DDoS and viruses
It may seem strange but in our hyper-connected world, in which we move forward by dint of English acronyms and terms, we don't always dwell enough on the meaning of words ...
Read
ALAMEDA: Artificial Intelligence for the treatment of brain disorders
Provide personalized care and better treatments to patients with major brain disorders by reducing treatment costs through the use of intelligence ...
Read
Locked shields 2022: Finland in first place
This year Finland takes first place in one of the largest and most complex live cyber defense exercises in the world, certainly the most important of NATO, which took place ...
Read
Multicloud: what risks and challenges
The accelerated multi-cloud strategy - which has characterized the last two years - has enabled organizations to leverage the best technical features of ...
Read
The Metaverse is now a reality: what challenges await us?
The Metaverse is mostly described as a virtual world that was created by combining different technologies. It consists of the fusion of virtual and physical worlds and is intended ...
Read
Cyber ​​Defense: the 6th edition of the Cyber ​​Eagle exercise concluded
With the final conference on 5 April, held in the presence of the Deputy Chief of Staff of the Air Force, Air Force General Aurelio Colagrande, and ...
Read
Cyber ​​Threat Intelligence: what are we talking about?
The use of English in the tech-rich world we live in is a constant, as is the speed of light in physics. It often happens to talk between experts about ...
Read
How to create our Artificial Intelligence
We have often talked about Artificial Intelligence, but we haven't done it yet from the point of view of those who want to approach the subject and try to build their own AI ....
Read
France: "Training in cyber crisis management"
Since cyber defense is a strategic national security issue, the "DEFNET" exercise is ...
Read
Artificial Intelligence and Law Enforcement: technology and ethics of the AIDA project
More and more frequently, Artificial Intelligence (AI) is used by law enforcement agencies to fight crimes ...
Read
Amazon and Stellantis for the automotive of the future
In January of this splendid (so to speak) 2022, a news was reported by some newspapers but ...
Read
The need to apply specific standards for the cybersecurity of Industrial Control Systems in Critical Infrastructures
In this article I will give some references to implement a methodological approach, developed on the basis of ...
Read
Is it true that we will soon have a robot judge?
Man and machine. A combination to which, by now, we are used to and which frightens every time it is pronounced. The dilemma of ...
Read
The value of the data
It is well known that on the Internet there are a lot of data of different types and sources. Data that is ...
Read
Is the M1A2 Abrams cyber protected?
Let's keep it simple: Vehicles are susceptible to cyber attacks. If you think of a modern vehicle you will realize ...
Read
Does NATO need a Cyber ​​Command?
The security environment defined by NATO in the 2010 "Strategic Concept" document, already underlined that the level ...
Read
The new digital revolution, deep learning
Recognize a photo, a song, a user's habit. With artificial intelligence it is already possible. But why...
Read
A subtle threat to be countered with "attention"!
Some time ago I read about the increase in cases of "vishing": the theft of credentials implemented through a phone call ...
Read
West Point Strategic Concept Seminar: in February we begin to answer the many questions
The expected "West Point Strategic Concept Seminar" organized by the Social Sciences Research Lab will be held in a few days ...
Read
WPScan: web security scanner for WorpPress
WordPress is an Open Source CMS (Content management system) software, i.e. a platform that allows you to create and ...
Read

Pages