Telsy
    • About Us
    • Solutions
      • Go to Solutions
      • Cyber
      • Crypto
      • Quantum
    • Innovation
    • Markets
    • Careers
    • Blog
    • Featured News
      • 25 Sep

        TS-Intelligence: The Advanced Cyber Threat Intelligence Platform from Telsy and TS-WAY  

      • 18 Sep

        Secure collaboration

    TS-Intelligence: The Advanced Cyber Threat Intelligence Platform from Telsy and TS-WAY  

    Secure collaboration

    View all
    • English
    • Italiano
    Security Awareness: how to avoid the dangers of cybersecurity with TelsySkills
    20 Mar

    Being aware of the existence of real danger and the consequences it entails on multiple levels is – itself – a tool to defend against it, to protect ourselves. This...

    Read more
    E2EE: features of an “invincible” system
    21 Jun

    End-to-End encryption (E2EE) is an application of asymmetric encryption systems. This means that in a communication, only the recipient and the sender, its two ends, can decrypt and read the...

    Read more
    RSA Cryptography: history and uses
    26 May

    The RSA encryption is a public-key-based cryptosystem, named after Ron Rivest, Adi Shamir and Len Adleman who invented it in 1977. Clifford Cock had previously invented an equivalent system for...

    Read more
    Vulnerability Assessment: an overview of a crucial cybersecurity task
    10 May

    Vulnerability assessment is a task in delivering an effective cybersecurity strategy in both corporate and public sectors. It is vital to bring about risk awareness, and it is the very...

    Read more
    Cybersecurity analysts: what they do and why their work is vital
    05 May

    Cybersecurity analysts are the core of an organization’s security, private and public alike. They have a vital task: ensuring that their IT assets are secure and protect them from violations...

    Read more
    Cybersecurity career: 4 reasons to consider it
    19 Apr

    Pursuing a career in cybersecurity can be tempting. Figures show that this industry tends to have a zero unemployment rate. Nowadays, the labor market requires cybersecurity skills more than ever....

    Read more
    VPN: a must-have tool for privacy and security
    29 Mar

    VPN (Virtual Private Network) service gives you online privacy, anonymity, and security by creating a private network from a public internet connection. By using it, businesses can securely connect users...

    Read more
    SOC: what it is and how it operates
    24 Mar

    SOC or Security Operations Center – not to be confused with SoC (“System on a Chip) – is the core component of a serious business security strategy. Simply put, a...

    Read more
    Olicyber: the future of Italian cybersecurity is here!
    17 Feb

    Will the curriculum of Italian pupils soon include hacking? There is a chance. Italy is organizing its first CyberOlimpics, Olicyber, organized by CINI and TeamItaly, the Italian white hackers’ team....

    Read more
    Sunburst: the attack that shook the world
    27 Jan

    Cyber analysts recently discovered the “Sunburst” attack malware, which triggered a series of cyber-espionage attacks that began in the spring of 2020. The attack involved thousands of public administrations, private...

    Read more

    Posts navigation

    Older posts
    Find out more
    About us
    Solutions
    Careers
    Blog
    Governance
    Privacy Policy
    Comment Policy
    Whistleblowing
    Operational Offices

    Turin
    Corso Svizzera, 185, 10149

    Rome
    Via del Pellegrino, 155, 00186
    Via Antonio Nibby, 4-6, 00161

    Naples
    Centro Direzionale, Isola F7, 80143

    Commercial Office

    Milan
    Via Gaetano Negri, 1, 20123

    Contacts

    Phone
    +39 011 77 14 343

    Mail
    contact@telsy.it

    Follow us
    tim group
    tim group
    logo zero
    logo zero
    © 2021 Telsy SpA company with a single shareholder TIM Group • VAT 00737690016 • REA TO443365