Telsy
    • About Us
    • Solutions
      • Go to Solutions
      • Cyber
      • Crypto
      • Quantum
    • Innovation
    • Markets
    • Careers
    • Blog
    • Featured News
      • 27 Mar

        The Math Behind PQC: Learning With Errors

      • 20 Mar

        Security Awareness: how to avoid the dangers of cybersecurity with TelsySkills

    27 Mar

    The Math Behind PQC: Learning With Errors

    20 Mar

    Security Awareness: how to avoid the dangers of cybersecurity with TelsySkills

    View all
    • English
    • Italiano
    The Triple Cyber Threat: Borat RAT
    06 Mar

    Recently a US cyber risk intelligence company has discovered a new Remote Access Trojan (RAT) malware. RAT malware typically helps cybercriminals gain complete control of a victim’s system, permitting them...

    Read more
    ICT Risk Management: how to set up your cyber defenses
    23 Jan

    IT security is a complex and evolving field and needs a systemic approach to managing cyber incidents. These incidents do not always concern malicious attacks, but can be the result...

    Read more
    The Cyber Incident Response
    09 Jan

    Every day thousands of companies have to face the growing threat of cybercrime and Security Incidents, with consequent waste of time and money. In the modern corporate landscape, we have...

    Read more
    Decision Intelligence: a tool for the security of people and companies
    19 Dec

    Having large volumes of data available is essential when it comes to security. Even more central is the ability to know how to read, analyze and process these data, or...

    Read more
    Quantum Key Distribution (QKD) and security
    12 Dec

    In the collective imagination, quantum computing has been relegated to science fiction for many years, but thanks to recent developments in technologies and substantial investments by major players, we are...

    Read more
    Cyber, physical and reputational risks exposure
    21 Nov

    The growing online presence of personal data on platforms, social networks, digital collaboration tools and so on increases, the risks exposure associated with this availability is also increased. From a...

    Read more
    Quantum Key Distribution (QKD) and Post-Quantum Cryptography (PQC)
    14 Nov

    Today the quantum attacks threat is a real danger. The protection of data and communications is linked to technologies that give future-proof answers, capable of thwarting threats with still partially...

    Read more
    Secure communications: end-to-end encryption (E2EE)
    28 Oct

    End-to-end encryption is a message encryption method based on asymmetric encryption algorithms and the decentralization of cryptographic keys. Is an encrypted communication system in which only people who are communicating...

    Read more
    Decision Intelligence and security: VIP digital protection
    24 Oct

    Having large volumes of data available is essential when it comes to security. Even more central is the ability to know how to read, analyze and process these data, or...

    Read more
    Endpoint Detection & Response (EDR)
    10 Oct

    The evolution of cyber attacks in terms of frequency and attack methods (multi-channel and multi-target), as well as the ongoing digitalization process, exposes organizations to vulnerabilities that weaken continuity plans,...

    Read more

    Posts navigation

    Older posts
    Find out more
    About us
    Solutions
    Careers
    Blog
    Governance
    Privacy Policy
    Comment Policy
    Operational Offices

    Turin
    Corso Svizzera, 185, 10149

    Rome
    Via del Pellegrino, 155, 00186
    Via Antonio Nibby, 4-6, 00161

    Naples
    Centro Direzionale, Isola F7, 80143

    Commercial Office

    Milan
    Via Gaetano Negri, 1, 20123

    Phone

    +39 011 77 14 343

    Follow us
    tim group
    tim group
    logo zero
    logo zero
    © 2022 Telsy SpA con unico socio Gruppo TIM • P.IVA 00737690016 • REA TO443365