Telsy
    • About Us
    • Solutions
      • Go to Solutions
      • Cyber
      • Crypto
      • Quantum
    • Innovation
    • Markets
    • Careers
    • Blog
    • Featured News
      • 27 Mar

        The Math Behind PQC: Learning With Errors

      • 20 Mar

        Security Awareness: how to avoid the dangers of cybersecurity with TelsySkills

    27 Mar

    The Math Behind PQC: Learning With Errors

    20 Mar

    Security Awareness: how to avoid the dangers of cybersecurity with TelsySkills

    View all
    • English
    • Italiano
    MARITIME CYBERSECURITY: SEAFUTURE 2021
    30 Aug

    In the last two decades, the cases of cyberattacks against Institutions have increased exponentially, so much so that they pose a real threat to the defense of the state and...

    Read more
    Cyber threats & economic intelligence: the deadly mix to national security
    28 Jun

    The ongoing exploit of emerging technologies to carry out cyberattacks is not just a matter concerning gangs of hackers and threat actors asking for ransoms, but also affects national security....

    Read more
    Machine Learning: why is vital for cybersecurity
    07 Jun

    Machine learning is becoming more vital than ever in today’s – and tomorrow’s -cybersecurity. Being a subset of AI, machine learning consists of the techniques that enable computers to figure...

    Read more
    Firmware security: why it matters
    31 May

    While securing other critical components of their infrastructure such as hardware and software, businesses often neglect firmware security. Being the basic core of all its hardware stuff, an organization is...

    Read more
    Cryptography: what is it and its uses
    21 Apr

    Cryptography, or crypto, refers to the technique of securing information and communications through codes. By doing so, only those people you send information holding the decoding key to can understand...

    Read more
    Cyberattacks: a matter of war or disruption?
    12 Apr

    Cyberattacks are a threat to national security. However, describing them as war is highly problematic. Critics of this stance often argue that armed conflict has been becoming virtual. They say...

    Read more
    Erecting an IT fortress: strategies for resilience
    05 Apr

    Erecting an IT fortress is an urgent need these days. Facing the surge in cyber-attacks of these times, companies will need to adopt new strategies, procedures, and technologies to become...

    Read more
    VPN: a must-have tool for privacy and security
    29 Mar

    VPN (Virtual Private Network) service gives you online privacy, anonymity, and security by creating a private network from a public internet connection. By using it, businesses can securely connect users...

    Read more
    SOC: what it is and how it operates
    24 Mar

    SOC or Security Operations Center – not to be confused with SoC (“System on a Chip) – is the core component of a serious business security strategy. Simply put, a...

    Read more
    Maze: a short story of one of the most dangerous cyberthreats
    03 Mar

    The Maze group has been one of the subtlest hacking groups in recent history. The maze was a hacking group targeting organizations worldwide across many industries. It has recently announced...

    Read more

    Posts navigation

    Older posts
    Find out more
    About us
    Solutions
    Careers
    Blog
    Governance
    Privacy Policy
    Comment Policy
    Operational Offices

    Turin
    Corso Svizzera, 185, 10149

    Rome
    Via del Pellegrino, 155, 00186
    Via Antonio Nibby, 4-6, 00161

    Naples
    Centro Direzionale, Isola F7, 80143

    Commercial Office

    Milan
    Via Gaetano Negri, 1, 20123

    Phone

    +39 011 77 14 343

    Follow us
    tim group
    tim group
    logo zero
    logo zero
    © 2021 Telsy SpA con unico socio Gruppo TIM • P.IVA 00737690016 • REA TO443365