Cyber Evolution partners with Nethesis at Digital Heroes Meeting 2025

lecs meeting digital heroes

The Digital Heroes 2025 Meeting, promoted by Nethesis, represents one of the main events in the Italian ICT landscape focused oninnovation, open-source solutions and community among technology partners. This year, Cyber Evolution will take an active role in presenting advanced enterprise cybersecurity solutions, sharing concrete use cases and establishing new partnerships. What is the Digital […]

The new European NIS2 regulation: what changes for cybersecurity in Italy

lecs nis 2

As of Oct. 16, 2024, the Network and Information Security (NIS) decree, which aims to strengthen the cybersecurity of companies and public administrations throughout Europe, came into effect. Let’s find out together what the main changes are, who is involved, and what obligations arise for Italian companies. What is the NIS2 Directive and why it […]

GDPR: how to ensure your company’s regulatory compliance and information security

lecs informatics gdpr

International regulations, such as the GDPR (General Data Protection Regulation) and ISO (International Organization for Standardization) standards, have become an essential part of the cybersecurity landscape. Ensuring compliance with these regulations not only improves overall data security, but is also critical to avoiding heavy penalties and maintaining customer trust. But how can you ensure that […]

The 3 pillars of cybersecurity: the CIA triad

lecs outline on the three pillars of cybersecurity

In today’s cybersecurity landscape, there are fundamental pillars that are essential to understand in order to protect organizations’ and companies’ digital assets from cyber threats. To ensure proper management of cyber data security, in the context of Cyber Security, there are three principles, commonly known as the CIA triad, which are: confidentiality, integrity and availability. […]

Best Practice: 5 key activities for cybersecurity

lecs the five activities necessary for cybersecurity

In an era of evolving and increasingly sophisticated cyber threats, cybersecurity has become a top priority for companies of all sizes. Cyber attacks can cause devastating damage, compromising sensitive data, disrupting business operations and damaging an organization’s reputation. To effectively address these challenges, it is essential to take a proactive and systematic approach to cybersecurity. […]

Phishing alert: how to recognize the attack, is Meta not writing to you!

lecs phising alert

In recent weeks, we have seen an increasing number of targeted phishing attacks. One particular aspect of this threat is the deception of malicious attackers posing as the well-known Meta group, which includes platforms such as Facebook, WhatsApp, and Instagram. The Modus Operandi of the Strikers The scammers behind these phishing attacks are cleverly exploiting […]

Computer Fraud in the World: The 10 Most Devastating Cases

lecs computer fraud the most devastating cases

Cyber fraud is one of the most serious and pervasive threats of the digital age. In fact, these crimes, ranging from the interception of sensitive data to the alteration of computer systems, have had a profound impact globally. Governments, companies of all sizes, and individuals have been affected, testifying to the vast scope and destructive […]

Protecting Yourself from Computer Fraud: Security Tools and Tips

lecs fronds computing

In the digital age, computer fraud has become one of the most significant threats to individuals and businesses. Characterized by the misuse or illegal use of information technology to deceive or steal resources, computer fraud can take many forms. From phishing emails that aim to steal login credentials, to installing malware to control computer systems, […]

Cyber Security for Children: Educating on Data Protection

lecs computer safety in children

In the modern digital world, it is important not to neglect the online safety of our children. Cyber security for children has become a daily priority, even considering the widespread use of technological devices from an early age. Therefore, it is the duty of the ‘grown-ups’ to ensure that our little digital explorers are protected […]