How phishing campaigns are performed and what data is useful for attackers
Part of my job is to test the human element of security in organizations by creating and launching phishing campaigns (on commission, i.e. authorized to do so...
Read
ChatGPT: an instructive chat with an Artificial Intelligence
Surely in the last few weeks you've heard of ChatGPT, a chat that makes use of Artificial Intelligence to produce texts. Since I'm curious I decided to...
Read
EU and project funding (cyber)
Knowledge is the basis of everything! Who knows how many times you've heard that. Yet, although the concept is clear in theory, the practice is different, often simply…
Read
Quantum Threat: Challenge to modern cryptographic systems
In recent months, the world of cryptography has been shaken by two announcements: the White House has issued a memorandum to start the migration to new...
Read
NATO and Cognitive Warfare
We have already talked about Cognitive Warfare and the importance of what in some circles is considered as a new domain of warfare. Today we delve into...
Read
Knowledge Management and technology
As always happens, there comes a time when something needs to change, in life as in work or in society. Many transformations are due, guided or simply...
Read
From Information Warfare to Cognitive Warfare
It will not have escaped those who follow the evolution of the military field that after Cyber ​​Warfare, Information Warfare and Hybrid Warfare, it is increasingly common to read about Cognitive...
Read
Lockheed Martin and Microsoft, classified cloud and new technologies for American defense
A few days ago the announcement was made that the two giants, Lockeed Martin and Microsoft, have decided to enter into a strategic alliance aimed at supporting the Department of Defense...
Read

rheinmetal defense
Browser fingerprint, with all due respect to privacy!
I think everyone knows what a browser is, so I take it for granted and ask instead if you know what a browser is ...
Read
Is there democracy without cyber security?
“If we want everything to remain as it is, everything must change”. So spoke Tancredi Falconeri in "Il Gattopardo" ...
Read
SICYNT: the importance of disclosure in the digital society
On September 24th, at the headquarters of the Faculty of Engineering and Architecture of the University of Cagliari, ...
Read
The geopolitics of chips
For several years now we have been hearing about semiconductor geopolitics and for me it is time to deepen ...
Read
Robot and Artificial Intelligence
We now hear a lot about Artificial Intelligence (AI), the Strategic Program for Intelligence ...
Read
Zero trust: what does it mean?
The world of security is constantly evolving and with it, the language used by technicians and the ...
Read
Hacked the Revenue Agency?
July 25, in Rome the temperature is always higher, and not just that of the weather! A few days ago the government fell ...
Read
Cyber ​​Influence, and we are all part of the global community!
"Cyber-Influence, a new term created to indicate an activity as old as the world, influence, carried out with ...
Read
Ergonomic Cybersecurity
I have often had the opportunity to evaluate different approaches to cyber protection, in different areas. Many times the ...
Read
Information warfare and cyber warfare, what are the relationships?
As it happens more and more often, I find myself writing an article to answer the curiosity of friends. This...
Read
Grandma in Alexa
Personally I am fascinated by artificial intelligence, technology and how gradually but ...
Read
How safe are VPNs?
With this short article I will try to answer the question that was asked to me a few days ago: "How much is ...
Read

Pages