October, Cyber ​​Security month
Online Defense and SICYNT united in the month of Cyber ​​Security invite you to share the ABC of Security on Digital Information. Print a copy for the class of ...
Read
The impact of artificial intelligence on intelligence analysis
Let's go back to the discussion, only mentioned in a previous article, relating to the role of Artificial Intelligence in the field of intelligence analysis. The question that ...
Read
The evolution of the Operating Systems
The computer as we know it, that is a small and relatively inexpensive device, capable of performing numerous calculation functions in a very short time, is ...
Read
Zero Day vulnerabilities: the new and powerful cyber weapons
Everybody knows that computer viruses are now a consistent and persistent threat to companies. Attacks like Egregor Team's against the chain ...
Read
Quantum Supremacy: the Italian race
In recent years, the term Quantum Computing is increasingly used also outside research laboratories, engaging more and more specialized figures in the race to ...
Read
Deep Instinct: from detection to prevention
It has been established that antiviruses are not always able to protect us. In a 2012 study, security journalist Brian Krebs found the effectiveness of ...
Read
Situational Awareness, Artificial Intelligence, cyber security and adaptive systems
In the modern world, it is increasingly important to make conscious decisions relatively quickly. This is the case of political decision-makers in the face of a national crisis or of ...
Read
Adaptive Systems and Situational Awareness
The world is changing at an incredible speed ... in all sectors. What would you say if overnight you no longer had to waste time understanding the changes made by ...
Read
Cisco Networking Academy, a resource!
It often happens that to find an interesting and well done course you have to pay an arm and a leg, perhaps having to ...
Read
War law and humanitarian protection symbols in cyber space
One grows up in military schools with the principle - moral, rather than juridical - of never attacking anyone, in the field of ...
Read
Cyber ​​Security: differences between Firewall and Web Application Firewall
Untangling among the IT security products, comparing them and then choosing them is not easy at all, not even ...
Read
Chaos in the cosmos (DB)
A few days ago, while glimmers of coolness crept into the Augustan heat wave, he appeared again on social media ...
Read
The new SOC Exprivia: between technology and territory
In this period talking about Cyber ​​security is more and more common, even if it is not always spoken with knowledge of ...
Read
Internet of Things: the Internet of Things
The term Internet of Things or IoT, often mistranslated with Internet of Things when it would be more appropriate ...
Read
And so let's go to the cloud, but carefully!
To quote a famous American saying, cloud is the best invention from sliced ​​bread to the present day! It is one of ...
Read
Towards "controlled and guaranteed origin" software. Will they be enough to make us safer?
President Biden orders software security labeling and consumer disclosure of the list ...
Read
OWASP ZAP - Zed Attack Proxy
What I am about to describe to you is an event that often happened years ago but now, fortunately, it has become rather ...
Read
DNS and IT security
Smart technologies solve problems, effective technologies prevent them. What are DNS? DNS acronym ...
Read
PEBKAC: the problem of level 8
PEBKAC. Never heard this word, of nerdy origin but which represents one of the biggest and most difficult plagues ...
Read
Windows 11, an even safer operating system
We want to move people from needing Windows, to choosing Windows, to loving Windows. [Satya Nadella] Microsoft had ...
Read

Pages