Andrea Fortuna
AboutRss
  • Dec 30, 2025

    Glue employees hold teams together

    Why glue employees matter beyond metrics In a workplace culture obsessed with dashboards, the people who prevent avoidable breakdowns rarely show up in the numbers. They are the colleagues who stitch context together across teams, absorb tension before it becomes… read more »
  • Dec 29, 2025

    Chat control reopens a privacy fault line

    Why the proposal keeps returning In Brussels, few policy ideas die cleanly. They mutate, regroup, and reappear under a new compromise label. The EU’s “Chat Control” initiative follows that pattern. It is anchored to the draft regulation on preventing and… read more »
  • Dec 28, 2025

    When risk fragments, cybersecurity strategy stalls

    Security dashboards can look reassuring, but they can also hide a simple problem: risk information is scattered. Risk fragmentation happens when cybersecurity, audit, compliance, legal, and enterprise risk teams all produce correct work, yet leaders still struggle to decide what… read more »
  • Dec 23, 2025

    Making NIS 2 reviews work in real life

    Cybersecurity compliance is changing shape. Under the NIS 2 Directive, and through national implementations such as Italy’s ACN Determination 164179 (April 14, 2025), the focus shifts away from paperwork that looks good in a folder and toward security that keeps… read more »
  • Dec 17, 2025

    Maritime cyber rules are coming, are you ready?

    Why the sea is now a digital border Maritime transport has spent a decade chasing efficiency through digitization, automation, and end‑to‑end visibility. Today, a ship depends on software as much as it depends on steel, and a port behaves like… read more »
  • Dec 17, 2025

    Italy’s 10% cyber incident problem

    Why 10% is a national warning, not a trivia fact When a country that is not 10% of the world’s economy absorbs roughly 10% of the world’s publicly observed, high-impact cyber incidents, the figure is not a curiosity. It is… read more »
  • Dec 12, 2025

    Slowly dying: when companies trade substance for performance

    Slowly dying: when companies trade substance for performance The cult of appearances Decline rarely announces itself with a siren. In many organizations it arrives as an aesthetic: the town-hall stage, polished internal branding, the executive uniform (think Sergio Marchionne or… read more »
  • Dec 3, 2025

    Humanity first: Olivetti's blueprint for trustworthy AI

    Long before neural networks started drafting memos and marketing copy, Adriano Olivetti proved that advanced technology only thrives when it is anchored to humanistic intent. His factories in Ivrea blended design, culture, architecture, and social welfare into a single philosophy:… read more »
  • Nov 30, 2025

    Hidden metadata reveals what your iPhone silently records about you

    A recent forensic analysis by cybersecurity researcher Elorm Daniel uncovered a startling reality: iPhones continuously log detailed metadata that most users never see, including precise GPS coordinates from messages, complete password histories, and group memberships that persist even after users… read more »
  • Nov 27, 2025

    How artificial intelligence is transforming incident response in security operations centers

    Imagine a Security Operations Center where analysts are drowning in thousands of alerts every day. It’s like trying to spot a single suspicious person in a crowded stadium while everyone is shouting for your attention at once. This is the… read more »
  • Nov 24, 2025

    Shai-Hulud strikes again: massive supply chain attack compromises Zapier, ENS, and hundreds of npm packages

    The software supply chain ecosystem faced another severe threat as security researchers at Aikido Security detected a second wave of the notorious Shai-Hulud malware campaign on November 24, 2025. This sophisticated attack compromised 425 npm packages with a combined 132… read more »
  • Nov 21, 2025

    Rust vs C++: a modern take on performance and safety

    The world of systems programming has long been dominated by C++, a language that grants developers unparalleled control over hardware and memory. For over four decades, it has powered everything from operating systems to game engines, trading platforms, and embedded… read more »
  • Nov 20, 2025

    OSINT and Artificial Intelligence: A New Era of Intelligence Gathering

    The landscape of intelligence gathering is undergoing a seismic shift, driven by an explosion of digital information that defies human comprehension. For decades, Open Source Intelligence (OSINT) has been a cornerstone for analysts, investigative journalists, and law enforcement agencies, providing… read more »
  • Nov 19, 2025

    When security becomes the systemic risk: lessons from the Cloudflare outage

    Digital resilience has become synonymous with business survival and yesterday’s events served as a stark reminder that our most trusted guardians can become our greatest vulnerabilities. The massive Cloudflare outage that brought down platforms like ChatGPT, X, Spotify, and Canva… read more »
  • Nov 17, 2025

    Strategic disconnection: a guide to effective leadership

    The modern leader has become hostage to perpetual connection. Their reputation appears to depend on response speed, being always active in group chats, and maintaining an inbox in constant ferment. This activism creates an illusion of effectiveness that masks a… read more »
  • Nov 17, 2025

    Every log must fire: applying Chekhov's gun to cybersecurity incident reports

    The quiet rule that Anton Chekhov slipped into literary history, the idea that a gun hanging on the wall in act one must eventually go off, holds a surprisingly modern lesson for security teams. In an age where organizations drown… read more »
  • Nov 14, 2025

    The virtual CISO: a strategic security leadership for modern organizations

    This article emerged from an interesting email exchange I had with one of my blog readers a few days ago. That discussion inspired me to explore the Virtual CISO model in depth, examining how this approach is reshaping security leadership… read more »
  • Nov 10, 2025

    How organizations can adopt AI security tools without losing control

    The integration of artificial intelligence into cybersecurity operations represents both an unprecedented opportunity and a complex challenge for modern organizations. As threat landscapes evolve at machine speed, security teams are increasingly turning to AI-driven security tools to enhance their defensive… read more »
  • Nov 5, 2025

    Setting standards for digital investigations in the age of open source intelligence

    A satellite image documenting a potential war crime. A social media post capturing evidence of human rights violations. A geolocation pin that contradicts an official government narrative. In the digital age, these fragments of open source information have become powerful… read more »
  • Nov 4, 2025

    The dangerous confidence gap in corporate cybersecurity

    There’s a peculiar comfort in believing you’re safe. In cybersecurity, that comfort might be the most dangerous vulnerability of all. Recent research from CrowdStrike reveals what security professionals have suspected for years: companies consistently overestimate their preparedness for cyber threats,… read more »
Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andreafortunaig
  • andrea-fortuna
  • andrea
  • andreafortunatw

Cybersecurity expert, software developer, experienced digital forensic analyst, musician