See our services
- Consumer Code
- Directive (EU) on electronic commerce
- Regulation (EU) 2016/679 – GDPR
- Whistleblowing regulation
- Italian Civic access, advertisement and transparency
- Italian Law concerning anticorruption
- Italian Digital Administration Code – CAD
- Italian Public Contract Code
- Italian Public opt-out Registry – RPO
- Italian Personal Data Protection Code
- Administrative liabilities – MOG 231
- Italian Register of Communication Operators – ROC
- CISO as a Service
- SOC as a Service
- Smishing simulation & awareness
- Phishing simulation & awareness
- Cyber Threat Intelligence (CTI)
- Domain Threat Intelligence (DTI)
- Penetration Testing (PT)
- Vulnerability Assessment (VA)
- Smartphone and Tablet electronic countermeasures
- Electronic surveillance countermeasures – TSCM
- Certification PCI-DSS
- Certification GDPR – ISDP©10003
- Audit Directive (EU) on electronic commerce
- Audit Whistleblowing regulation
- Audit Law 171/2018 (Republic of San Marino)
- Audit ISDP©10003
- Audit Italian Law concerning anticorruption
- Audit Regulation (UE) 2016/679
- Audit Italian Administrative liabilities – MOG 231
- Audit ISO/IEC 27001
- Audit Italian Digital Administration Code
Latest news
FRENCH SUPERVISORY AUTHORITY: Data compromise at a subprocessor: what are the risks of unsecured access?
The CNIL regularly reports on typical data breaches based on actual incidents reported to it. The purpose of this publication is to enable all professionals to understand and prevent the risks of accessing data held by subprocessors. The Story of Bu3ba and Dan The course of the attack A few weeks before the attack, Bu3ba, a hacker, collected a multitude of professional email addresses from the dark web. He then launched a phishing campaign , a cheap and effective operation. With one of the collected addresses, Bu3ba sent a message to...