms of violence such as cyberattacks. However, war is a distinct activity with a particular nature. It is organized violence carried out by political units. Most cyberattacks are a type of non-military activity that falls under the broad banner of “strategy” or “grand strategy.” In other words, when sponsored by states, they may serve military activity as much as diplomacy does. Cyberspace is the fifth domain of conflict, entirely constructed […]

Smartworking: how to mitigate cyber risks

Smartworking: how to mitigate cyber risks

Smartworking is a  fertile ground for cyber threats and criminals. As steps to counter the coronavirus outbreak take effect, millions of workers across the globe have been sent home with their laptops many times. Cybercrime is a silent actor that attempts to exploit the vulnerabilities of remote working. Indeed, remote workers can potentially present a number of cybersecurity risks to organizations, and cybercriminals are finding more ways to exploit these weaknesses. With remote work, indeed, attack surfaces are be multiplied. As users we should not never let the guard down. A combination of procedures, tips, precautions, and training could mitigate risks to a great extent.   Read more on our […]

Erecting an IT fortress: strategies for resilience

Erecting an IT fortress: strategies for resilience

Erecting an IT fortress is an urgent need these days. Facing the surge in cyber-attacks of these times, companies will need to adopt new strategies, procedures and technologies to become more resilient to the onslaught of cybercrimes. The pandemic has shown how vulnerable many organizations are to organized malicious actors. Meanwhile, the increasing weight of digital transformation has increased the number and the extent of disruption that could occur. Indeed, being IT-resilient means keeping to a minimum any type of disruption and downtime and ensuring service continuity. Looking for an increased resilience, IT teams are re-evaluating their shortcomings and processes when it comes to building their organizations’ security infrastructure. Approaches […]

Cybercrime: how can we all deal with it?

Cybercrime: how can we all deal with it?

One of the biggest dilemmas in cybersecurity is the following: “Can we avoid cybercrime?” After all, online identity theft and fraud, hackers, ransomware cyber-attacks, phishing, and other scams are a threat to all of us. However, there is no Manichean answer to question. As businesses, leaders, individuals, entrepreneurs, and #security experts, we cannot stop cyber threats forever, even if united. Surely, prevention and mitigation may help in tackling cybercrime. As the Telsy family would say, indeed, “security is not the absence of threats, it’s the ability to detect them and take action before it’s too late”. Worldwide, the malicious activity of cybercriminals costs organizations and individual internet users billions every […]

VPN: a must-have tool for privacy and security

VPN: a must-have tool for privacy and security

VPN (Virtual Private Network) service gives you online privacy, anonymity, and security by creating a private network from a public internet connection. By using it, businesses can securely connect users and assets to intranet resources VPNs are also an effective shield from all threats coming from connections that do not require a password for access such as public WiFi networks you connect to while standing in line for a coffee or waiting to see your doctor. Eavesdroppers can watch your activity when connected to these insecure networks. Indeed, VPNs mask your IP address so your online actions are virtually untraceable. Moreover, they establish secure and encrypted connections to provide greater […]

SOC: what it is and how it operates

SOC: what it is and how it operates

SOC or Security Operations Center – not to be confused with SoC (“System on a Chip) – is the core component of a serious business security strategy. Simply put, a SOC assures threat detection and prevention in real time and makes sure that the protection of the data of clients and users is always optimal. As professionals, managers, entrepreneurs, and internet users, we are not completely aware that the threat of malicious actors is skyrocketing nowadays. As actual fact, cyberattacks are increasingly damaging organizations. Every year billions of people suffer from cyberattacks and data leaks, too. A SOC may be expensive and many organizations do not go beyond their IT […]

Alan Turing: the life of the father of computing

Alan Turing: the life of the father of computing

Alan Turing is by consensus the father of modern computing. Are you using a laptop, a computer, a smartphone, or even set a network of IoT devices? Then you are using technologies made possible by the work, research, and insight of this young Fellow of the King’s College, University of Cambridge. Alan Turing is one of the world’s best-known mathematicians. By far, the most known in the past century. This is for his work on cracking German codes and the infamous Enigma Machine in World War II. But also for his arrest, conviction and punishment for homosexuality in the 1950s. This theoretical work was the basis for the later development […]

Bitcoin mining: What it is and how it works

Bitcoin mining: What it is and how it works

What does Bitcoin Mining mean? Bitcoin mining is the process of creating, or rather discovering, bitcoin currency. Unlike real-world money that is printed when more is needed, bitcoin cannot simply be willed into existence, but has to be mined through mathematical processes. Mining ensures the continuous reissue of Bitcoins like central banks do with paper currency. In general, to mine bitcoins, you need either a GPU (graphics processing unit) or an application-specific integrated circuit (ASIC) in order to set up a mining rig. Bitcoin mining: pros and cons However, it may be not that simple. First of all, you need a special computer to mine this cryptocurrency. Mining bitcoin concerns solving a […]

Anonymous: what to know about a worldwide hacking group

Anonymous: what to know about a worldwide hacking group

Anonymous is the most famous hacktivist group in the world. It gained international attention when it attacked the website of the Church of Scientology in 2008. As an informal group without a sanctioned hierarchy, it is difficult to explain what Anonymous is to the general public and to non-experts. The various hackers behind Anonymous worldwide are united in a belief that corporations and organizations they consider to be corrupt should be attacked. To do so, they use #DDoS attacks, as this is the most common method Anonymous uses to bring down the servers of their target. There is much more to talk about this group, however. Let’s us find out […]

Adriano Olivetti: Life of an innovator

Adriano Olivetti: Life of an innovator

A shroud and halo of myth surrounds the figure of Adriano Olivetti. He was one of  the most prominent figures in the Italian cultural and industrial panorama, the one reserved for the stories of excellence. An entrepreneur, a man of culture, patron, politician, social reformist, and innovator that saw the future and transformed his ideals into reality. Olivetti introduced new organizational methods and humanistic idealism fueled his entrepreneurial life, by implementing dramatic changes in Italian business and in industrial relations. But what makes him an icon to follow and admire still today? Read our blog below to find out, then! Who was Adriano Olivetti? Born in 1901, Adriano Olivetti was […]

Utilizzando il sito, accetti l'utilizzo dei cookie da parte nostra. maggiori informazioni

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close