Telsy
    • About Us
    • Solutions
      • Go to Solutions
      • Cyber
      • Crypto
      • Quantum
    • Innovation
    • Markets
    • Careers
    • Blog
    • Featured News
      • 01 Jun

        The Spyware

      • 31 May

        CRYSTALS-Dilithium: LWE-based digital signature

    01 Jun

    The Spyware

    31 May

    CRYSTALS-Dilithium: LWE-based digital signature

    View all
    • English
    • Italiano
    Risk Analysis and VAPT: how to manage cyber risk
    17 Apr

    Companies and organizations are constantly looking for ways to protect their data and online activities from cyber risk. The inescapable use of the Web and new ways of collaboration have...

    Read more
    Security Awareness: how to avoid the dangers of cybersecurity with TelsySkills
    20 Mar

    Being aware of the existence of real danger and the consequences it entails on multiple levels is – itself – a tool to defend against it, to protect ourselves. This...

    Read more
    The Triple Cyber Threat: Borat RAT
    06 Mar

    Recently a US cyber risk intelligence company has discovered a new Remote Access Trojan (RAT) malware. RAT malware typically helps cybercriminals gain complete control of a victim’s system, permitting them...

    Read more
    Telsy website is Carbon Neutral
    21 Feb

    TIM Group offsets the climate impact of its websites with certified international project During 2022, our Group’s main websites, with around 680 million total page views, generated around 554 tonnes...

    Read more
    Security Monitoring: protecting your business from cyber threats
    20 Feb

    Hackers or malware, careless or disgruntled employees, outdated or vulnerable devices and operating systems, public and mobile cloud computing, or third-party service providers: in the normal course of business, most...

    Read more
    Cyber Threat Investigation and Threat Hunting
    06 Feb

    According to the Verizon Data Breach Investigation Report (DBIR), advanced threats hide in environments undetected, often for months, as they stealthily try to gather valuable information or data to compromise....

    Read more
    ICT Risk Management: how to set up your cyber defenses
    23 Jan

    IT security is a complex and evolving field and needs a systemic approach to managing cyber incidents. These incidents do not always concern malicious attacks, but can be the result...

    Read more
    The Cyber Vulnerabilities
    16 Jan

    The fast evolution of the international scenario puts companies in front of new challenges. These challenges are closely related to security, staff preparation and the constant growth of cyber vulnerabilities....

    Read more
    Microsoft Exchange servers exploited with OWASSRF
    29 Dec

    Executive Summary In December 2022, Telsy Incident Response Team was called upon to handle a cyber security incident. The analysis conducted detected the execution of PowerShell code by exploiting a...

    Read more
    Decision Intelligence: a tool for the security of people and companies
    19 Dec

    Having large volumes of data available is essential when it comes to security. Even more central is the ability to know how to read, analyze and process these data, or...

    Read more

    Posts navigation

    Older posts
    Find out more
    About us
    Solutions
    Careers
    Blog
    Governance
    Privacy Policy
    Comment Policy
    Operational Offices

    Turin
    Corso Svizzera, 185, 10149

    Rome
    Via del Pellegrino, 155, 00186
    Via Antonio Nibby, 4-6, 00161

    Naples
    Centro Direzionale, Isola F7, 80143

    Commercial Office

    Milan
    Via Gaetano Negri, 1, 20123

    Contacts

    Phone
    +39 011 77 14 343

    Mail
    contact@telsy.it

    Follow us
    tim group
    tim group
    logo zero
    logo zero
    © 2022 Telsy SpA con unico socio Gruppo TIM • P.IVA 00737690016 • REA TO443365