Cybersecurity: prioritize remediation of the vulnerable surface
Prioritization is the art of answering the questions "where do I start?" and "with what do I continue?" In this article we analyze how to compare theory and practice to solve ...
Read
Windows versus Sourgum
It is Saturday 17 July 2021 and together with Alessandro Rugolo, Danilo Mancinone, Giorgio Giacinto and their respective families we are near Dorgali, a small town in the center of ...
Read
Estonia and Russian Special Services influence operations in Cyberspace
According to the annual report "International security and Estonia" of 2021, Russia continues to be the main threat to Western democracies, even in cyberspace. The...
Read
Artificial Intelligence: evasion techniques and cyber defenses
It is counterintuitive to the idea of ​​rationality, speed, effectiveness and efficiency that we have made of computers, but the reality is that artificial intelligence systems (AI ...
Read
Fake News, Deepfake, Fake People: the new frontier of Cyber ​​Security
During last year's lockdown I started writing an article that never had the light and which had the aim of making people reflect on the phenomenon of fake news that I have ...
Read
From raw data to usable information: visibility and observability
Once upon a time there was traditional IT ... In a well-defined and limited company perimeter, servers, routers, switches, workstations, laptops, firewalls, and various other entities coexisted ...
Read
Confidentiality - Integrity - Availability in Operation Technology from an Industry 4.0 perspective: part two
An automated production system managed in Industry 4.0 necessarily has an internal / external data and process management network available (recipe of ...
Read
Surviving under attack: cyber resilience
As repeatedly recalled on these pages, and reiterated a few days ago by the Delegated Authority of the Information System for the security of the Republic, Italy is in strong ...
Read
The Operating System: the soul of PCs
We can say that the first great IT revolution took place with the birth of the Operating Systems which ...
Read
Social Engineering: Why Should Companies Fear It?
“Cyber ​​security is difficult (maybe even impossible), but imagine for a moment that you have succeeded. There...
Read
Confidentiality - Integrity - Availability in Operation Technology from an Industry 4.0 perspective: part one
With this study we want to invite you to learn more about the world of Operational Technology (OT) with reference ...
Read
Diversity & Inclusion: the cyber protection of vulnerable groups
In cyber risk assessment, the consideration of a large slice of vulnerability is based on evidence and ...
Read
Security and DevOps: what does "shift left" mean?
In the DBIR (Data Breach Investigations Report) 2021 document released in May by Verizon we analyze the ...
Read
Microsoft PowerShell and the new frontiers of malware
Most Microsoft Windows users (in particular, system administrators) will have heard of ...
Read
Consume Cyber ​​Threat Intelligence
Work often leads me to have conversations with clients about CyberSecurity, their programs, their ...
Read
International alert! When the cyber-enemy breaks through the closet ...
Since the 70s, social and technological evolution has progressively changed the paradigm ...
Read
Vaccines and dark web
COVID 19 has affected our lives over the past 18 months forcing us to change our lifestyle habits ...
Read
"Networking" to defend the "network": the MITER ATT & CK case
As mentioned in my previous article, any hacker has an "attack operating profile", recognizable by the ...
Read
The attack on the TOR infrastructure - Cryptocurrencies the real target
When it comes to online anonymity and browsing the Dark Web, Tor is often referred to. In the common imagination of Tor ...
Read
Know the opponent's cyber tactics
Any cyber security and cyber protection activity is based on establishing a boundary from ...
Read

Pages