Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
Banner Desktop

Author: Sandro Sana

Sandro Sana

Member of the Red Hot Cyber Dark Lab team and director of the Red Hot Cyber Podcast. He has worked in Information Technology since 1990 and specialized in Cybersecurity since 2014 (CEH - CIH - CISSP - CSIRT Manager - CTI Expert). Speaker at SMAU 2017 and SMAU 2018, lecturer for SMAU Academy & ITS, and member of ISACA.
He is also a member of the Scientific Committee of the national Competence Center Cyber 4.0, where he contributes to the strategic direction of research, training, and innovation activities in the cybersecurity.

Profilo LinkedIn
Areas of Expertise Cyber Threat Intelligence, NIS2, Security Governance & Compliance, CSIRT & Crisis Management, Research, Disclosure, and Cyber Culture

Sandro Sana is a cybersecurity professional with over thirty years of experience in the ICT sector, specializing in cybersecurity, information systems governance, and digital risk management. He currently serves as CISO & Head of Cybersecurity at Eurosystem Group S.p.A., where he leads information protection strategies, operational resilience, and the security of critical infrastructures.

Current Positions

  • CISO & Head of Cybersecurity – Eurosystem S.p.A.: Responsible for security governance, cyber risk management, incident response, threat analysis, and the adoption of innovative solutions for the protection of corporate data and systems.
  • Director of the Red Hot Cyber Podcast: A weekly editorial format dedicated to cybersecurity, digital resilience, and cyber geopolitics, featuring industry experts and leading figures.
  • Member of the Scientific Committee – Cyber 4.0: Actively involved in providing strategic direction for research, training, and technology transfer activities within the national Competence Center.
  • Lecturer and Public Educator: Lecturer at ITS and SMAU Academy, committed to training the next generation of cybersecurity professionals.

Core Competencies

  • Cybersecurity Governance & Risk Management: design and implementation of security strategies focused on business continuity and organizational resilience.
  • Security Regulations and Frameworks: advanced expertise in NIS2, ISO/IEC 27001, CIS Controls, COBIT, ENISA, and NIST.
  • Threat Analysis & Incident Response: coordination of threat intelligence activities and management of cybersecurity incidents.
  • Education and Knowledge Sharing: development of editorial content and educational initiatives to promote cybersecurity awareness.

Initiatives and Contributions

  • Editorial Activity: author of over 600 articles published on Red Hot Cyber, Cybersecurity360, Digital360, SocialNews, and La nuova Gazzetta Piemontese.
  • Red Hot Cyber: member of the RHC Dark Lab and an active contributor to the community, with a strong commitment to technical and strategic dissemination.
  • Collaborations: support to companies, public administrations, and startups in developing effective cybersecurity and risk management strategies.

Professional Vision

He promotes an integrated vision of cybersecurity that combines technology, governance, and the human factor, in full compliance with European and international regulations. He strongly believes in knowledge sharing as a key tool to increase digital risk awareness and strengthen organizational resilience.

Web resources

Numero di articoli trovati: 71

Kimwolf Botnet: The Rising Threat of DDoS Attacks on IoT Devices

A new and formidable enemy has emerged in the cyber threat landscape: Kimwolf, a fearsome DDoS botnet, is having a devastating impact on devices worldwide. The consequences of this threat...

Ink Dragon Targets Europe: Exploiting SharePoint and IIS Vulnerabilities

This news comes to us from Recorded Future (Insikt Group) News & Research feed: Check Point Research has documented a new wave of activity attributed to the China-linked threat actor...

Malicious VSCode Extensions Steal Crypto Wallets and Browser Sessions

Two malicious extensions have been discovered that infect developers' computers with stealer programs on Microsoft's Visual Studio Code marketplace. The malware can take screenshots, steal passwords and cryptocurrency wallets, and...

The Dark Side of AI: How Technology is Being Used to Control Humans

Cory Doctorow says it with the clarity of someone who has studied the consequences of digital capitalism for years: AI, as it's sold today, isn't about enhancing humans. It's about...

Taiwan Cracks Down on Submarine Cable Sabotage with New Laws

In recent years, Taiwan's underwater infrastructure—electricity cables, gas pipelines, and water systems—has been damaged on several occasions, particularly communications cables. On December 9, the Legislative Yuan passed a third reading...

The Dark Side of Internet Control: Durov’s Warning

Post 462 on Durov's official channel immediately went into “scream mode”: “ The end of the free internet. The free internet is becoming a tool of control .” No birthday...

Meta and Google suspend construction of two undersea cables due to instability in the Red Sea

Meta and Google have been forced to postpone several major undersea internet cable projects, including 2Africa and Blue-Raman , in the Red Sea corridor through which 20 percent of global...

Microsoft Azure blocks a 15.72 terabit per second DDoS attack

A massive DDoS attack was neutralized by Microsoft Azure on October 24. A single endpoint located in Australia was targeted by the attack, which reached a maximum speed of 15.72...

Did they give you a digital photo frame? It’s more than just family memories.

Researchers have discovered several critical vulnerabilities in Uhale digital picture frames running Android , with some models even downloading and executing malware during startup. They examined the Uhale app and...

Attack Techniques: What is a Command and Control (C2) Server?

Among the many strategies used by attackers, one of the most insidious is represented by Command and Control (C2) Servers. We often discuss them on the pages of RHC, but...