ACN
|CSIRT
|ransomware
|minacce informatiche
|rapporto cyber Italia
|DDoS
|vulnerabilità
|spear phishing
Cyber Threats in Italy – ACN Operational Summary, April 2025
May 22, 2025
The ACN's April 2025 Operational Summary highlights a rise in ransomware and DDoS attacks in Italy, with key sectors like telecoms and public adminis…
intelligence sulle minacce
|sicurezza cloud
|errori di configurazione cloud
|malware nelle piattaforme cloud
|conformità GDPR
|conformità NIS2
|ISO/IEC 27001
|Aegister Cloud Defender
Cloud Security: How Aegister Protects Your Business from Misconfigurations, Malware, and Compliance Risks
May 10, 2025
Discover how Aegister's Cloud Defender enhances your cloud security, addressing misconfigurations, malware threats, and ensuring compliance with GDPR…
risposta agli incidenti
|ransomware
|attacchi informatici
|cybersecurity Italia
|ransomware-as-a-service
|ACN report
|LockBit 3.0
Ransomware 2024: Italy Among the Most Targeted Countries
May 08, 2025
Ransomware attacks in Italy surged in 2024, placing the country among the most affected in the world. Find out which sectors are at risk and how to r…
sicurezza informatica
|intelligence sulle minacce
|analisi del rischio informatico
|sicurezza strutturata
|valutazione della sicurezza
|metodo Aegister
|infrastruttura IT
|monitoraggio della sicurezza
The Aegister Method: A Structured Approach to Cybersecurity
April 29, 2025
Aegister's cybersecurity method is a structured, personalized process designed to protect businesses with precision, starting from risk analysis to c…
ACN
|sicurezza informatica
|ransomware
|minacce informatiche
|phishing
|attacchi alla catena di fornitura
|NIST
|rischio informatico
Cyber Threats 2025: The Most Common Attacks and How to Defend Against Them
April 12, 2025
An in-depth look at the most common cyber threats in 2025 from ransomware to supply chain attacks and how organizations can defend themselves using s…
