Domestic Security perimeter: companies focus on infrastructure and training
The recent decree law on the cyber security perimeter is the result of new reflections on the evolution of the cyber threat, the technological context and the panorama ...
Read
HOW-TO: How to build your own "homemade" Firewall
A practical way to save and keep your data safe. In this period in which the finances of companies and public administrations are put to the test, it is easy ...
Read
Cybertech 2019: many words and many good intentions. But the war has already been going on for years ...
In an important period for digital innovation and growth in Italy and throughout Europe, Cybertech, as for the past four years, reaffirms itself as the main ...
Read
Stories and anecdotes of a computer pioneer
Not quia difficilia sunt non audemus, sed quia non audemus difficilia sunt. (It is not because things are difficult that we do not dare, it is because we do not dare that they are difficult.) Lucio ...
Read
Cortana, what happens when "le" is asked to try out a mission to the limit?
Cortana, artificial intelligence from Microsoft with a name borrowed from a Halo videogame character, what happens when "you" are asked to try your hand at a ...
Read
Biometric Authentication: where we are and what impacts
23 years have passed since Peter Steiner published the infamous cartoon "On the Internet, nobody knows you're a dog" on The New Yorker, illustrating and, to some extent, ...
Read
F-35: analysis on cyber risks of fifth-generation fighters
The following article is for informational, illustrative and study purposes only. The "tests" performed in the article are not real tests on the infrastructures or networks of others, but ...
Read
Create an innovative cyber startup: the main opportunities in Italy
We can say with certainty that MSME (micro and small-medium enterprises) represent the "backbone" of the Italian economy. In fact, considering the only "micro" (ie ...
Read
Protection from cyber-risks: at what point are they and what should cyber insurance cover
It is interesting that in a recent article in The Insurance Insider an international insurance broker (...
Read
Quantum Computing and Cryptography
The Human Being, by its nature, needs to evolve and communicate. Communication is one of the aspects ...
Read
Sea Turtle: attack on the entire Internet structure
Among the numerous cyber attacks that are discovered, reported (but never publicly admitted), often ...
Read
Italian CyberChallenge: the experience of the University of Cagliari team
In the past we have given space to the activity called CyberChallenge.IT, with an article explaining the object ...
Read
Data, Information Security and Cyber ​​space: protect billions of data or dollars?
Most scholars and policy makers say that cyberspace favors lawlessness while ...
Read
The Russian Sytech, FSB contractor, hacked !!! Projects and data made public
News began to arrive, albeit late. The affected one doesn't look like one of the important ones, it's not a big ...
Read
Regin, the RAT used against "Google Russian" Yandex
In the world of computer security, the potential risks to companies and institutions, in the form of malware and toolkits ...
Read
Cybertech 2019 Tel Aviv: Israeli Excellence, a Military Model in favor of the Community and Innovation
That of the Tel Aviv CyberTech 2019 was a worldwide event, with hundreds of companies, guests and ...
Read
Metasploit, when the best defense is attack
In recent years we hear more and more often about "cyber attacks", "cyber warfare" and more generally about ...
Read
BlackBerry
BlackBerry Limited is a Canadian company based in Waterloo, Ontario, active in 30 Countries. Founded in 1984 with ...
Read
The NATO Cooperative Cyber ​​Defense Center of Excellence celebrates the entry of four new members
Bulgaria, Denmark, Norway and Romania join NATO CCDCOE, bringing the number of participating countries to ...
Read
Are CISCO routers at risk?
A few days ago, on Wired, an article with a disturbing title was published: "A Cisco router bug has massive ...
Read

Pages