Security attacks on Supply Chains

Security attacks on Supply Chains

In the digital age, supply chains are essential for the smooth functioning of businesses and the economy at large. Businesses increasingly rely on an interconnected ecosystem of suppliers, software and services to function. However, in recent years, we have witnessed a growing threat: supply chain attacks. This digital "supply chain", while offering efficiency and flexibility, also creates new...

read more
The Cybersecurity Revolution: Artificial Intelligence and Machine Learning in Action

The Cybersecurity Revolution: Artificial Intelligence and Machine Learning in Action

In the ever-changing and challenging cybersecurity scenario, one trend has emerged as a catalyst for change: the integration of Artificial Intelligence (AI) and Machine Learning (ML). These technologies are playing a pivotal role in fighting cyber threats, helping organisations anticipate and proactively respond to attacks. Before delving into the role AI and ML play in cybersecurity, it is...

read more
A connected future: IoT, LoRaWAN and the importance of cybersecurity (SIoT)

A connected future: IoT, LoRaWAN and the importance of cybersecurity (SIoT)

In a world where technology is moving ahead at a staggering speed, the Internet of Things like SIoT (Secure Internet of Things) is revolutionizing our present by connecting everyday devices and objects to the web (fostering an unprecedented data exchange and transforming the way in which we interact with the environment around us). In this vast and exciting technological plane, a specific...

read more
Electric Vehicle Charging Networks: AFIR Regulation and Connectivity

Electric Vehicle Charging Networks: AFIR Regulation and Connectivity

In several of our recent blogs on the adoption of electric vehicles and the deployment of related charging networks, we have highlighted how important communications and cybersecurity are for these installations. Not only do experts consider these aspects crucial, but the EU is already issuing mandatory regulations on the matter. The new Alternative Fuels Infrastructure Regulation, AFIR, entered...

read more
Exploring Security in the Cryptocurrency and Blockchain Universe

Exploring Security in the Cryptocurrency and Blockchain Universe

Most of us have likely encountered the term cryptocurrencies, yet not everyone is ready to engage in trading them. In today’s digital era, cryptocurrencies have disrupted the financial scene by providing a decentralized and secure alternative to traditional money. However, this new economic paradigm is not without its challenges and risks. The realms of cybersecurity and cryptocurrencies are...

read more
Electric Vehicle Charging Networks: the weak link in the chain

Electric Vehicle Charging Networks: the weak link in the chain

A phrase that is commonly repeated in the realm of systems, processes, and equipment management is “a chain is only as strong as its weakest link”. This couldn’t be more true when it comes to deploying an electric vehicle charging network. Charging point operators (CPOs), responsible for managing charging stations, often bear the brunt of the significance of this phrase within their own chain....

read more