Crypto Wallets: What are they and which are the safest?
Recently, a feature advertised by Ledger, a well-known manufacturer of connected hardware wallets, has caused quite a stir, which would allow the extraction of the seed for...
Read
Second SICYNT annual meeting
The second annual SICYNT meeting was held on Saturday 20 May at the CISCO headquarters in Rome. SICYNT is an Italian association born with the aim of...
Read
The cyber security department and the Army cyber protection brigade train jointly
The exercise conducted as part of bilateral activities with allied countries, between the Cyber ​​Security Department (RSC) and the specialists of the Cyber ​​Army has ended...
Read
The CHIRONEX 23-1, the first cyber exercise of the Navy, has ended
CHIRONEX 23-1, the first cyber exercise for the Navy, ended this morning on board the Cavour aircraft carrier in the Open Sea area 23-1. The undersecretary of state...
Read
Link with the Forum International de la Cybersécurité in Lille
The Forum Internacional de la Cybersécurité (FIC) is underway in Lille, France. French and international companies present the latest news and address issues concerning the...
Read
Windows vs Linux
The article that I am about to write wants to emphasize some aspect of two different and at the same time similar visions of the idea of ​​Operating System. It is mandatory to make a short…
Read
CyberSec2023: also Defense on the front line
On March 2023, XNUMX Luigi Garofalo, director of Cybersecurity Italy, launched the second edition of CyberSec, an international conference in the cyber sector entitled...
Read
Innovation: on the edge of reality with Robots that change their state of matter
Some time ago, for science fiction lovers, films entitled "Terminator" were released in which a robot was capable of changing the state of its component matter to...
Read

  
How phishing campaigns are performed and what data is useful for attackers
Part of my job is to test the human element of security in organizations by building and launching...
Read
ChatGPT: an instructive chat with an Artificial Intelligence
Surely in the last few weeks you have heard of ChatGPT, a chat that makes use of Artificial Intelligence...
Read
EU and project funding (cyber)
Knowledge is the basis of everything! Who knows how many times you've heard that. Yet, although the concept is…
Read
Quantum Threat: Challenge to modern cryptographic systems
In recent months, the world of cryptography has been shaken by two announcements: the White House has issued a memorandum…
Read
NATO and Cognitive Warfare
We have already talked about Cognitive Warfare and the importance of what in some circles is considered...
Read
Knowledge Management and technology
As always happens, there comes a time when something needs to change, in life as in work or in society. ...
Read
From Information Warfare to Cognitive Warfare
Those who follow the evolution of the military field will not have missed that after Cyber ​​Warfare, Information Warfare and...
Read
Lockheed Martin and Microsoft, classified cloud and new technologies for American defense
A few days ago the announcement was made that the two giants, Lockeed Martin and Microsoft, have decided to enter into an alliance...
Read
Browser fingerprint, with all due respect to privacy!
I think everyone knows what a browser is, so I take it for granted and ask instead if you know what a browser is ...
Read
Is there democracy without cyber security?
“If we want everything to remain as it is, everything must change”. So spoke Tancredi Falconeri in "Il Gattopardo" ...
Read
SICYNT: the importance of disclosure in the digital society
On September 24th, at the headquarters of the Faculty of Engineering and Architecture of the University of Cagliari, ...
Read
The geopolitics of chips
For several years now we have been hearing about semiconductor geopolitics and for me it is time to deepen ...
Read

Pages