APT 32 hack BMW and Hyundai?
A few days ago the news was that hackers would hit BMW and Hyundai. Hackers would have infiltrated BMW's corporate network this summer ...
Read
Lockheed Martin: some updates on cyber risk analysis
(Sometimes they come back ...) A few months ago we stopped to analyze the cyber risks related to the F-35, this included an analysis of the network (obviously of what is ...
Read
The "shadow warriors" brigade
It is a few days ago the news about the establishment of the 127th Cyber ​​Battalion of the Army National Guard of the State of Indiana. The new unit, based around 75 miles from ...
Read
The development of the cyber capacity of the Army
The Army Study Center, a center of thought for the military terrestrial component 1, launches the first civil and military studies project in the field of cyber defense: "...
Read
2019 SECURITY: AI and APT with ONLINE DEFENSE
Today at the Milan-Rho SAFETY fair, we'll see you at the "Cyber ​​Arena" of the 5 Pavilion, the exhibition, training and information area totally dedicated to Cyber ​​Security ...
Read
Hacking the hackers! When to fall into the (cyber) canvas is the spider itself ...
In previous articles the cyber space has often been represented as the far west in which the classic western movies are set, that is as a reality totally devoid of ...
Read
29 OCTOBER 1969: Arpanet is born, today's Internet
In 1958, US President DD Eisenhower creates the Advanced Research Project Agency, the agency of the US Department of Defense for the development of technologies ...
Read
Italy: new technologies, training and governance of non-existent risk
Today the computer is in many cases "invisible" at least in the sense of a tool necessarily consisting of a more or less bulky central unit that contains the ...
Read
Cyber ​​attack against Iran? The United States says ...
On October 16, Reuters leaves with an article-sensation "Exclusive: US carried out secret cyber strike on Iran in ...
Read
Domestic Security perimeter: companies focus on infrastructure and training
The recent decree law on the cyber security perimeter is the result of new reflections on the evolution of ...
Read
HOW-TO: How to build your own "homemade" Firewall
A practical way to save and keep your data safe. In this period when the finances of the companies and ...
Read
Cybertech 2019: many words and many good intentions. But the war has already been going on for years ...
In an important period for digital innovation and growth in Italy and throughout Europe, the Cybertech, as per ...
Read
Stories and anecdotes of a computer pioneer
Not quia difficilia sunt non audemus, sed quia non audemus difficilia sunt. (It's not because things are difficult that ...
Read
Cortana, what happens when "le" is asked to try out a mission to the limit?
Cortana, artificial intelligence from Microsoft with a name borrowed from a Halo videogame character ...
Read
Biometric Authentication: where we are and what impacts
23 has passed years since Peter Steiner published the infamous cartoon "On the Internet, nobody knows you're a ...
Read
F-35: analysis on cyber risks of fifth-generation fighters
The following article is for informational, illustrative and study purposes only. The "tests" performed in the article are not ...
Read
Create an innovative cyber startup: the main opportunities in Italy
We can affirm with certainty that MSME (micro and small-medium enterprises) represent the "backbone" of ...
Read
Protection from cyber-risks: at what point are they and what should cyber insurance cover
It is interesting that in a recent article in The Insurance Insider an international insurance broker (...
Read
Quantum Computing and Cryptography
The Human Being, by its nature, needs to evolve and communicate. Communication is one of the aspects ...
Read
Sea Turtle: attack on the entire Internet structure
Among the numerous cyber attacks that are discovered, reported (but never publicly admitted), often ...
Read

Pages