The renowned Cybersecurity360 newspaper published an article written by our Compliance Manager entitled "DORA and IT risk: automation of the evaluation process of ICT service providers".
The renowned newspaper Cybersecurity360 has just published an article written by us Compliance Manager, expert in the field of IT security regulations.
The article delves into the obligations imposed by the EU DORA regulation on operational digital resilience, in particular focusing on the process of risk assessment of ICT suppliers and its automation via IT tools.
Sections of the article
The article develops in five sections main:
The DORA Regulation
The scope of application of the DORA Regulation
The strategies to adopt in supplier evaluation
Monitoring the supplier's risk profile: the solutions
Automation of the evaluation process of ICT service providers
Automating the assessment of the cyber risk posed by suppliers and other third parties is an extremely important issue to address, particularly in a context where attacks that exploit the Supply Chain are continually increasing.
Distline chose Panorays to automatically and continuously evaluate the cyber risk level of suppliers, in a fast and targeted way.
Copilot, Microsoft's new generative AI, is designed to optimize productivity in the daily tasks carried out with the Microsoft 365 Suite. Thanks to its advanced artificial intelligence, Copilot offers assistance and suggestions to improve efficiency and simplify operations within the Microsoft ecosystem.
Cyber threats are increasingly numerous and we need to keep up with them it has become a real challenge. To prevent any cyber attacks, companies need to have a detailed overview of the risks of the digital world. It was born for this reason the Clusit Report, a precious tool that offers an annual analysis of security incidents most significant events that have occurred globally, with particular attention to Italy.
The renowned newspaper Cybersecurity360 published an article written by us Compliance Manager entitled "DORA and cyber risk: automation of the evaluation process of ICT service providers”.
In Distline we are committed every day to providing high quality, secure, reliable and innovative IT services to meet the needs and expectations of our Customers. This is why we are proud to announce the certificazione of our Quality and Information Security Management Systems according to standards ISO 9001. e ISO / IEC 27001! A very important stage in our process continuous improvement.
XDR is a Cybersecurity technology that extends the ability to detect and respond to emerging and sophisticated threats by analysing and correlating data from different security products. In a landscape where cyber attacks are increasingly targeted, you need to have a global view of cyber threats in a single interface. In this way, you don't need to use many platforms. In the following article we will explain in detail what XDR features are and why it is a tool that Distline strongly recommends.
Phishing is a hacking technique that consists in fraudulently tricking unsuspecting users into sharing their account credentials. However, it's often possible to recognize phishing emails by paying attention to some details and recurring topics. In this article we explain in detail how to recognise a phishing email, how to protect yourself and what to do if you suspect you are the victim of an attack.