Telsy
    • About Us
    • Solutions
      • Go to Solutions
      • Cyber
      • Crypto
      • Quantum
    • Innovation
    • Markets
    • Careers
    • Blog
    • Featured News
      • 03 Nov

        The mathematics behind PQC: the codes

      • 16 Oct

        New post-quantum digital signature proposals: the second NIST competition

    The mathematics behind PQC: the codes

    New post-quantum digital signature proposals: the second NIST competition

    View all
    • Italiano
    • English
    The Triple Cyber Threat: Borat RAT
    06 Mar

    Recently a US cyber risk intelligence company has discovered a new Remote Access Trojan (RAT) malware. RAT malware typically helps cybercriminals gain complete control of a victim’s system, permitting them...

    Read more
    Telsy website is Carbon Neutral
    21 Feb

    TIM Group offsets the climate impact of its websites with certified international project During 2022, our Group’s main websites, with around 680 million total page views, generated around 554 tonnes...

    Read more
    Quantum Key Distribution (QKD) and security
    12 Dec

    In the collective imagination, quantum computing has been relegated to science fiction for many years, but thanks to recent developments in technologies and substantial investments by major players, we are...

    Read more
    Cyber, physical and reputational risks exposure
    21 Nov

    The growing online presence of personal data on platforms, social networks, digital collaboration tools and so on increases, the risks exposure associated with this availability is also increased. From a...

    Read more
    Quantum Key Distribution (QKD) and Post-Quantum Cryptography (PQC)
    14 Nov

    Today the quantum attacks threat is a real danger. The protection of data and communications is linked to technologies that give future-proof answers, capable of thwarting threats with still partially...

    Read more
    Digital signature algorithms: present and future
    21 Oct

    Abstract The digital signature is, in many respects, the analogue in the digital world of the handwritten signature that we all use on a daily basis. The main difference between...

    Read more
    Microsoft Exchange servers backdoored with OwlProxy
    20 Sep

    Introduction In early 2022, Telsy observed malicious cyber activity in the Microsoft Exchange infrastructure. The analysis conducted revealed the presence of a malicious DLL, called “fuscom.dll“, and its persistence by...

    Read more
    Quantum Key Distribution (QKD): a disruptive technology
    19 Sep

    The quantum computing development and the prospect of its widespread diffusion are challenging the existing classical cryptography protocols security. At the same time, the advent of quantum computers has given...

    Read more
    Key Negotiation in the Post-Quantum Era
    09 Sep

    Introduction Cryptography, understood as the set of information protection schemes, is typically divided into symmetric or private key cryptography and asymmetric or public key cryptography. Schemes or protocols that exploit...

    Read more
    Cryptophones: what they are and how they work
    05 Sep

    The issue of mobile communication security highlights one of the weak links in the security chain of organizations. It is often the behavior of individual employees, not necessarily malicious but...

    Read more

    Posts navigation

    Older posts
    Find out more
    About us
    Solutions
    Careers
    Blog
    Governance
    Privacy Policy
    Comment Policy
    Whistleblowing
    Operational Offices

    Turin
    Corso Svizzera, 185, 10149

    Rome
    Via del Pellegrino, 155, 00186
    Via Antonio Nibby, 4-6, 00161

    Naples
    Centro Direzionale, Isola F7, 80143

    Commercial Office

    Milan
    Via Gaetano Negri, 1, 20123

    Contacts

    Phone
    +39 011 77 14 343

    Mail
    contact@telsy.it

    Follow us
    tim group
    tim group
    logo zero
    logo zero
    © 2022 Telsy SpA company with a single shareholder TIM Group • VAT 00737690016 • REA TO443365