SGBox Next Generation SIEM & SOAR https://www.sgbox.eu Next Generation SIEM & SOAR Mon, 07 Jul 2025 10:17:52 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.1 https://www.sgbox.eu/wp-content/uploads/2025/02/cropped-SGBox-symbol-png-32x32.webp SGBox Next Generation SIEM & SOAR https://www.sgbox.eu 32 32 SGBox SOAR: the ally that simplifies SOC operations https://www.sgbox.eu/en/sgbox-soar-the-ally-that-simplifies-soc-operations/ https://www.sgbox.eu/en/sgbox-soar-the-ally-that-simplifies-soc-operations/#respond Mon, 07 Jul 2025 10:10:31 +0000 https://www.sgbox.eu/?p=32393
SGBox SOAR for the SOC team

What is SGBox SOAR and how does it work?

To address the growing challenges of cybersecurity, it is essential to implement automated countermeasures capable of reducing the average response time to an attack and quickly handling potential incidents.

This is where SOAR (Security Orchestration, Automation and Response) comes into play—the feature included in the SGBox Platform that enables orchestration, automation, and automated incident response capabilities.

SGBox’s SOAR system integrates seamlessly with all the platform’s functionalities.

Based on logs and security events collected by the SIEM, it allows for the activation of intelligent automations to promptly tackle threats and enrich incidents with additional information.

Using predefined correlation rules and playbooks, SOAR can:

  • Identify real incidents and filter out false positives;
  • Automatically trigger containment, mitigation, or notification actions;
  • Provide security teams with a centralized and simplified view of events.

The benefits of automation for the SOC

Implementing a SOAR system lightens the daily workload of SOC teams, as demonstrated by our SG-SOC as a Service, provided through the dedicated CyberTrust 365 Business Unit.

SG-SOC integrates the features of the SGBox SIEM & SOAR Platform and leverages them to automate incident response and activate remediation activities.

Here’s how SOAR empowers the SG-SOC team:

  • Reduced average analysis time: Threats are handled in seconds, without downtime or delays caused by manual intervention.
  • Reduced stress for analysts: Repetitive, low-value tasks are automated, allowing SOC professionals to focus on more strategic analysis.
  • Process standardization: Thanks to predefined playbooks, every incident response follows a consistent pattern, reducing human errors.

Better alert management: The system helps prioritize real incidents, preventing the team from being overwhelmed by false positives.

For Italian SMEs, which often lack internal SOC teams, outsourcing cybersecurity management and monitoring to an external SOC service that integrates SOAR functionalities is a strategic move to mitigate risks and safeguard business operations without disproportionate investments.

SGBox SOAR: practical cases of automated response

The SGBox SOAR module is designed to offer intelligent and flexible automation, fully integrated with the platform’s other modules.

With simple and customizable configuration, it allows for the creation of automated playbooks for various security scenarios.

Reducing false positives and optimizing resources

A concrete example is the management of alerts from firewalls or endpoints. These systems often generate large numbers of alerts, many of which turn out to be false alarms.

  • SGBox SOAR streamlines the security operations workflow by:
  • Analyzing logs and cross-referencing them with up-to-date threat feeds;
  • Applying priority rules to distinguish actual attack attempts;

Automatically triggering isolation or notification actions only when truly necessary.

The result? A drastic reduction in false positives and more efficient incident management, allowing the SOC to focus on priority threats and respond more quickly and effectively.

How much time and resources can you save?

Thanks to process automation, SOC teams can:

  • Save up to 70% of the time spent managing repetitive alerts;
  • Reduce average incident response time from hours to minutes;
  • Lower operational costs related to IT security.

Want to learn more about SGBox’s SOAR technology?

Book a free demo >>
]]>
https://www.sgbox.eu/en/sgbox-soar-the-ally-that-simplifies-soc-operations/feed/ 0
SGBox Announces New Distribution Agreement with CIPS Informatica https://www.sgbox.eu/en/new-partnership-between-sgbox-and-cips-informatica/ https://www.sgbox.eu/en/new-partnership-between-sgbox-and-cips-informatica/#respond Thu, 19 Jun 2025 07:05:48 +0000 https://www.sgbox.eu/?p=32141
New partnership announcement
The new partnership will allow Italian companies to benefit from SGBox’s SIEM & SOAR platformand the related Manged Security Services to protect against cyber threats in compliance with regulations.

Milan, June 19, 2025 – SecureGate is pleased to announce a new partnership with the Italian distributor Cips Informatica for the supply of IT products included in the proprietary SIEM & SOAR platform, as well as the related managed security services provided through the CyberTrust 365 Business Unit.

Thanks to this collaboration, IT resellers, MSPs, and system integrators will have access to a modular and scalable platform for enterprise security monitoring, ideal for meeting the requirements of NIS2, ISO/IEC 27001, GDPR, and other European and national regulations.

SGBox is the Next Generation SIEM & SOAR platform — modular and scalable — entirely designed in Italy, developed to simplify and optimize ICT security management for companies of all sizes.

Its advanced log collection and management capabilities, correlation, analysis, and automated responses allow companies to protect themselves from all types of cyber attacks.

Thanks to intuitive reports and dashboards, the platform provides a comprehensive and real-time view of the IT infrastructure’s security status.

Based on these functionalities, Managed Cybersecurity Services are also provided through the CyberTrust 365 Business Unit, offering comprehensive management of security activities, compliance, and 24/7 monitoring of the IT infrastructure.

By partnering with CIPS Informatica—a provider of IT solutions with over 30 years of experience in the Italian market—SGBox aims to further expand its reach and equip local businesses with the necessary tools to overcome daily cybersecurity challenges.

