Cybersecurity: prioritize remediation of the vulnerable surface
Prioritization is the art of answering the questions "where do I start?" and "with what do I continue?" In this article we analyze how to compare theory and practice to solve ...
Read
Windows versus Sourgum
It is Saturday 17 July 2021 and together with Alessandro Rugolo, Danilo Mancinone, Giorgio Giacinto and their respective families we are near Dorgali, a small town in the center of ...
Read
The Golpe Figliuolo
The appointment of a general to "patch up" the inability to manage a complex situation has created and still creates confusion, controversy and - perhaps worse - defenses to ...
Read
Nicola Cristadoro: The move of the Dragon
Nicola Cristadoro Ed. Il Maglio pag. 352 Security and espionage services, but also national interests and ...
Read
Estonia and Russian Special Services influence operations in Cyberspace
According to the annual report "International security and Estonia" of 2021, Russia continues to be the main threat to Western democracies, even in cyberspace. The...
Read
Luciano and Simonetta Garibaldi: Events and protagonists of the Fascist period
Luciano and Simonetta Garibaldi Ed. History Archive, Fidenza (PR) 2018 p. 201 The authors, father and daughter, one of ...
Read
Defense ON AIR: "interview with the winning team of CyberChallenge.it 2021"
Wednesday 21 July at 12.00 we interview the UniCA Team of the University of Cagliari, winner of the national final of the CyberChallenge.it training program ...
Read
Artificial Intelligence: evasion techniques and cyber defenses
It is counterintuitive to the idea of ​​rationality, speed, effectiveness and efficiency that we have made of computers, but the reality is that artificial intelligence systems (AI ...
Read
The "dual use" seen by the military soldier and the politician
It may happen that if you meet the gaze of a soldier engaged in an activity of the varied dual use range, a ...
Read
Fake News, Deepfake, Fake People: the new frontier of Cyber ​​Security
During last year's lockdown I started writing an article that never had the light and that had as ...
Read
From raw data to usable information: visibility and observability
Once upon a time there was traditional IT ... In a well-defined and limited company perimeter, servers, routers, ...
Read
Confidentiality - Integrity - Availability in Operation Technology from an Industry 4.0 perspective: part two
An automated production system managed in Industry 4.0 necessarily has an internal / ...
Read
Surviving under attack: cyber resilience
As repeatedly recalled on these pages, and reiterated a few days ago by the Delegated Authority of the ...
Read
The flag on its knees
It seems strange to see, these days, the Italian flag waving outside bars, on balconies or dangling from ...
Read
The policeman under investigation for the "shooting" in Termini: will politics proceed with concrete regulatory reforms?
As is now known, the Rome prosecutor's office would have opened an investigation into the "shooting at Termini station" where an agent ...
Read
The Operating System: the soul of PCs
We can say that the first great IT revolution took place with the birth of the Operating Systems which ...
Read
Social Engineering: Why Should Companies Fear It?
“Cyber ​​security is difficult (maybe even impossible), but imagine for a moment that you have succeeded. There...
Read
ON AIR Defense "Build Back Better World: Beginning of the End of China's Strategic Influence?"
With the arrival of President Draghi, a glimmer of light appeared in the night, whether it is dawn or a passing firefly ...
Read
Di Maio anti-Isis champion. Laugh so as not to cry ...
The threat from the Islamic State “is particularly alarming on the African continent, specifically in the region ...
Read
Confidentiality - Integrity - Availability in Operation Technology from an Industry 4.0 perspective: part one
With this study we want to invite you to learn more about the world of Operational Technology (OT) with reference ...
Read

Pages