17/10/22 | Cyber
Is there democracy without cyber security?
“If we want everything to remain as it is, everything must change”. So spoke Tancredi Falconeri in "Il Gattopardo" addressing his uncle, prince of Salina, skeptical of ...
426
Read
10/10/22 | Cyber
SICYNT: the importance of disclosure in the digital society
The first SICYNT conference on the importance of ...
398
Read
12/09/22 | Cyber
The geopolitics of chips
For several years now we have been hearing about semiconductor geopolitics and for me it is time to deepen the subject. To do this, let's start with a recent article ...
3257
Read
05/09/22 | Cyber
Robot and Artificial Intelligence
We now hear a lot about Artificial Intelligence (AI), the Strategic Program for Artificial Intelligence 2022-2024 (see document) defines it as the whole ...
2215
Read
22/08/22 | Cyber
Zero trust: what does it mean?
The world of security is constantly evolving and with it, the language used by technicians and the security industry and new technologies. One of the terms increasingly ...
869
Read
26/07/22 | Cyber
Hacked the Revenue Agency?
July 25, in Rome the temperature is always higher, and not just that of the weather! A few days ago the government fell, today it seems that it is the turn of the Revenue Agency ....
1738
Read
25/07/22 | Cyber
Cyber Influence, and we are all part of the global community!
"Cyber-Influence, a new term created to indicate an activity as old as the world, influence, carried out with modern methods and means (cyber) in particular relating to ...
511
Read
23/07/22 | Cyber
Ergonomic Cybersecurity
I have often had the opportunity to evaluate different approaches to cyber protection, in different areas. Many times the setting was too superficial, the security policies ...
590
Read
18/07/22 | Cyber
Information warfare and cyber warfare, what are the relationships?
As it happens more and more often, I find myself writing an article to answer the curiosity of friends. This...
1102
Read
07/07/22 | Cyber
Grandma in Alexa
Personally I am fascinated by artificial intelligence, technology and how gradually but ...
1019
Read
27/06/22 | Cyber
How safe are VPNs?
With this short article I will try to answer the question that was asked to me a few days ago: "How much is ...
3546
Read
13/06/22 | Cyber
Metaverse, society and cybersecurity
For some time now I have been thinking of writing something about it. As I reflected, time passed and the web is now ...
861
Read
06/06/22 | Cyber
What is a computer virus?
Someone argues that when disclosure in the cyber sector, everything is fine to get the message across ...
962
Read
16/05/22 | Cyber
DDoS and viruses
It may seem strange but in our hyper-connected world, where you go by dint of English acronyms and terms, you don't ...
1610
Read
11/05/22 | Cyber
ALAMEDA: Artificial Intelligence for the treatment of brain disorders
Provide personalized care and better treatments to patients with major brain disorders by reducing the ...
711
Read
09/05/22 | Cyber
Locked shields 2022: Finland in first place
This year Finland takes first place in one of the largest and most complex live cyber defense exercises in the ...
858
Read
26/04/22 | Cyber
Multicloud: what risks and challenges
The accelerated multi-cloud strategy - which has characterized the past two years - has enabled organizations ...
651
Read
11/04/22 | Cyber
The Metaverse is now a reality: what challenges await us?
The Metaverse is mostly described as a virtual world that was created by combining different technologies. It...
2780
Read
06/04/22 | Cyber
Cyber Defense: the 6th edition of the Cyber Eagle exercise concluded
With the final conference on 5 April, held in the presence of the Deputy Chief of Staff of the Air Force ...
334
Read
04/04/22 | Cyber
Cyber Threat Intelligence: what are we talking about?
The use of English in the tech-rich world we live in is a constant, as is the speed of ...
978
Read