We are excited to begin this collaboration with CIPS Informatica, a solid and well-established partner in the Italian IT distribution landscape.

Thanks to this agreement, we will be able to expand access to our SGBox SIEM & SOAR platform and related managed security services through a qualified and widespread sales network.

It’s a strategic step that allows us to respond even more effectively to the cybersecurity needs of Italian companies, providing scalable, reliable, and fully managed solutions,” said Massimo Turchetto, CEO of SGBox.

“We are proud to announce this partnership with SGBox, an Italian company that combines technical expertise, innovation, and strategic vision in the field of cybersecurity,” said Mario Menichetti, CEO of CIPS Informatica.

“With SGBox, we are further strengthening our offering to the channel, delivering concrete solutions to tackle the challenges posed by NIS2 and to support companies on their path to compliance and digital resilience.”

About SecureGate

SecureGate is a dynamic IT vendor providing advanced security solutions to protect companies from cyber threats, with high standards of support and technical assistance. SecureGate’s offerings are structured through two Business Units: SGBox and CyberTrust 365.

SGBox is the Business Unit focused on developing IT products. Through its “Next Generation SIEM & SOAR” platform, it offers a range of modular solutions for managing ICT security in compliance with regulatory requirements.

CyberTrust 365 is the Business Unit dedicated to Managed Cybersecurity Services. It provides full 24/7 protection by managing all activities related to an organization’s IT infrastructure security.

Website: https://www.securegate.it/

About CIPS Informatica

Since 1991, CIPS Informatica has been a reference point for the distribution of IT solutions in Italy, with a focus on cybersecurity, networking and data protection. Through a network of resellers and system integrators, CIPS supports companies in the digital transformation and protection of their IT infrastructures.

Website: www.cips.it

]]>
https://www.sgbox.eu/en/new-partnership-between-sgbox-and-cips-informatica/feed/ 0
Cloud SIEM and transparent costs: SGBox’s solution for SMEs https://www.sgbox.eu/en/sgbox-siem-cloud-for-smes/ https://www.sgbox.eu/en/sgbox-siem-cloud-for-smes/#respond Mon, 09 Jun 2025 07:28:14 +0000 https://www.sgbox.eu/?p=32010
SGBox Cloud SIEM for SMEs

The myths about SIEM costs

When it comes to cybersecurity, one of the most common misconceptions among many Italian small and medium-sized enterprises (SMEs) is that a SIEM solution is expensive and suitable only for large companies with structured IT teams.

This belief is now outdated. Cyber threats do not discriminate based on company size: ransomware, targeted phishing, and unauthorized access affect SMEs just as much as large organizations—and SMEs are often more vulnerable precisely because they lack dedicated internal resources and cutting-edge technologies.

Thanks to SGBox, even SMEs can access advanced SIEM capabilities through a flexible, scalable cloud model with transparent costs.

SGBox: SaaS model with tailored licensing

Unlike traditional SIEMs that rely on licensing models based on log volume (which is difficult to estimate and often very expensive), SGBox adopts a licensing model based on the number of devices to be monitored.

This approach brings three key advantages:

  • Predictable costs: clear licensing model ensures full budget control.
  • Ease of activation: get started immediately without managing complex infrastructures.
  • Scalability: add new devices and modules as the business grows.

SGBox offers a full SaaS (Software as a Service) experience, where the entire infrastructure is managed within SGBox’s Cloud. Customers can focus on their core business while security is ensured by the proprietary Next Generation SIEM & SOAR platform, which is continuously updated with the latest features.

All the benefits of Cloud SIEM for SMEs

Choosing a Cloud SIEM means equipping your business with a tool that can:

Collect and analyze system, firewall, server, and application logs, identifying suspicious behavior.

  • Automatically detect threats and generate real-time alerts.
  • Correlate events across different devices, even if they are spread across multiple locations or used by remote workers.
  • Trigger automation workflows (SOAR) for rapid incident response.

Provide comprehensive reports for audits and manage compliance with privacy regulations such as GDPR and NIS2.

All of this is possible without hardware investments, without dedicated technical staff, and with updates included in the service.

Scalability and ease of use even without an internal IT team

One of SGBox’s standout features is its ease of use: the intuitive interface allows even small or non-specialized teams to monitor events and respond quickly.

In addition, guided onboarding and continuous support ensure a stress-free start and effective use of the system from day one.

The modular platform allows SGBox to adapt to specific security needs thanks to its scalable offering.

The progressive licensing model allows you to choose from four different bundles and start with essential features (Security Log Collection and Management), expanding over time based on evolving needs.

This is a fundamental requirement that enables SMEs to implement the solution precisely and gradually.

Below is a comparison between SGBox Cloud SIEM and other market solutions:

SGBox Cloud SIEM vs traditional SIEM

SGBox is the SIEM for italian SMEs that want to protect themselves without wasting resources

Investing in cybersecurity is no longer optional; it is a necessity—even (and especially) for SMEs.

SGBox makes this possible with a ready-to-use, cost-effective solution that can adapt to any business environment.

REQUEST A FREE DEMO>>
]]>
https://www.sgbox.eu/en/sgbox-siem-cloud-for-smes/feed/ 0
The most widespread cyberattacks in 2025 https://www.sgbox.eu/en/cyber-attacks-in-2025/ https://www.sgbox.eu/en/cyber-attacks-in-2025/#respond Mon, 12 May 2025 09:05:25 +0000 https://www.sgbox.eu/?p=31152
Widespread attacks in 2025

Today’s digital landscape, marked by the proliferation of digital devices and new technologies, is seeing a rise in cyber threats that can compromise data integrity and operational security in organizations.

