cybersecurity | ISPI
Salta al contenuto principale

Form di ricerca

  • ISTITUTO
  • PALAZZO CLERICI
  • MEDMED

  • login
  • EN
  • IT
Home
  • ISTITUTO
  • PALAZZO CLERICI
  • MEDMED
  • Home
  • RICERCA
    • OSSERVATORI
    • Asia
    • Cybersecurity
    • Europa e Governance Globale
    • Geoeconomia
    • Medio Oriente e Nord Africa
    • Radicalizzazione e Terrorismo Internazionale
    • Russia, Caucaso e Asia Centrale
    • Infrastrutture
    • PROGRAMMI
    • Africa
    • America Latina
    • Global Cities
    • Migrazioni
    • Relazioni transatlantiche
    • Religioni e relazioni internazionali
    • Sicurezza energetica
    • DataLab
  • ISPI SCHOOL
  • PUBBLICAZIONI
  • EVENTI
  • PER IMPRESE
    • cosa facciamo
    • Incontri su invito
    • Conferenze di scenario
    • Formazione ad hoc
    • Future Leaders Program
    • I Nostri Soci
  • ANALISTI

  • Home
  • RICERCA
    • OSSERVATORI
    • Asia
    • Cybersecurity
    • Europa e Governance Globale
    • Geoeconomia
    • Medio Oriente e Nord Africa
    • Radicalizzazione e Terrorismo Internazionale
    • Russia, Caucaso e Asia Centrale
    • Infrastrutture
    • PROGRAMMI
    • Africa
    • America Latina
    • Global Cities
    • Migrazioni
    • Relazioni transatlantiche
    • Religioni e relazioni internazionali
    • Sicurezza energetica
    • DataLab
  • ISPI SCHOOL
  • PUBBLICAZIONI
  • EVENTI
  • PER IMPRESE
    • cosa facciamo
    • Incontri su invito
    • Conferenze di scenario
    • Formazione ad hoc
    • Future Leaders Program
    • I Nostri Soci
  • ANALISTI

cybersecurity

Incident reporting: verso una prevenzione europea

Il 24 giugno scorso il Parlamento Europeo ha pubblicato il testo finale del Digital Operational Resilience Act europeo. Le negoziazioni sono chiuse e il testo, al netto di ulteriori emendamenti residuali che verranno discussi durante la sessione plenaria, è ormai definitivo.

DORA: nuove regole europee per la sicurezza digitale

I rischi informatici sono in aumento, anche a causa del difficile contesto geopolitico. Il nuovo regolamento sulla resilienza digitale definisce requisiti uniformi e dinamici di sicurezza per le imprese del settore finanziario. Per una vera rivoluzione, però, ci vorrà tempo.

The War in Ukraine Has Made the European Chips Initiative Out of Date

Il conflitto in Ucraina rende inadeguate le ambizioni di autonomia dell'UE in materia di semiconduttori. Per il futuro meglio puntare su più cooperazione con gli USA.

Internet Security Under the Ocean: EU-US Must Cooperate on Submarine Cable Security

Unnamed hackers recently targeted servers linked to a Hawaiian submarine cable — and the US Department of Homeland Security (DHS), thankfully, “disrupted” it. The specific target, DHS said, was the servers of a telecommunications company “associated with” an undersea cable that carried internet traffic and other data to Hawaii and the surrounding region. International law enforcement cooperation enabled the US and its partners to arrest those responsible.

EU and US: Cyber Friends or Digital Foes?

Sanctions to Russia forbidding the import of dual-use technology have highlighted the importance of reliable supply chains and strategic autonomy in high-tech sectors. The quest for this digital sovereignty has led the EU to recently announce a Strategic Compass to better coordinate its capacity building in the physical and digital spheres. Brussels has also launched the European Chips Act to become a leading player in the semiconductor industry. Are these initiatives enough to better position the European Union in the global technological competition?

A Transatlantic Approach to Digital Sovereignty

Digital sovereignty is a leitmotif in the political agenda worldwide. States around the world are making technological supremacy and innovation the cornerstones of their diplomatic, security, and economic efforts. This trend is even more true in the wake of the Ukraine war. Sanctions on Russia, impeding the import of dual-use technology, have highlighted the importance of reliable supply chains and strategic autonomy in high-tech sectors.

EU Strategic Compass: The Right Direction for Europe?

The year 2022 will be remembered for many things: the Russian invasion of Ukraine, the end of the COVID-19 pandemic, and the year that both NATO and the EU published their security strategies. For the European Union, the Strategic Compass represents the willingness of 27 countries with different strategic cultures to better coordinate, invest in capacity building, and partner with international organisations such as the Association of Southeast Asian Nations (ASEAN) and the United Nations knowing that a secure environment is crucial for European security.

 

Una "cyber diplomacy" per l'Italia

È stata appena pubblicata la nuova Strategia Nazionale per la Cybersicurezza. Un documento che tiene conto del mutato contesto geopolitico e prova a rendere il Paese più autonomo.

Cyber Capacity Building: Security, Innovation, and Growth in the Mediterranean Region

Cybert hreats – like ransomware or other types of malwares – are evolving, pervasive, and ubiquitous. They endanger both individuals and organizations across several communities worldwide. They run through addresses networks, information systems, and services, which represent the backbone of contemporary digital societies and the premises for their industrial, economic, and social development.

Cyber Stability Lies in Russian and American Hands

One outcome of the meeting between Russian President Vladimir Putin and US President Joe Biden in Geneva last June was the decision to engage in consultations on cyber security. This came as a surprise as Washington has long accused Moscow of meddling, including by cyber means in the 2016 US presidential elections which Moscow has flatly denied.

What to Do in Case of Ransomware

Cybercrime has created a serious threat landscape over the past few years. Cyber-attacks concern all areas across the internet and ICT infrastructure as attackers’ techniques have reached new heights.

In Cybersecurity, Turkey Leads the Way

Cyberspace has a gradually expanding structure that connects new devices, systems, and users every new second. This causes threats from cyberspace to change constantly, making it impossible to combat them without cooperation.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • seguente ›
  • ultima »

SEGUICI E RICEVI LE NOSTRE NEWS

Iscriviti alla newsletter Scopri ISPI su Telegram

Chi siamo - Lavora con noi - Analisti - Contatti - Ufficio stampa - Privacy

ISPI (Istituto per gli Studi di Politica Internazionale) - Palazzo Clerici (Via Clerici 5 - 20121 Milano) - P.IVA IT02141980157