Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
970x20 Itcentric

Author: Sandro Sana

Sandro Sana

Member of the Red Hot Cyber Dark Lab team and director of the Red Hot Cyber Podcast. He has worked in Information Technology since 1990 and specialized in Cybersecurity since 2014 (CEH - CIH - CISSP - CSIRT Manager - CTI Expert). Speaker at SMAU 2017 and SMAU 2018, lecturer for SMAU Academy & ITS, and member of ISACA.
He is also a member of the Scientific Committee of the national Competence Center Cyber 4.0, where he contributes to the strategic direction of research, training, and innovation activities in the cybersecurity.

Profilo LinkedIn
Areas of Expertise Cyber Threat Intelligence, NIS2, Security Governance & Compliance, CSIRT & Crisis Management, Research, Disclosure, and Cyber Culture

Sandro Sana is a cybersecurity professional with over thirty years of experience in the ICT sector, specializing in cybersecurity, information systems governance, and digital risk management. He currently serves as CISO & Head of Cybersecurity at Eurosystem Group S.p.A., where he leads information protection strategies, operational resilience, and the security of critical infrastructures.

Current Positions

  • CISO & Head of Cybersecurity – Eurosystem S.p.A.: Responsible for security governance, cyber risk management, incident response, threat analysis, and the adoption of innovative solutions for the protection of corporate data and systems.
  • Director of the Red Hot Cyber Podcast: A weekly editorial format dedicated to cybersecurity, digital resilience, and cyber geopolitics, featuring industry experts and leading figures.
  • Member of the Scientific Committee – Cyber 4.0: Actively involved in providing strategic direction for research, training, and technology transfer activities within the national Competence Center.
  • Lecturer and Public Educator: Lecturer at ITS and SMAU Academy, committed to training the next generation of cybersecurity professionals.

Core Competencies

  • Cybersecurity Governance & Risk Management: design and implementation of security strategies focused on business continuity and organizational resilience.
  • Security Regulations and Frameworks: advanced expertise in NIS2, ISO/IEC 27001, CIS Controls, COBIT, ENISA, and NIST.
  • Threat Analysis & Incident Response: coordination of threat intelligence activities and management of cybersecurity incidents.
  • Education and Knowledge Sharing: development of editorial content and educational initiatives to promote cybersecurity awareness.

Initiatives and Contributions

  • Editorial Activity: author of over 600 articles published on Red Hot Cyber, Cybersecurity360, Digital360, SocialNews, and La nuova Gazzetta Piemontese.
  • Red Hot Cyber: member of the RHC Dark Lab and an active contributor to the community, with a strong commitment to technical and strategic dissemination.
  • Collaborations: support to companies, public administrations, and startups in developing effective cybersecurity and risk management strategies.

Professional Vision

He promotes an integrated vision of cybersecurity that combines technology, governance, and the human factor, in full compliance with European and international regulations. He strongly believes in knowledge sharing as a key tool to increase digital risk awareness and strengthen organizational resilience.

Web resources

Numero di articoli trovati: 71

Kimwolf: The IoT botnet that moves silently across corporate and government networks

The Kimwolf botnet represents one of the most insidious IoT threats to emerge recently. According to the latest analyses, this malicious infrastructure has already compromised over two million devices ,...

Undersea Cables: Ignored Warnings and Uncertain Trials. The Truth About Underwater Accidents

In recent years, Taiwan has seen a series of incidents in which its undersea cables have been damaged or destroyed, creating damage to critical infrastructure and political tensions. The Control...

PurpleBravo’s Contagious Interview: Malware Campaign Targets Global Firms

For over a year, the North Korean group PurpleBravo has been running a targeted malware campaign called “Contagious Interview,” using fake job interviews to attack companies in Europe, Asia, the...

Taiwan Citizens Accused in China of Smuggling and Cable Sabotage

Chinese authorities have formally charged two Taiwanese citizens with involvement in a smuggling operation linked to an incident in February that damaged an undersea cable and fueled renewed tensions between...

Critical RCE Vulnerability in D-Link DSL Routers – Update Now

A critical remote code execution (RCE) flaw in older D-Link DSL routers has been identified as CVE-2026-0625, with a CVSS v4.0 score of 9.3, indicating a high risk for users...

AI Systems Vulnerable to Attacks: Experts Warn of New Threats

At the recent Chaos Communication Congress in Germany, a new alarm was raised about the threats posed by artificial intelligence agents. According to cybersecurity specialist Johann Rehberger , a computer...

The Dark Side of Convenience: How Digital Payments Threaten Our Privacy

Five days in London, and I felt like I was living inside a permanent demo of the future. The sleek, convenient, frictionless one. The one where you do everything with...

UK Boosts Subsea Cable Protection with Autonomous Vessels

The UK government has announced plans to strengthen the protection of undersea cables using autonomous vessels. Military ships and aircraft will also be involved in this "defense." The UK Ministry...

Massive Cloud Cyberespionage: PCPcat Hits 59,128 Servers in 48 Hours

A large-scale, highly automated cyberespionage campaign is systematically targeting the cloud infrastructure that supports numerous modern web applications. In less than 48 hours, tens of thousands of servers have been...

Australia Boosts Papua New Guinea’s Digital Infra with New Undersea Cable

A new undersea cable funded by Australia under a recent mutual defence agreement with Papua New Guinea is set to strengthen the island country's digital infrastructure and ensure continuity of...