But which are the most common attacks? And how can you protect yourself?

We discuss this in the following article, analyzing the most prevalent attacks and emerging trends across key industries, and showing how SGBox can provide the tools needed to enhance organizational cybersecurity.

Cyberattacks in 2025

In 2025, the manufacturing, healthcare, and financial sectors, along with cloud and IoT technologies, are facing a proliferation of sophisticated cyberattacks.

The main threats confirm and intensify known trends: ransomware (often delivered as a service – Ransomware-as-a-Service), advanced phishing campaigns (sometimes AI-driven), software supply chain compromises, DDoS attacks (including ransom DDoS – RDoS), and zero-day vulnerabilities.

New technologies (generative AI, cloud microservices, IoT devices) and geopolitical tensions (e.g., international conflicts) have driven criminals to innovate: API attacks are on the rise, AI is being used to craft personalized phishing, and enhanced IoT botnets (Mirai/R2-D2) are powering mega DDoS attacks.

At the same time, there is a growing number of malware-free attacks, targeted social engineering, and cloud credential compromises.

From a regulatory perspective, directives like NIS2 in the EU, along with emerging laws on AI and healthcare data, have expanded the risk landscape for SMEs.

Summary of Key 2025 Attacks by Sector/Technology (Source: ENISA Europe):

Widespread cyber attacks by sector

Main trends in Cyberattacks

  • Ransomware on the rise: it remains the number one threat across all sectors. Victims range from major manufacturers to hospital networks; in 2024, 65% of industrial companies suffered ransomware attacks.
  • The ransomware-as-a-Service model continues to spread: new groups like RansomHub (active since 2024) allow even less skilled criminals to launch attacks. On the other hand, international law enforcement has struck major gangs, but the impact is limited due to the rapid emergence of replacements.
  • Malware-free and AI-driven attacks: advanced techniques are increasingly used, leaving no traditional payload. Cyber criminals leverage generative AI to create highly convincing phishing and custom exploits.
  • Supply Chain and third parties: attacks on the software and hardware supply chain are increasing. Vulnerable firmware and open-source libraries are preferred targets: in 2024, a backdoor was found in an open-source project, discovered only due to unusual CPU spikes. Organizations, including SMEs, must now treat third-party providers and software vendors as potential attack vectors.
  • Geopolitics and hacktivism: the Russia-Ukraine war and other conflicts have driven waves of DDoS attacks and disinformation campaigns. In finance, geopolitical events triggered DDoS surges (e.g., 58% of attacks targeted European banks). Manufacturing, with global supply chains, is also exposed to political tensions: state actors seek industrial data or aim to disrupt adversaries’ critical production.
  • Regulations and compliance: in Europe, new directives like NIS2 and DORA mandate cybersecurity measures in many sectors (including manufacturing and finance SMEs). Additionally, the EU’s AI Act imposes strict rules on AI use (e.g., in factories or financial services).

In healthcare, stricter data protection requirements (e.g., Health Information laws) are pushing SMEs to enhance internal controls. These regulations increase penalties in the event of an incident and raise the minimum standards for defense.

The most widespread cyberattacks in 2025

How SGBox protects organizations from Cyberattacks

Detects early signs of an attack

The SGBox Platform analyzes everything happening in IT systems in real time (logins, suspicious activity, intrusion attempts) and immediately alerts if something is wrong.

Aggregates and correlates data across technologies

Whether it’s an industrial machine, a healthcare app, or a financial system, SGBox connects the data, providing a comprehensive and up-to-date risk overview.

Responds automatically to limit impact

When it detects a real threat, SGBox can automatically trigger actions such as blocking suspicious access, isolating a device, or alerting IT staff.

Identifies unauthorized or unusual activity

It can detect when a user, even with valid credentials, does something unusual or risky—like accessing sensitive data at odd times or from unexpected locations.

Monitors Cloud services and secures digital identities

As more data moves online (e.g., Microsoft 365, SPID, digital healthcare services), SGBox checks for misconfigurations, unauthorized access, or credential theft risks.

Constantly monitors connected devices, even hidden ones

From medical tools to factory equipment and smart office devices, SGBox detects anomalies even in the hardest-to-monitor endpoints.

Supports regulatory compliance

SGBox generates automated reports and dashboards to help companies demonstrate compliance with increasingly strict regulations such as NIS2, GDPR and more.

Streamlines SOC team workflows

With SGBox, SOC teams have a powerful tool for monitoring, analyzing, and responding to critical events—all in one platform.

Thanks to its SIEM (Security Information & Event Management) functionality, all security information is centralized, offering clear and immediate insights into the most critical threats the SOC can act on without delay.

The SG-SOC Service by CyberTrust 365

Building on the SGBox SIEM & SOAR Platform, the SG-SOC managed service provides full cybersecurity activity management and 24/7 monitoring.

Here’s how CyberTrust 365’s SG-SOC as a Service helps organizations in manufacturing, healthcare, finance, cloud, IoT, and public administration address identified threats:

24/7/365 monitoring by a dedicated team

An external SOC department that’s always on, constantly monitoring your infrastructure and responding immediately to anomalies.

Early warning advisory

Continuous gathering and classification of threat intelligence sources to promptly alert you to emerging threats before they cause damage.

Automated Incident Response

Thanks to SOAR integration, SG-SOC can execute automated playbooks (system isolation, IP/domain blocking, IT team alerts) to quickly contain attacks like ransomware or credential compromises.

Centralized Log analysis (SIEM)

All events from networks, endpoints, cloud, and IoT feed into a single platform that correlates them in real time, allowing you to detect advanced phishing or malicious intent early.

