Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
LECS 320x100 1
HackTheBox 970x120 1

Author: Antonio Piovesan

Antonio Piovesan

He graduated in Computer Engineering in 2002 and CISSP certified since 2023, entered the ICT world as an analyst/full stack developer.
He continued his education by attending an executive Master in cybersecurity and data protection at 24ORE Business School.
He now deals with cybersecurity governance issues in the large-scale retail sector.
He has a strong passion for technology, innovation and cybersecurity, promoting the spread of digital risk awareness. He loves reading books on the history of mathematics and is a fan of science fiction literature and film.

Profilo LinkedIn
Areas of Expertise NIS2, Governance & Security Compliance, DevSecOps, Cyber Awareness & Culture

Antonio Piovesan works as a Digital Security Specialist with over twenty-five years of experience in the ICT sector. He has specialized in cybersecurity over the past ten years, focusing on secure code development, vulnerability management, and information systems governance. He currently serves as Digital Security Specialist at Aspiag Service Srl (SPAR Austria Group), where he is responsible for information protection strategies, compliance with Italian and European regulations, and secure software development practices. Since 2023, he has been an ISC2 member certified as CISSP.

Current Positions

  • Digital Security Specialist – Aspiag Service Srl: Acting as deputy CISO, part of a team handling security governance, IT risk management, incident response, threat analysis, and the adoption of innovative solutions to protect corporate data and systems.
  • Red Hot Cyber: Author of articles for technical dissemination on IT and digital security topics.

Core Competencies

  • Cybersecurity Governance: Defining and implementing security policies focused on operational continuity and resilience.
  • Security Regulations and Frameworks: Advanced expertise in NIS2, ISO/IEC 27001, ENISA, and NIST.
  • DevSecOps: Initiatives for secure source code development.
  • Education and Awareness: Creation of editorial content and training activities to promote cybersecurity culture, including Italian-language content for group e-learning security awareness modules.

Professional Vision
He strongly believes in dissemination as a key tool to increase digital risk awareness and strengthen organizational resilience.

Numero di articoli trovati: 9

Discovering the Deep Web and Dark Web: The Ultimate Guide

There has been a lot of talk for some years now about the deep web and the dark web, and many have wondered: but what exactly does this mean? The...

Discovering IaB JohnDoe7: Access for sale from the common man

We continue our series of articles on Initial Access Brokers with an article on JohnDoe7 (also known as LORD1), who, as we'll see later, uses a name/moniker reminiscent of movies...

What is phishing? Let’s avoid falling for the hack-fisherman’s bait.

With the increase in ransomware attacks—often launched via phishing emails—it's crucial to be proactive in protecting yourself and the organization you work for. Certainly, having computers and servers that are...

Fox Kitten and Br0k3r: The Iranian Cyber Contractor Collaborating with Ransomware Gangs

We continue our series of articles on IABs by writing about an Iranian cyber contractor that not only works as an initial access broker but also provides support to ransomware...

How CDNs can save your website: Speed and security at the highest level

Let's talk a bit about CDNs, or Content Delivery Networks, and how they can be real digital lifesavers. Imagine being in a crowded restaurant. There's only one waiter running around...

Scam Alert: How I Almost Fell for a Million-Dollar

My name is Elena and I am a 35-year-old housewife. One day, while I was checking my email, I found a mail that caught my attention. The sender introduced himself...

The Deception of the Wallet: A Journey into the World of Scammers

Giorgio sat in the self-help circle, the dim candlelight dancing on the walls. The eyes of the other participants were fixed on him, waiting for him to speak. It was...

Ada Lovelace and Charles Babbage, pioneers of programmable computing

Author: Antonio Piovesan Great Britain, middle decades of the 19th century, times of unprecedented engineering ambitions. Engineering, transportation, communications, architecture, science and manufacturing are in a feverish state of evolution....

Avoiding the fis-hack-erman’s hook (aka Detecting a Phishing email)

Author: Antonio PiovesanPubblication Date: 09/08/2021 With the increase of ransomware infections - often instigated through phishing emails, it's very important/crucial to take proactive measures to help protect yourself and your...