Insights

News and Insights

·Email SecurityLibraesvaAnti-PhishingCybersecurityACN

Email Security Gateway: why basic spam filters are no longer enough

Over 90% of cyber attacks begin with an email. How an email security gateway with Libraesva protects business mailboxes from phishing, BEC and malware.

Read the article
·Identity ManagementZero TrustCybersecurityMFAMicrosoft Entra ID

Identity Management Day: digital identity is the new enterprise perimeter

80% of breaches start with compromised credentials. MFA, Conditional Access and Zero Trust: how to protect digital identities and comply with NIS2 and DORA.

Read the article
·DNS SecurityAzureCybersecurityDNSSECZero Trust

DNS Security: Protecting Enterprise DNS Resolution with Azure

Over 85% of malware uses DNS to communicate with C2 servers. How Azure DNS Security Policy protects enterprise DNS resolution: filtering, DNSSEC, monitoring and NIS2 compliance.

Read the article
·CSIRTNIS2CybersecurityIncident ResponseSME

Outsourced CSIRT: how SMEs can meet NIS2 obligations without an internal team

NIS2 requires a CSIRT contact point and strict incident notification timelines. For SMEs without a dedicated team, an outsourced CSIRT is the solution to achieve compliance without building internal capabilities.

Read the article
·TISAXAutomotivePiacenzaCybersecurityISO 27001

TISAX in Piacenza: why automotive supply chain companies can no longer wait

OEMs increasingly require TISAX compliance from their suppliers. For automotive supply chain companies in Piacenza and Emilia-Romagna, getting prepared is a competitive priority.

Read the article
·CybersecurityClusitSMEItaly

Clusit Report 2026: 5,265 Attacks in 2025, Italy Still in the Crosshairs

+49% cyber incidents in 2025. Italy accounts for 9.6% of global attacks with 507 serious incidents. Manufacturing +79%, healthcare +19%. Key findings and what they mean for SMEs.

Read the article
·BackupDisaster RecoveryRansomwareSMEs

World Backup Day 2026: Why Business Backup Decides Your Company’s Future

60% of SMEs that lose their data close within 6 months. The 5 most common mistakes, the 3-2-1-1-0 rule and how to truly protect your business with tested, resilient backups.

Read the article
·AzureCloud SecurityZero TrustCompliance

How to Secure Your Azure Environment: A Practical Guide

Identity, networking, data protection, monitoring and compliance: the five essential controls for a secure Microsoft Azure environment.

Read the article
·NIST 2.0AssessmentMultilingual

NIST Assessment now available in Italian, English and German

The free cybersecurity self-assessment at nist.atws.app is now available in three languages: Italian, English and German. Same 106 questions based on NIST CSF 2.0, with a fully localised interface and report.

Read the article
·CybersecurityZero TrustResilienceSupply Chain

The corporate perimeter no longer exists: why firewalls and VPNs are not enough

The Zscaler report on 1,750 IT leaders and the WEF confirm: corporate security strategies are still too inward-focused. The new perimeter is user identity.

Read the article
·IT CompanyPiacenzaGuide

How to choose an IT company in Piacenza

Certifications, vendor independence, cloud and cybersecurity expertise: concrete criteria for evaluating an IT partner in Piacenza.

Read the article
·CloudPiacenzaIaaSGuide

Cloud services for businesses in Piacenza: what to look for

Managed cloud vs hosting, data residency, ISO certifications and NIS2 compliance: what to ask your cloud provider.

Read the article
·DatacenterPiacenzaCloudInfrastructure

Datacenters for businesses in Piacenza: local or European?

On-premise server, local datacenter or European cloud? A practical comparison for businesses in Piacenza: costs, security and compliance.

Read the article
·CybersecurityAICloudPhishing

Cybersecurity, AI and cloud: weekly news roundup

Trivy compromised twice in a month, NVIDIA reaches 1 million GPUs in AI factories, Tycoon 2FA dismantled and AWS-Google launch multicloud networking.

Read the article
·CloudMicrosoft 365Migration

Why 2026 is the right time to migrate to Microsoft 365

MIMIT voucher, NIS2 deadlines and Exchange 2016 end of support: three concrete reasons to migrate email and files to Microsoft 365 in 2026. A practical guide for SMEs.

Read the article
·CybersecuritySMEsCyber Index

Cyber Index PMI 2026: the cyber maturity of Italian SMEs

Average score 55/100, only 16% of SMEs classified as mature, and 1 in 4 hit by a breach in the past three years. Key findings from the third Cyber Index PMI report.

Read the article
·CloudCybersecurityMIMIT Grant

MIMIT Cloud and Cybersecurity Voucher 2026

ATWS is a registered supplier for the MIMIT 2026 voucher programme. Non-repayable grants up to €20,000 for cloud and cybersecurity services for SMEs and professionals.

Read the article
·CybersecurityNIST 2.0Assessment

NIST 2.0 Cybersecurity Assessment: evaluate your security posture for free

Our free self-assessment tool based on the NIST CSF 2.0 framework is now available. 106 questions, instant report and analysis of your organisation’s security posture.

Read the article
·BackupACNMicrosoft 365

ATWS Secure Backup for Microsoft 365: ACN qualification submitted

ACN qualification request submitted for the SaaS backup service for Microsoft 365. Protection of Exchange, SharePoint, OneDrive and Teams with encrypted EU storage.

Read the article
·Email SecurityACNSaaS

ATWS Email Security Gateway: ACN qualification submitted

ACN qualification request submitted for the email security gateway. Filtering, antispam, antivirus and configurable policies on European cloud infrastructure.

Read the article
·Cloud PAACNSaaS

ATWS Secure Workspace qualified by ACN for the Public Administration

ATWS Secure Workspace is ACN-qualified and listed in the Cloud Catalogue for the Italian Public Administration. Secure SaaS desktop with MFA and EU-only data.

Read the article