Proactive Vulnerability Management

Regular scans and detailed reports on weaknesses (including OT/IoT devices and legacy software) to plan patches and reduce the attack surface.

Exposed surface mapping and protection (EASM)

Automated checks of external assets, cloud services, and public resources (e.g., SPID portals, PagoPA) to find insecure configurations or Dark Web leaks.

Advanced MITRE ATT&CK detection

Analysis of indicators of compromise and attacker TTPs (Tactics, Techniques & Procedures) to pre-empt APTs, supply chain attacks, and DDoS campaigns.

Incident handling & forensic analysis

In case of a breach, SG-SOC immediately initiates forensic investigations to trace the attack chain, eliminate residual threats, and support compliance processes.

Compliance Support

Ready-to-use reports and dashboards to help meet regulatory requirements (e.g., NIS2, GDPR, AdS), simplify audits, and reduce the risk of fines.

Scalability and Plug-and-Play Integration

SG-SOC adapts to the needs of both SMEs and large enterprises, requiring no extra infrastructure or in-house expertise. It integrates with existing IT tools, cutting down costs and implementation time.

]]>
https://www.sgbox.eu/en/cyber-attacks-in-2025/feed/ 0
SecureGate appoints Softprom as its official Distributor in CIS and Eastern Europe https://www.sgbox.eu/en/securegate-appoints-softprom-as-its-official-distributor-in-cis-and-eastern-europe/ https://www.sgbox.eu/en/securegate-appoints-softprom-as-its-official-distributor-in-cis-and-eastern-europe/#respond Wed, 23 Apr 2025 08:23:18 +0000 https://www.sgbox.eu/?p=30904
New partnership announcement

Milan, April 23, 2025 – SecureGate, a leading provider of cybersecurity products and services, has officially appointed Softprom as its distributor in CIS and Eastern European countries.

This strategic partnership will enhance the availability of SecureGate’s advanced cybersecurity solutions across the region through the 2 Business Unit, SGBox and CyberTrust 365.

SGBox’s Next generation SIEM & SOAR Platform provides organizations with modular and scalable solutions to monitor, detect, and respond to cyber threats effectively, while CyberTrust 365 offer tailored Managed Cyber Security Services for H24 security detection, prevention and response activities.

By partnering with Softprom, a trusted distributor with a strong regional presence, SecureGate aims to expand its reach and offer businesses reliable, cutting-edge security solutions tailored to their needs.

We are delighted to partner with Softprom to bring our cybersecurity solutions to a broader market in CIS and Eastern Europe,” said Patrick Ramseyer, VP Sales at SecureGate.

Their expertise and deep understanding of the cybersecurity landscape in the region make them the ideal partner to help businesses strengthen their security posture.

As a leading value-added distributor (VAD), Softprom will actively promote and support SecureGate’s solutions, ensuring a high level of service and expertise throughout every stage of our partnership.

 “We are seeing strong demand for SIEM, SOAR, and managed cybersecurity services from companies looking to strengthen their resilience against cyber threats,” said Pavlo Zhdanovych, Managing Director of Softprom. 

“SecureGate’s offerings, including the SGBox platform and CyberTrust 365 services, are a perfect addition to our portfolio. They help address critical customer needs — from incident monitoring to automated response. With our deep expertise and extensive partner network, we are confident in our ability to successfully support SecureGate’s expansion across Eastern Europe and Central Asia.” 

This partnership marks a significant step for both companies, ensuring that businesses across Eastern Europe, as well as Ukraine, Moldova, Kazakhstan, Uzbekistan, Georgia, Armenia, Azerbaijan, Kyrgyzstan, and Serbia, have access to cutting-edge cybersecurity technologies to protect their digital assets.

]]>
https://www.sgbox.eu/en/securegate-appoints-softprom-as-its-official-distributor-in-cis-and-eastern-europe/feed/ 0
Compliance with NIS2: essential tools for DPOs https://www.sgbox.eu/en/nis-2-and-data-protection-officer/ https://www.sgbox.eu/en/nis-2-and-data-protection-officer/#respond Wed, 02 Apr 2025 09:24:56 +0000 https://www.sgbox.eu/?p=30617
NIS2 and DPO

The NIS2 Directive marks a turning point for cyber security in Europe, imposing higher standards on companies regarding network and information system security.

For Data Protection Officers (DPOs), adapting to these new regulatory requirements is not just an obligation but also an opportunity to strengthen corporate resilience and foster a widespread security culture.

In this article, we will explore the strategic actions that a DPO must implement to ensure compliance with NIS2, illustrating how the SGBox platform can provide the necessary tools to effectively support this process.

Understanding and analyzing the regulatory framework

The first step for a DPO is to gain a deep understanding of the requirements imposed by the NIS2 Directive.

This regulation introduces stricter measures for managing cyber security risks and requires stronger collaboration between the public and private sectors.

A DPO must:

  • Analyze the gaps: conduct a detailed assessment of the company’s current security status, identifying gaps in relation to the directive’s standards and overlap with GDPR.
  • Stay updated: keep track of regulatory developments and international best practices, ensuring that internal policies are always aligned with new European directives.

Developing an Integrated action plan

Once the regulatory framework is understood, the DPO must develop a detailed action plan that includes:

  • Defining objectives: set clear and measurable security goals, such as adopting advanced monitoring systems and incident response procedures.
  • Identifying necessary resources: determine the human, technological, and financial resources required to meet the set objectives.
  • Implementing audit and control processes: schedule periodic audits to monitor the effectiveness of implemented measures and ensure continuous improvement.

