We contribute to the sustainable development of the countries where we operate, with innovative network infrastructures and digital services, sharing our skills and know-how. Read more

Latest press releases

Read the latest press releases and search the archives of TIM Group's Press Office.


The main themes of the activities pursued in 2018 in terms of cyber security and, more generally, information and network security, are:
·      ongoing work on the research, collection, management and use of intelligence connected with the new security threats (Cyber Threat Intelligence Management) with the development and experimentation on a proprietary Threat Intelligence Platform;
·      experimentation in Artificial Intelligence and in particular Machine Learning techniques for the development of new methods of analysing security data;
·      conception and start of development of innovative tools for the automation of specific cyber security processes;
·      participation in European research programmes (HORIZON 2020) and in particular the call for “Establishing and Operating a pilot for a Cybersecurity Competence Network to develop and implement a common Cybersecurity Research & Innovation Roadmap” with the CONCORDIA proposal (Cyber ​​security cOmpeteNCe fOr Research anD InnovAtion) first in the final ranking and accepted for four-year community funding;
·      overseeing and guiding mobile cyber security with participation, as Deputy Chair, in the work of the GSMA (GSM Association) Fraud and Security Group;
·      guidance of the NGMN Alliance Security Competence Team (Next Generation Mobile Network Alliance), an international organisation focused on the development of new generation networks and services, in particular the fifth generation (5G);
·      participation, within the ETSI, in the work of TC CYBER focused on cyber security and the ETNO field, NSecFC WG (Network and Services Security, Fraud and Cybercrime), and more specifically the CERT TF (Computer Emergency Response Team Task Force) subgroup on “Cyber ​​Threat Intelligence” and Distributed Denial of Service Mitigation;
·      implementation of various scouting and testing campaigns to identify and assess new security solutions/processes;
·      the development of new IPR