The geopolitics of chips
For several years now we have been hearing about semiconductor geopolitics and for me it is time to deepen the subject. To do this, let's start with a recent article ...
Read
Robot and Artificial Intelligence
We now hear a lot about Artificial Intelligence (AI), the Strategic Program for Artificial Intelligence 2022-2024 (see document) defines it as the whole ...
Read
Zero trust: what does it mean?
The world of security is constantly evolving and with it, the language used by technicians and the security industry and new technologies. One of the terms increasingly ...
Read
Hacked the Revenue Agency?
July 25, in Rome the temperature is always higher, and not just that of the weather! A few days ago the government fell, today it seems that it is the turn of the Revenue Agency ....
Read
Cyber ​​Influence, and we are all part of the global community!
"Cyber-Influence, a new term created to indicate an activity as old as the world, influence, carried out with modern methods and means (cyber) in particular relating to ...
Read
Ergonomic Cybersecurity
I have often had the opportunity to evaluate different approaches to cyber protection, in different areas. Many times the setting was too superficial, the security policies ...
Read
Information warfare and cyber warfare, what are the relationships?
As it happens more and more often, I find myself writing an article to answer the curiosity of friends. This time the question comes in the middle of a chat about ...
Read
Grandma in Alexa
Personally I am fascinated by artificial intelligence, technology and how it gradually but inexorably creeps into our lives in a pervasive way ....
Read

rheinmetal defense
How safe are VPNs?
With this short article I will try to answer the question that was asked to me a few days ago: "How much is ...
Read
Metaverse, society and cybersecurity
For some time now I have been thinking of writing something about it. As I reflected, time passed and the web is now ...
Read
What is a computer virus?
Someone argues that when disclosure in the cyber sector, everything is fine to get the message across ...
Read
DDoS and viruses
It may seem strange but in our hyper-connected world, where you go by dint of English acronyms and terms, you don't ...
Read
ALAMEDA: Artificial Intelligence for the treatment of brain disorders
Provide personalized care and better treatments to patients with major brain disorders by reducing the ...
Read
Locked shields 2022: Finland in first place
This year Finland takes first place in one of the largest and most complex live cyber defense exercises in the ...
Read
Multicloud: what risks and challenges
The accelerated multi-cloud strategy - which has characterized the past two years - has enabled organizations ...
Read
The Metaverse is now a reality: what challenges await us?
The Metaverse is mostly described as a virtual world that was created by combining different technologies. It...
Read
Cyber ​​Defense: the 6th edition of the Cyber ​​Eagle exercise concluded
With the final conference on 5 April, held in the presence of the Deputy Chief of Staff of the Air Force ...
Read
Cyber ​​Threat Intelligence: what are we talking about?
The use of English in the tech-rich world we live in is a constant, as is the speed of ...
Read
How to create our Artificial Intelligence
We have often talked about Artificial Intelligence, but we haven't done it yet from the point of view of those who want ...
Read
France: "Training in cyber crisis management"
Since cyber defense is a strategic national security issue, the "DEFNET" exercise is ...
Read

Pages