Risk Assessment and Management

Risk assessment is a fundamental component of effective security management:

  • Mapping risks: Identify all potential threats and vulnerabilities that could compromise data security and IT infrastructures.
  • Classifying assets: Evaluate the relative importance of different company assets, prioritizing protection measures based on the potential impact of an attack.
  • Continuous monitoring: Implement incident detection systems and monitoring tools to respond quickly to anomalies.

The SGBox platform proves to be a valuable ally in this phase, offering advanced real-time monitoring features and risk analysis tools.

With SGBox, the DPO can configure customized dashboards that integrate data from multiple sources, facilitating constant risk assessment and the management of critical assets.

Implementing technical and organizational measures

To comply with NIS2, it is essential to implement a series of technical and organizational measures, including:

  • Adopting cybersecurity solutions: utilize antivirus, firewalls, intrusion detection/prevention systems, and encryption solutions to protect sensitive data.
  • Continuous training: organize training sessions and updates for staff, increasing awareness of cyber risks and proper incident management procedures.
  • Backup and disaster recovery procedures: implement business continuity plans and secure backup solutions to ensure rapid recovery in case of an attack.

SGBox provides integrated support in this area, enabling centralized management of security solutions in a single platform.

This not only allows real-time security event monitoring but also efficiently manages backup and disaster recovery activities, ensuring business continuity.

Collaboration and communication with stakeholders

Compliance with NIS2 is not an isolated task but requires collaboration across various business departments and engagement with external stakeholders.

A DPO must:

  • Create an internal support network: establish effective communication channels between IT, legal, risk management, and communication departments to ensure a coordinated response to incidents.
  • Engage with authorities and partners: maintain an open dialogue with regulatory authorities (such as ACN) and external partners, sharing useful information to improve defense and prevention strategies.

The SGBox platform facilitates this collaboration with its reporting and document-sharing functionalities.

With SGBox, the DPO can create detailed and easily shareable reports, streamlining both internal and external communication and ensuring that all stakeholders are constantly informed about the security status.

Ongoing monitoring and periodic review

Compliance is not achieved merely through the initial implementation of measures but requires continuous monitoring and review:

  • Periodic audits: schedule regular checks to verify the effectiveness of implemented measures and address any issues.
  • Updating action plans: periodically review the action plan, integrating new technologies and regulatory updates to maintain an adequate security level against emerging threats.

With SGBox, the DPO can set up automatic notifications and periodic reports that simplify the review process.

The platform’s predictive analysis and machine learning capabilities help identify trends and potential vulnerabilities before they become serious problems.

The evolution of DPO’s role

The role of the DPO has evolved significantly with the introduction of the NIS2 Directive, requiring a proactive and structured approach to cyber security.

Through in-depth regulatory analysis, the development of an integrated action plan, continuous risk assessment, the implementation of appropriate technical and organizational measures, and constant communication with stakeholders, the DPO can ensure corporate compliance and effectively protect IT infrastructures.

The SGBox platform serves as a fundamental support in this journey, providing essential monitoring, integrated management, and advanced reporting tools to tackle the challenges posed by NIS2.

Investing in these technologies means not only complying with regulations but also strengthening corporate resilience against cyber threats, ensuring a secure and reliable environment for the entire business ecosystem.

SGBox for the NIS2>>
]]>
https://www.sgbox.eu/en/nis-2-and-data-protection-officer/feed/ 0
Cyber Security in the Healthcare Sector https://www.sgbox.eu/en/cyber-security-in-the-healthcare-sector/ https://www.sgbox.eu/en/cyber-security-in-the-healthcare-sector/#respond Fri, 14 Mar 2025 11:03:06 +0000 https://www.sgbox.eu/?p=26180
Cyber Security in the Healthcare sector

Cyber Security in the Healthcare Sector: the situation

The healthcare sector is facing numerous challenges related to technological advancements and the maintenance of personal data privacy.

In this context, a determining factor is cyber security, which is increasingly important within this sector.

According to the latest Clusit Report 2025, it is estimated that the healthcare sector is on of the most affected by cyber attacks, with 810 cyber incidents recorded globally (30% more than the previous year).

This rapidly growing trend demonstrates the need for greater investment in cyber security, starting from the designation of personnel responsible for cyber security to the definition of robust defense strategies that ensure the operational continuity of healthcare platforms.

In Italy, cyber threats have shown a slight decline compared to 2023, with the increase from 15 to 13 public domain incidents.

The most used type of attack is the Ransomware, which proves to be the most effective tool to damage national health infrastructures.

Main threats in the Healthcare Sector

  • Data Breaches: Data breaches can lead to the loss or theft of patients’ personal information, such as health insurance details, social security numbers, medical test results, and other sensitive information.
  • Ransomware: Ransomware attacks have become increasingly common in the healthcare sector. Cyber criminals encrypt patient data and demand a ransom to unlock it, causing disruptions in healthcare services and putting patient safety at risk.
  • Unauthorized Access: hackers may attempt to gain unauthorized access to healthcare IT systems to steal information or patient data.
  • Connected Medical Devices: with the rise of networked medical devices, such as heart monitors and insulin pumps, the risk of cyber attacks that could compromise patient safety is increasing.
  • Lack of Security Training: healthcare personnel may not be adequately trained to recognize cybersecurity threats and take appropriate measures to prevent them.
  • Integrity of Medical Data: cyber attacks could compromise the integrity of health data, altering test results or treatment details.
  • Regulations and Compliance: the healthcare sector is subject to numerous data security regulations and standards, including GDPR and NIS2.

The impact of the NIS2 Directive on the Healthcare Sector

The healthcare sector is undergoing an unprecedented digital transformation, integrating advanced technologies aimed at improving care quality and operational efficiency.

