Andrea Fortuna
AboutRss
  • Jan 21, 2026

    Curiosity, boundaries, and trust: Ted Lasso lessons for security leaders

    I didn’t expect a feel-good comedy to stick with me as much as Ted Lasso did. Also, I know basically nothing about football, which makes it even funnier that a show built around it completely won me over. Yes, it’s… read more »
  • Jan 20, 2026

    Enterprise security faces new threat from AI-powered browsers

    AI-powered browsers are here, and they’re fundamentally changing how people work, which naturally means they’re breaking all the security assumptions we’ve carefully built over the years. Security firms and researchers are raising serious red flags about deploying these tools in… read more »
  • Jan 19, 2026

    Peeking into /proc: turning live Linux data into evidence

    After a long stretch of management talk and incident playbooks, it feels good to get my hands dirty again. This round is about Linux internals, and more precisely the /proc virtual filesystem, because a well-run forensic workflow can turn that… read more »
  • Jan 19, 2026

    What's really slowing down your incident response

    When a security incident hits (a data breach, an active intrusion, ransomware crawling across your network) most people assume technical complexity is what slows everything down. And sure, modern infrastructures are a mess of layers, distributed components, and fragile dependencies.… read more »
  • Jan 11, 2026

    Cloudflare–AGCOM: who controls resilience?

    Resilience is not just the ability to “recover after an incident”, it is the ability to keep operating when dependencies become hostile, unavailable, or legally contested. The AGCOM–Cloudflare clash is a real-world stress test of Europe’s digital posture, and it… read more »
  • Jan 10, 2026

    Italy's 2025 cybercrime report reveals a nation under digital siege

    The numbers behind Italy’s cyber battle The Polizia Postale e per la Sicurezza Cibernetica has released its annual report for 2025, offering a comprehensive snapshot of cybercrime trends in Italy. The figures paint a complex picture: 51,560 cases handled, 293… read more »
  • Jan 5, 2026

    Incident Response is a team sport: the ‘Total Football’ playbook

    I have a confession: I’m hopeless at football. I don’t really know the rules, I can’t explain offside without Googling it, and I’ve never been the kind of person who can watch a full match and genuinely track what’s happening.… read more »
  • Jan 4, 2026

    The Cloud Kill Switch: how Europe’s digital dependence became a Single Point of Failure

    Imagine it’s Monday morning. Hospitals can’t log into patient systems. Tax portals fail open with “service unavailable.” Municipalities can’t access email, document storage, or identity providers. Banks fall back to “degraded mode” and still can’t complete core transactions because APIs… read more »
  • Jan 4, 2026

    Forensic timeliner 2.2: unifying evidence for faster dfir

    Why unified timelines matter now In incident response, speed is rarely blocked by a lack of data. The bottleneck is the opposite, too many artifacts arriving in incompatible formats, each capturing a narrow slice of behavior. A workstation might produce… read more »
  • Dec 30, 2025

    Glue employees hold teams together

    Why glue employees matter beyond metrics In a workplace culture obsessed with dashboards, the people who prevent avoidable breakdowns rarely show up in the numbers. They are the colleagues who stitch context together across teams, absorb tension before it becomes… read more »
  • Dec 29, 2025

    Chat control reopens a privacy fault line

    Why the proposal keeps returning In Brussels, few policy ideas die cleanly. They mutate, regroup, and reappear under a new compromise label. The EU’s “Chat Control” initiative follows that pattern. It is anchored to the draft regulation on preventing and… read more »
  • Dec 28, 2025

    When risk fragments, cybersecurity strategy stalls

    Security dashboards can look reassuring, but they can also hide a simple problem: risk information is scattered. Risk fragmentation happens when cybersecurity, audit, compliance, legal, and enterprise risk teams all produce correct work, yet leaders still struggle to decide what… read more »
  • Dec 23, 2025

    Making NIS 2 reviews work in real life

    Cybersecurity compliance is changing shape. Under the NIS 2 Directive, and through national implementations such as Italy’s ACN Determination 164179 (April 14, 2025), the focus shifts away from paperwork that looks good in a folder and toward security that keeps… read more »
  • Dec 17, 2025

    Maritime cyber rules are coming, are you ready?

    Why the sea is now a digital border Maritime transport has spent a decade chasing efficiency through digitization, automation, and end‑to‑end visibility. Today, a ship depends on software as much as it depends on steel, and a port behaves like… read more »
  • Dec 17, 2025

    Italy’s 10% cyber incident problem

    Why 10% is a national warning, not a trivia fact When a country that is not 10% of the world’s economy absorbs roughly 10% of the world’s publicly observed, high-impact cyber incidents, the figure is not a curiosity. It is… read more »
  • Dec 12, 2025

    Slowly dying: when companies trade substance for performance

    Slowly dying: when companies trade substance for performance The cult of appearances Decline rarely announces itself with a siren. In many organizations it arrives as an aesthetic: the town-hall stage, polished internal branding, the executive uniform (think Sergio Marchionne or… read more »
  • Dec 3, 2025

    Humanity first: Olivetti's blueprint for trustworthy AI

    Long before neural networks started drafting memos and marketing copy, Adriano Olivetti proved that advanced technology only thrives when it is anchored to humanistic intent. His factories in Ivrea blended design, culture, architecture, and social welfare into a single philosophy:… read more »
  • Nov 30, 2025

    Hidden metadata reveals what your iPhone silently records about you

    A recent forensic analysis by cybersecurity researcher Elorm Daniel uncovered a startling reality: iPhones continuously log detailed metadata that most users never see, including precise GPS coordinates from messages, complete password histories, and group memberships that persist even after users… read more »
  • Nov 27, 2025

    How artificial intelligence is transforming incident response in security operations centers

    Imagine a Security Operations Center where analysts are drowning in thousands of alerts every day. It’s like trying to spot a single suspicious person in a crowded stadium while everyone is shouting for your attention at once. This is the… read more »
  • Nov 24, 2025

    Shai-Hulud strikes again: massive supply chain attack compromises Zapier, ENS, and hundreds of npm packages

    The software supply chain ecosystem faced another severe threat as security researchers at Aikido Security detected a second wave of the notorious Shai-Hulud malware campaign on November 24, 2025. This sophisticated attack compromised 425 npm packages with a combined 132… read more »
Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andreafortunaig
  • andrea-fortuna
  • andrea
  • andreafortunatw

Cybersecurity expert, software developer, experienced digital forensic analyst, musician