09/12/17 | Cyber
US Cyber Attack against North Korean missile capabilities?
Has the United States of America carried out cyber activities to sabotage the missile capabilities of North Korea? So it seems, at least according to what has already reported from the month of ...
2830
Read
06/11/17 | Cyber
The Sandworms and Ukraine: when cyber security takes on a strategic role
During the two days of Cybertech Europe (see article), in the famous "cloud" of the new congress center in Rome, the French philosopher Paul Virilio has been cited several times ...
1652
Read
03/11/17 | Cyber
There are no shortcuts in Cybersecurity!
In my last article: "Artificial Intelligence: Opportunity or Risk?", I tried to highlight some aspects of what is happening in the field of Intelligence ...
590
Read
25/10/17 | Cyber
Artificial Intelligence: Opportunity or Risk?
In Italy, practically unnoticed - perhaps because of fear of derision - a fact happened a few months ago and which, however, aroused arousing at least anxiety in the ...
1863
Read
22/10/17 | Cyber
In Prague, from 23 October, the Open Source Summit Europe
Open Source Summit Europe is perhaps the most anticipated event in the European landscape in relation to the famous "penguin" of the Linux Operating System. A week of events, meetings, ...
319
Read
16/10/17 | Cyber
Injection, Broken Authentication and XSS are the main cyber risks
OWASP is a standard for secure web application production and if we consider that almost all applications are now web-based ... OWASP is also a global organization that ...
1652
Read
06/10/17 | Cyber
Cyber security: what is a SOC?
The world of cyber security is every day more complex and to manage the many computer accidents, more and more organizations begin to consider the hypothesis of ...
13719
Read
04/10/17 | Cyber
Cybertech Europe 2017: an opportunity for Italy
Network, Cybercrime, Cybersecurity vulnerabilities, these are just some of the themes that we hear more and more often from the news, online news and other platforms ...
500
Read
23/09/17 | Cyber
"Barometers mad" in cyber-space. Here's how NotPetya and the other cyber-hurricanes have fired the 2017 summer
That just finished will certainly be remembered as one of the hottest and most dry seasons since the data ...
1927
Read
16/09/17 | Cyber
Cyber attack at the base of USS John S. McCain collision?
It has appeared in various newspapers, since the first days after the accident, the news of ongoing investigations into the collision ...
3099
Read
14/09/17 | Cyber
Defending against quantum computers: the US approach to the problem
The future has not arrived yet, but you have to prepare yourself to defend yourself against the new threats! It might sound like a sentence from ...
1289
Read
12/09/17 | Cyber
The cyber impact on the world is now measured in billions of dollars
A few months ago, someone might have been concerned about the news of one of the largest companies in the world ...
791
Read
04/09/17 | Cyber
Cyber defense? Safe programming is the basis of everything
When it comes to cyber defense, always think of the bad computer pirates and those who, on the other side of the ...
1433
Read
31/08/17 | Cyber
Future military decision-making processes will be supported by cloud supercomputers?
For the US Department of Defense, the answer appears to be positive. At least so it just appeared on the website of the ...
655
Read
21/08/17 | Cyber
President Trump elevates the United States Cyber Command to the rank of Unified Combatant Command
That the cyberspace and the operations accomplished through this fifth dimension had grown in importance was ...
1440
Read
07/08/17 | Cyber
A security helmet: view the Cyberspace
Cyberspace, understood as a new dimension in which man can interact (and when war happens), to those who seek ...
884
Read
31/07/17 | Cyber
At Cyber Space Frontiers: What happens if a video can be encoded in the DNA of a bacterium?
The world is increasingly complex and often scientific discoveries can have unpredictable facets ....
1261
Read
25/07/17 | Cyber
The CIA also recruits Star Wars rebels, while cyber attacks prove to trigger a real international crisis
The Vault 7 operation by Wikileaks is about to go to the first six months since its inception, the 7 last March. At the rhythm of ...
1724
Read
14/07/17 | Cyber
What is FIWARE?
This is a European initiative created by the Public Private Partnership Future Internet, aimed at increasing the ...
3255
Read
24/06/17 | Cyber
Cyber News: DPCM 17 February 2017 released
The new "directive containing indications for cyber protection and computer security ... has recently come out ...
1879
Read