How much is your medical record worth?
On the dark web, a single medical record can sell for up to $1,000 Far more than a credit card […]
Read more
LOTL (Living Off The Land)
When the Attacker Uses Your Own Weapons Against You LOTL (Living Off The Land) is a cyberattack technique that stands […]
Read more
The Resilience of Infrastructure Depends on CPS
Source Gartner – Document “Developing a CPS Security Policy Framework Based on Seven Domains”Fonte Gartner
Read more
Mosquitoes and Cybersecurity:
An Unexpected Analogy In summer, we’ve all experienced it: a peaceful evening outdoors… and then comes a mosquito. Silent (until […]
Read more
Cybersecurity 2025:
Six Months That Redrew the Global Risk Map In the first half of 2025, the cybersecurity landscape underwent a profound […]
Read more
Beyond Technology
The Seven Organic Forces Redefining Cybersecurity Cybersecurity is no longer (just) a technological issue. It is now evident that risks […]
Read more
Threat Landscape 2025–2026:
How to Survive (Strategically) in a VUCA World If you think 2025 marks the peak of digital maturity, you’re only […]
Read more
Reacting in Zero Seconds: Automated Intelligence at the Core of the cyber defence
In the world of critical infrastructures, every second counts. Gyala’s Italian approach with the Agger platform introduces a technological breakthrough […]
Read more
NIS2 Directive Implementation
We’re halfway there! The Directive (EU) 2022/2555, known as NIS2, is the new European regulatory framework for cybersecurity, updating and […]
Read more