
A penetration test, also known as a pen test, is a simulated cyber attack on a computer system, network, or web application to identify vulnerabilities that an attacker could exploit.

It is a standard created to offer simpler ways of accessing certain sites, which takes advantage of the credentials already stored on other services.

This term identifies those techniques and technologies that allow data protection during their use. A step forward in information security that takes into account the development of the sector and emerging needs.

The success of the world of video games, with a turnover exceeding 2 billion euros, has inevitably attracted the interest of unscrupulous cybercriminals, ready to exploit any weakness, technological or human, for easy profits.

A few months ago an agreement was reached on what is called a real revolution: the Digital Operational Resilience Act, also known as DORA.

Cybersecurity and compliance are among the major challenges facing corporate directors, having to navigate between different regulations from countries and sectors and at the same time, ensure rapid operations for the teams involved in the defense of networks.

The energy sector is a target of choice for hackers, as data on attacks from recent months shows. In fact, cyber attacks on the energy sector increased by 33% between June and August. Even before that, however, the energy sector was the sector with the highest costs for data breach. A trend destined to grow.

We often hear about the dark web in reference to the activities of cybercriminals, but this terminology is also confused or used as a synonym for the deep web, even if the two realities are different. Knowing the details can be useful to defend against threats lurking on the net.

The use of the single password is becoming obsolete, the double factor is increasingly used in authentication.

The lack of specialized personnel in the sector has been confirmed for some years now, even if many young people are moving towards specializations in this sector. Here are some of the most promising training paths.
LATEST

Penetration Tests: what they are and how they are performed
03 February 2023A penetration test, also known as a pen test, is a simulated cyber attack on a computer system,...

Interview with Francesco Zambelli – P101 Ventures
27 January 2023Venture Capital funds play a fundamental role in the financing and development of companies in the...

The robotaxi revolution: the future of mobility
15 January 2023Robotaxis are vehicles that use artificial intelligence (AI) technology to drive autonomously,...

When AI is at the service of cybercriminals
13 January 2023A few months have passed since the release of ChatGpt, which took place in November last year, and...