Stolen credentials, phishing campaigns created with AI, NIS2 and new security challenges: data from 211 Italian companies shows why security is now a matter of business resilience.
Most of attack attempts no longer come from emerging countries: Western countries are at the top of the ranking, with Italy at the third place behind Ireland and United States.
What were the main attack technique in 2025? How is the international cybercrime landscape evolving? What priorities should companies adopt to protect data, infrastructures, and users’ digital identities? Read the Data Gathering report to discover trends, real threats, and what to expect in the upcoming digital year.
The technology we use every day is not just a desk with a device and a screen turned on. It is an ecosystem that enables people to work effectively. A slow device, malfunctioning software, or systems that cannot communicate with each other are all invisible barriers that ultimately translate into lost productivity, accumulated frustration, and talented people looking elsewhere.
Many people think of IBM i as a “historic” technology tied to the past. However, it is a platform that continues to evolve and today represents a strategic asset for companies that want to embrace digital transformation without sacrificing stability. Its strength lies in combining reliability and modernity, enabling efficient infrastructure management and integration with the rest of the IT landscape.
To increasingly support you with your work, to keep track of everything that has been happening on your devices or systems in your company and of your business costs, we have implemented the Software dashboard on our MyElmec portal. As well as seeing the Inventory section, now you can check your software lifecycle and how your users use it, as well as managing a black list of the forbidden software, and just keeping track of the money you are spending.