Incidents in the healthcare field, mostly classified as high severity, threaten not only patient data and privacy but also the continuity of care and the security of medical devices.

The entry into force of the new NIS2 Directive, scheduled for October 17, 2024, will enforce greater cyber security regulation within EU member states, requiring the implementation of minimum measures to mitigate cyber risk.

The Directive will also have a significant impact on the healthcare sector, leading to the strengthening of measures and processes to defend against cyber threats and ensure the protection of patients’ personal data.

Overall, we can say that NIS2 is not just a mandate but a great opportunity to improve the approach to cyber security, in terms of risk management, governance, and operational continuity management of medical devices.

The role of Artificial Intelligence

The World Health Organization has issued a document providing specific guidelines, “Regulatory Considerations on Artificial Intelligence for Health”, which lists the main rules AI must adhere to ensure its safe, effective, and responsible use in healthcare.

The six main guidelines are:

  1. Documentation and transparency
  2. Risk management and lifecycle approach to AI systems development
  3. Intended use and analytical and clinical validation
  4. Data quality
  5. Privacy and protection of personal and sensitive data
  6. Involvement and collaboration

SGBox for the Healthcare Sector

The SGBox platform supports organizations in the healthcare sector in defending against cyber threats through advanced functionalities for data collection, management, analysis, and incident response, in compliance with privacy regulations.

Discover the features for the healthcare sector >>
]]>
https://www.sgbox.eu/en/cyber-security-in-the-healthcare-sector/feed/ 0
Cloud SIEM: features, functions and advantages https://www.sgbox.eu/en/cloud-siem-features-functions-advantages/ https://www.sgbox.eu/en/cloud-siem-features-functions-advantages/#respond Wed, 05 Mar 2025 08:24:29 +0000 https://www.sgbox.eu/?p=18654
Cloud SIEM: caratteristiche, funzionalità e vantaggi

In the increasingly complex landscape of cyber threats, cybersecurity stands out as an indispensable priority for businesses of all sizes.

In this scenario, the key solution to ensure the protection of sensitive corporate data is represented by the revolutionary technology of Cloud SIEM (Security Information and Event Management).

This innovative solution is at the core of a comprehensive cloud security strategy, offering an advanced and flexible approach to monitor, analyze, and respond to potential threats in real-time.

By integrating cutting-edge security technologies, Cloud SIEM emerges as an essential pillar in defending IT infrastructures against cyberattacks.

What is Cloud SIEM?

Cloud SIEM is an innovative solution that harnesses the power of SIEM (Security Information and Event Management) within the Cloud to proactively monitor, analyze, and respond to threats to the corporate IT infrastructure.

Unlike on-premises solutions, Cloud SIEM offers unparalleled flexibility, allowing companies to adapt quickly to changes in the security landscape.

Cloud SIEM vs On-Premises

The main difference between a Cloud-based SIEM system and an On-Premises one lies in the underlying infrastructure.

While On-Premises SIEM requires significant investments in hardware and local maintenance, Cloud SIEM eliminates this need, allowing companies to focus on their core activities without managing a complex security infrastructure, also known as “SIEM as a service.”

The capabilities of Cloud SIEM in the Manufacturing sector

The manufacturing industry is facing an unprecedented digital transformation, characterized by massive adoption of industrial IoT, process automation and cloud systems integration.

In this context, Cloud SIEM solutions emerge as indispensable tools to ensure the security of critical infrastructures, protect intellectual property and mitigate risks related to the complexity of global supply chains.

The analysis of available sources shows how Cloud SIEM offers advanced real-time monitoring capabilities, integration with IoT ecosystems and regulatory compliance tools, while reducing operating costs by 30-40% compared to on-premises solutions.

Unified monitoring of OT and IT networks

The Cloud SIEM overcomes the limitations of traditional systems by providing a consolidated view of activities in both operational (OT) and computer (IT) systems.

Through pre-configured connectors, these platforms aggregate data from IoT sensors, Programmable Logic Controllers (PLCs), SCADA systems and cloud infrastructures, applying machine learning algorithms to identify behavioral anomalies in machinery.

Advantages of SGBox’s Cloud SIEM

  • Flexibility and scalability: SGBox’s Cloud SIEM offers unmatched flexibility, enabling companies to adapt to changing security needs. With the ability to scale resources based on requirements, businesses can manage security efficiently without investing excessively upfront.
  • Remote accessibility: another significant advantage of SGBox’s Cloud SIEM is remote accessibility. Companies can monitor and manage the security of their systems from any location, enabling an immediate response to threats even when personnel is on the move.
  • Automatic updates: with Cloud SIEM, security updates and patches are handled automatically by SGBox’s Cloud. This means that companies can benefit from the latest technological developments without dedicating internal resources to update management.

Cloud SIEM represents a significant step forward in protecting IT infrastructures. Its flexibility, accessibility, and simplified management provide an effective defense against cyber threats in a digitally evolving world. 

Businesses of all sizes can benefit from this advanced solution to ensure the security of their data and business continuity.

If cyber security is a priority for your company, Cloud SIEM could be the answer to your advanced protection needs.

More information on SGBox’s Cloud SIEM>>

FAQs (Frequently Asked Questions)

Cloud SIEM distinguishes itself from on-premises solutions through its cloud-based infrastructure, eliminating the need for investments in local hardware. From a security standpoint, Cloud SIEM offers advanced protection by implementing rigorous security protocols managed by the cloud provider. This ensures effective defense against cyber threats without requiring significant resources in terms of administration and maintenance.

