Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Mobile
Banner Ancharia Desktop 1 1

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Stefano Gazzella

Stefano Gazzella
(163 articoli, 152 italiano, 11 inglese)163 articoli
152 italiano, 11 inglese

Privacy Officer and Data Protection Officer, serves as Of Counsel for Area Legale. Specializes in personal data protection and, in managing information security within organizations, pays particular attention to issues related to social engineering. Head of the scientific committee of Assoinfluencer, coordinates research, publication, and outreach activities. As a freelance journalist, writes about topics related to fourth-generation rights, new technologies, and information security.

Ultimi articoli di Stefano Gazzella in inglese

GDPR Data Breach: Email Errors and Consequences
Like it or not, sending an email to the wrong recipient constitutes a personal data breach under the GDPR. This obviously applies if the email contain...
The dark web isn’t selling your data. You’re the one putting it up for sale every day!
The tale of the Mayor who thought of banning axes… but then came the Saws
Once upon a time, there was a town that had a Magical Forest. It was happy to have it, even a little proud. Which is why all the citizens willingly sa...
The Poison of Curiosity and the Antidote of Cyber Hygiene: A Social Engineering Recipe
Curiosity, that old rascal. It’s the kind of thing that’s been making people click links or open attachments in a decidedly reckless manner for a ...
The “non-sensitive data” trap: the costly mistake for companies
A wonderfully widespread argument among those who work with personal data is that of underestimating the risks or refusing to address them at all. Thi...
Discipline your email first so you don’t regret it later
Managing employee email inboxes is often overlooked by organizations, despite the widespread use of email and its significant impact on privacy and se...
Will this latest article “against” ChatControl be absolutely useless?
We had already discussed the proposed “ChatControl” regulation almost two years ago, but given the roadmap currently underway, we find ourselves e...
Regulating out-of-office work: a best practice for organizations and beyond.
When talking about information security, we must first take a breath and realize that we need to dive deeper than just computer systems and directly e...
The European Union General Court “upholds” the transfer of personal data to the United States. For now
April 1st wasn’t an April Fool’s joke: the first hearing in the Latombe v. Commission case was adjourned to September 3rd for a ruling on the appe...
CISO vs. DPO: Collaboration or Cold War in Business?
Managing security is far from simple, it’s not something that can be standardized, and above all, it can’t be achieved through “solutions.” It...
Tea Dating App Data Breach: 72,000 Images and Over 1 Million Private Messages
The “Tea Dating Advice” app reported a data breach on July 25, 2025, involving 72,000 images of users registered before February 2024, including 1...