Know the opponent's cyber tactics
Any IT security and cyber protection activity is based on the determination of a border to be guarded (the security perimeter) and on the ...
Read
Venticento: a Made-in-Italy excellence in IT security
In other articles we have already dealt with the SOC (Security Operation Center) defining it as a complex organizational unit, generally centralized, which deals with ...
Read
How vulnerable is the US energy infrastructure?
This is what Americans are discovering these days. Sure, it's not the first time this has happened, but it's probably the first time a problem of this size has happened. There...
Read
The rise of cyber crime
It might sound like a movie title, but it's not. It is much more simply a trivial reality! Every day the news about hacker attacks, carried out in ...
Read
l CISCO Co-Innovation Center in Milan one year after its opening
In January 2020, the Cisco Cybersecurity Co-Innovation Center opened in Milan, within the structure of the Science Museum, the first in Europe. A little more than ...
Read
Locked Shields: the largest cyber tutorial in the world. This year Sweden wins
Also this year, between 13 and 16 April, the cyber exercise Locked Shields was held. As every year, the preparations and the conduct of the exercise have seen ...
Read
Facebook Data Public Disclosure and the disturbing feeling of addiction to the data breach
Technology is no exception, as every other area of ​​society has its arguments and some magic words that are on everyone's lips. Cyber ​​security ...
Read
The Quantum-Secure Net project (part 3/3): European product of QUANTUM KEY DISTRIBUTION
The following is the third and final part of the series of articles on quantum cryptography, which began with the previous two articles, where the elements were introduced ...
Read

  
What is the cyber kill chain?
In several articles we have mentioned the so-called "cyber kill chain" but on closer inspection we never really ...
Read
Whaling: what it is and what are the risks
In recent years, cyber attacks have evolved, changing shape and intensity. The global health crisis has ...
Read
The SolarWinds case, let's take stock
In an article from December 14, 2020, we talked about FireEye and how it was hacked. It was the same company ...
Read
The cyber national security perimeter: a new challenge for general counsel and compliance officers
In the difficult moment of reconstruction that will follow the great economic crisis caused by the pandemic, one of the assets ...
Read
The Quantum-Secure Net project (part 2/3): European product of Quantum Key Distribution
In the first article we introduced what are the main problems of modern cryptography, or rather, what ...
Read
TryHackMe: cyber and gamification
Some time ago I told you about the Ares project, an online platform developed according to the concept of ...
Read
Microsoft: security and privacy at the time of Covid
A few months ago we talked about the importance of security and privacy at the time of COVID (see article) ...
Read
CyberChallenge.it, the 2021 edition at the starting blocks
CyberChallenge.it is one of the many answers that Italy is giving (together with new degree courses, ...
Read
The Quantum-Secure Net Project (part 1/3): The quantum threat to modern cryptography
This article is divided into three parts, and aims to retrace the main elements of cryptography and ...
Read
The AIDA project: Artificial Intelligence at the service of law enforcement
The postulate of the eternal struggle between cops and thieves is also confirmed in its digital transposition. The...
Read
Money muling: a way to launder money
In this article I will talk about "money muling": an illegal practice that favors drug trafficking, trafficking ...
Read
2020: a year of hacking
Cyberspace is the most complex thing man has ever built: on the one hand, it represents the union of thousands of ...
Read

Pages