SGBox’s Cloud SIEM actively addresses data privacy concerns. Cloud service providers adopt advanced security protocols and strict compliance policies to ensure the utmost protection of sensitive business data. Secure data management is at the core of SGBox’s Cloud SIEM design, providing businesses with maximum reliability in using this solution without compromising the privacy of sensitive information.

 

Cloud SIEM provides significant practical benefits to businesses of various sizes. Its flexibility allows companies to adapt quickly to changing security needs without requiring upfront investments in resources and infrastructure. Remote accessibility enables efficient security management from any location, facilitating a timely response to threats. Furthermore, automatic updates managed by the Cloud provider ensure that businesses consistently benefit from the latest technological developments without having to manually handle updates.

]]>
https://www.sgbox.eu/en/cloud-siem-features-functions-advantages/feed/ 0
Zero Trust Security: what does it consist of? https://www.sgbox.eu/en/definition-of-zero-trust-security/ https://www.sgbox.eu/en/definition-of-zero-trust-security/#respond Tue, 18 Feb 2025 08:15:00 +0000 https://www.sgbox.eu/?p=29773
Zero Trust security

In recent years, the concept of Zero Trust security has become a fundamental paradigm for protecting digital infrastructures.

But what is Zero Trust security? It is a cybersecurity approach based on the principle “never trust, always verify.”

In other words, access to corporate resources is strictly controlled and granted only after a thorough verification of the user’s or device’s identity and context.

This model differs from the traditional “defend the perimeter” approach, emphasizing internal security and network segmentation.

What is Zero Trust Security?

Zero Trust security is based on the premise that every network access attempt should be considered potentially risky, regardless of its origin.

This means that instead of relying on firewalls or perimeter security solutions, every access request is subjected to rigorous controls.

The core idea is to eliminate implicit trust, adopting a model where every entity—user, device, or application—is verified during every interaction.

This approach significantly reduces the risk of breaches, especially in an environment of increasing cyber threats.

How to build a Zero Trust architecture

To implement a Zero Trust architecture, it is essential to follow several key steps:

  • Identification and authentication: every user and device must be accurately identified. Using multi-factor authentication (MFA) is a fundamental practice to enhance security.
  • Network segmentation: dividing the network into micro-segments isolates resources and limits lateral movement in case of a breach.
  • Continuous monitoring: real-time activity monitoring helps detect abnormal behaviors and potential threats, enabling timely responses.
  • Granular access policies: defining who can access what, under which conditions, and for how long allows for more precise and dynamic controls.

When integrated into a unified framework, these measures create a secure and resilient environment capable of meeting the challenges of Zero Trust cybersecurity.

What are the benefits of the Zero Trust approach?

Adopting the Zero Trust strategy offers numerous advantages:

  • Reduced risk of breaches: rigorous controls and constant verifications limit unauthorized access and contain potential threats.
  • Greater visibility and control: continuous monitoring systems provide companies with a detailed view of data flows and activities within the network.
  • Flexibility and scalability: the Zero Trust architecture easily adapts to dynamic networks and cloud environments, simplifying security management in complex scenarios.
  • Protection of critical assets: network segmentation and granular access policies ensure that the most sensitive resources are always protected, reducing the impact of potential attacks.

How the SGBox Platform Supports Zero Trust architecture

The SGBox platform is designed to integrate Zero Trust security principles simply and effectively.

With advanced monitoring, authentication, and segmentation solutions, SGBox allows companies to:

  • Implement dynamic access controls: the platform supports the adoption of role-based, context-aware, and behavior-based access policies, ensuring maximum security.
  • Integrate heterogeneous systems: SGBox offers a unified environment to manage and monitor all network components, facilitating the adoption of a Zero Trust model.
  • Respond quickly to threats: with real-time analysis and monitoring tools, the platform enables rapid intervention in case of anomalies, reducing the impact of potential attacks.
DISCOVER THE PLATFORM>>
]]>
https://www.sgbox.eu/en/definition-of-zero-trust-security/feed/ 0
NIS2 Directive: what you need to know https://www.sgbox.eu/en/nis-2-directive-what-you-need-to-know/ https://www.sgbox.eu/en/nis-2-directive-what-you-need-to-know/#respond Fri, 07 Feb 2025 13:58:34 +0000 https://www.sgbox.eu/?p=22762
NIS2

What is NIS2?

The NIS2 Directive (Network and Information Security Directive) is a European regulation focusing on cyber security and the resilience of critical infrastructures and digital service providers.

Its introduction was motivated by the increase in cyber threats and the growing reliance on digital technologies across all critical sectors.

The NIS2 Directive is an important step toward greater regulation of cyber security throughout the European Union.

It builds on the foundations laid by NIS1, its predecessor, and aims to address the expansion of digital infrastructure in all critical sectors.

The EU initiated this regulation to respond to contemporary challenges and protect the digital landscape, safeguarding economic and social interests.

What NIS2 Envisions

The NIS2 Directive envisions the implementation of a holistic and structured approach to reduce risks and prevent cyber threats to sensitive data and IT systems.

The requirements include a wide range of tools and methodologies that encompass protecting the IT environment from attacks such as Ransomware, Phishing, and unauthorized access.

Here are the main features of NIS2:

  • Risk Management: The Directive requires the execution of a comprehensive Cyber Risk Governance framework, establishing specific roles, responsibilities, and escalation paths. 

This signals to organizations the need to enhance their cybersecurity vigilance and protect their operations and reputation.

  • Information Management: information is the lifeblood of modern businesses, and the NIS2 Directive emphasizes its secure management. Compliant organizations must demonstrate effective information security procedures, from encryption methods and secure data transmission channels to regular cybersecurity training for staff.

