SQL Injection Attack: What is it?
How many times have you heard about SQL Injection and promised yourself to understand what it is, without having the time or desire to do so? If you have three minutes, I'll try...
Read
What is meant by Digital Forensics
In today's world we hear more and more often about cyber incidents, hackers and APT groups. In this context some terms have now become commonly used, others...
Read
The importance of data integrity
What is File Integrity Monitoring? What tools are used nowadays? Two questions that require attention in every company or organization where data and more...
Read
What is a Web Application Firewall
A Web Application Firewall, WAF for friends, is a security application that protects web applications from malicious attacks and internet traffic...
Read
How the AI ​​Act will regulate Artificial Intelligence in the EU and what impact it will have
“When the results are announced, Lee Sedol's eyes well up with tears. AlphaGo, an artificial intelligence (AI) developed by Google's DeepMind, has just…
Read
Happy Cyber ​​2024
Last days of December, 2023 ends and it's usually the time to take stock of the year that is coming to an end but I'm going against the trend and want to throw myself into 2024 with some...
Read
Eng. Davide Ariu (Pluribus One): "We need excellent software engineers"
As usual, we continue the series of interviews with Italian companies that operate in the world of cyber and more generally of new technologies, protagonists in...
Read
The FSB has been engaged in cyber attacks against the UK for years
The UK has accused the FSB of a long-running cyber hacking campaign. The British government has accused the Russians of carrying out hundreds of targeted hacker attacks against…
Read

  
National and Technological Security: reflections on the French ban on using WhatsApp
The French government's recent initiative to ban the use of WhatsApp and other foreign messaging apps by...
Read
Ing. Rustaggia (Revobyte): "we will be present in Rome with the 'Design your digital transformation' event on November 30th"
We continue our crusade aimed at spreading knowledge of the cyber world and new technologies in...
Read
The culture of cyber security in secondary schools
The pilot project for the promotion of the culture of cyber security in secondary schools starts from Rome,...
Read
Cybersecurity training: interview with Dr. Manlio Longinotti (responsible for SANS Institute in Italy)
As the reader of this column knows, we have always tried to promote training in cyber and new...
Read
Technological warfare: a new chapter
As many readers will have noticed, we have been trying to follow what is happening in the world of technology for some time...
Read
Electronic Warfare, Cyber ​​Attack or Sabotage? Train attack in Poland
It is recent news that between 25 and 26 August about twenty passenger and freight trains were blocked...
Read
Attacks against Active Directory ? Also, but not only...
Reading while reading I came across a really interesting infographics. I have to admit that infographics make me…
Read
Artificial Intelligence in the Social Era
Artificial Intelligence (AI) is a discipline in the field of information technology that aims to create systems and machines in...
Read
Interview with Enrico Ingenito (PWNX): “From Zero To Hero”
What is PWNX? If you surf the Internet for a bit (https://pwnx.io/) you come across a site that talks about: challenges,...
Read
Crypto Wallets: What are they and which are the safest?
A feature advertised by Ledger, a well-known hardware wallet manufacturer, has caused quite a stir lately...
Read
Second SICYNT annual meeting
The second annual SICYNT meeting was held on Saturday 20 May at the CISCO headquarters in Rome....
Read
The cyber security department and the Army cyber protection brigade train jointly
The exercise conducted as part of bilateral activities with allied countries, between the Department ...
Read

Pages