Telsy
    To search, type something and press "enter"
    • About Us
    • Solutions
      • Go to Solutions
      • Cyber
      • Crypto
      • Quantum
    • Innovation
    • Careers
    • Blog
    • Featured News
      • 09 Mar

        Iranian conflict and cyber warfare, attacks in Italy, LeakBase and Tycoon 2FA disrupted

      • 27 Feb

        Latest from Italy, updates in the APT landscape, multiple vulnerabilities exploited ITW

    Iranian conflict and cyber warfare, attacks in Italy, LeakBase and Tycoon 2FA disrupted

    Latest from Italy, updates in the APT landscape, multiple vulnerabilities exploited ITW

    View all
    • English
    • Italiano
    Secure communications: end-to-end encryption (E2EE)
    28 Oct

    End-to-end encryption is a message encryption method based on asymmetric encryption algorithms and the decentralization of cryptographic keys. Is an encrypted communication system in which only people who are communicating...

    Read more
    Cryptophones: what they are and how they work
    05 Sep

    The issue of mobile communication security highlights one of the weak links in the security chain of organizations. It is often the behavior of individual employees, not necessarily malicious but...

    Read more
    Find out more
    About us
    Solutions
    Careers
    Blog
    Governance
    Privacy Policy
    Cookie Policy
    Comment Policy
    Whistleblowing
    Accessibility
    GDPR Information Notice
    Courtesy page
    Operational Offices

    Turin
    Corso Svizzera, 185, 10149

    Rome
    Via Bartolomeo Marliano, 27, 00162
    Via Antonio Nibby, 4-6, 00161

    Naples
    Centro Direzionale, Isola F6, 80143

    Orvieto
    Via delle Acacie, 17, 05018 Ciconia (TR)

    Contacts

    Phone
    +39 011 77 14 343

    Mail
    contact@telsy.it

    Follow us
    Telsy Gruppo TIM 1
    CO2 Green Label Telsy TIM
    © 2022 Telsy SpA company with a single shareholder TIM Group • VAT 00737690016 • REA TO443365