  • Security Enhancement: the Directive requires raising cybersecurity standards both in preventive defense and response procedures, and companies must demonstrate adherence to the Directive’s guidelines to avoid hefty penalties.

  • Expansion of Applicability: the NIS2 Directive surpasses the NIS division of Operators of Essential Services (OES) and introduces a broader division between essential and important entities, which must be identified by individual states by April 17, 2025.

  • Risk of Trust Loss: non-compliance with the NIS2 Directive can result in a significant loss of trust from customers, partners, and investors, as data breaches and cyber attacks become increasingly widespread.

  • Risk of Penalties: corporate executives are personally responsible for adhering to the NIS2 Directive, meaning they can be held personally accountable in case of non-compliance. This entails severe financial consequences, such as potential fines and damage compensation claims.

When will the NIS2 Directive come into force?

The EU cyber security rules introduced in 2016 have been updated by the NIS2 directive, which entered into force in 2023.

The requirements imposed by the Directive will become effective from the day after the date of transposition by the Member States, set for 17 October 2024.

NIS2 has modernised the existing legal framework to keep pace with increased digitalization and an evolving landscape of cyber security threats.

Compliance Requirements for Critical Infrastructures under the NIS2 Directive

The NIS2 Directive (Network and Information System Security) focuses on cyber security and the resilience of critical infrastructures and digital service providers within the European Union.

The compliance requirements for critical infrastructures under the NIS2 Directive are identified as follows:

  • Risk Analysis and Cybersecurity Policies: critical infrastructures must conduct risk analyses and establish cybersecurity policies to protect their operations and customer data.
  • Incident Management (Threat Response, Operational Continuity, and Recovery): critical infrastructures must activate effective incident management procedures, including threat response, operational continuity, and service recovery.
  • Supply Chain Security: critical infrastructures must ensure the security of the supply chain, protecting the data and information passing through the supply chain.

Who the NIS2 Directive applies to

The NIS2 Directive applies to sectors considered essential for the development of the economy and market within the European Union, such as:

  • Energy: the production, transmission, and distribution of electricity are considered critical infrastructures for energy security and economic stability in the EU.
  • Transport: transport services, such as traffic management systems, railway stations, and airports, are considered critical infrastructures for safety and citizen mobility.
  • Banking and Finance: banks and financial institutions are considered critical infrastructures for economic stability and the security of citizens’ deposits.
  • Healthcare: healthcare systems, such as care centers and healthcare facilities, are considered critical infrastructures for public health and patient safety.
  • Digital Infrastructures: communication systems, such as the internet and telecommunication infrastructures, are considered critical infrastructures for communication and citizen connectivity.
  • Postal Services: postal services, such as mail and parcel delivery, are considered critical infrastructures for communication and citizen connectivity.
  • Public Administration: government structures and public agencies are considered critical infrastructures for public policy management and citizen safety.
  • Digital Service Providers: digital service providers, such as payment service providers and security service providers, are considered critical infrastructures for security and economic stability in the EU.

How the NIS2 Directive can help SMEs improve their competitiveness

The NIS2 Directive can help SMEs (small and medium-sized enterprises) to improve their competitiveness in several ways:

  • Reduce the risk of cyber attacks: NIS2 requires organizations to take cyber security measures to reduce the risk of attacks and incidents, protecting their systems and data against cyber threats. This proactive approach helps reduce downtime and minimise economic damage caused by computer incidents.
  • Improving System Resilience: the NIS2 Directive promotes a multi-risk approach to reduce vulnerabilities and prevent incidents, improving IT risk management and system security. This approach helps ensure business continuity and reduce recovery times in the event of accidents.
  • Competitiveness: SMEs that take the security measures required by the NIS2 Directive can boast of increased competitiveness, demonstrating commitment to data protection to partners and customers. This approach helps strengthen customer confidence and improve business reputation.
  • Collaboration between companies and authorities: the NIS2 Directive promotes collaboration between companies and national authorities, favoring a coordinated approach to cybersecurity. This approach helps to strengthen corporate cyber resilience not only internally, but also in the network of suppliers and business partners.
  • Governance and risk management: the NIS2 Directive requires organizations to assess risks, including those related to the supply chain, and implement the necessary organizational measures to ensure business continuity. This approach helps to improve risk management and reduce downtime.
  • Supply Chain: SMEs must consider the vulnerabilities and the practices of cybersecurity for every own supplier, avoiding incidents or interruptions of the service. This approach helps ensure security and business continuity even in the supply chain.
  • Administrative penalties: key operators may be subject to administrative fines of up to €10 million or 2% of total global global turnover if they do not meet safety requirements. This approach helps incentivize organizations to comply with security requirements.

Upcoming deadlines for Compliance with the NIS2 Directive in Italy

Where do we stand in the process of adapting to the new requirements imposed by NIS2? Below are the key deadlines that companies need to consider:

  • February 28, 2025: Deadline for the registration of affected organizations on a portal that will be made available by the ACN (National Cybersecurity Agency), with some exceptions for which the deadline will be shorter.
  • April 15, 2025: deadline for the ACN to communicate the list of essential and important entities.
  • July 31, 2025: NIS entities must provide and update the information provided for in Article 7, paragraphs 4 and 5 of the NIS decree, including the list of members of administrative bodies and directors.
  • January 1, 2026: deadline for compliance with the incident notification obligation.
  • October 1, 2026: deadline for compliance with security measures obligations.
Here is how SGBox helps to be comply with NIS2>>
]]>
https://www.sgbox.eu/en/nis-2-directive-what-you-need-to-know/feed/ 0