"My mission is to strengthen the capabilities of our Armed Forces in guaranteeing the protection of the country system in the cybernetic domain and, consequently, in making them effective in their reactions to possible threats or attacks. After the first six months of taking up my position, I have realized the quality and the competence from which we start, but there is still a lot to do to improve the organization and make it really efficient and reactive in a domain, which is the cybernetic one, traveling at very high speeds ", said Undersecretary of State for Defense Angelo Tofalo, with specific proxy cyber, who this morning, in Milan, introduced the works of the 9na Edition National Cyber Warfare Conference, entitled "From passive defense to active response - Effectiveness and legitimacy of the active response to cyber threats".
Cyber: Undersecretary Tofalo, strengthen Armed Forces capacity to protect the country system in the cybernetic domain

(To Massimiliano Rizzo)
12/12/18
342

19/05/25 | Cyber
Feudalism 2.0: The land doesn't belong to us, but likes do. (Until they change the algorithm again, of course)
The figure of the serf, emblematic of the European feudal system, represents a paradigm of dependence...
180
Read

30/04/25 | Cyber
Cloned Digital Identity: The SPID Paradox and the New Frontier of Silent Scams
Remember Dolly the sheep? It was 1996 when in Scotland for the first time in the world they managed to clone a mammal,...
1812
Read

10/04/25 | Cyber
Sweden and US Strengthen Cyberspace Cooperation
US Cyber Command has announced a major milestone in strengthening cyber cooperation with Sweden...
96
Read

27/03/25 | Cyber
From 'Chatgate' to the Five Eyes Crisis: The Metamorphosis of Trust in Western Intelligence
The landscape of Western intelligence cooperation is undergoing a profound transformation,...
758
Read

18/03/25 | Cyber
March 18, 1992: Windows 3.1 (codename Janus) begins distribution
Windows 3.1, released on March 18, 1992 and known internally by the code name “Janus,” marked a moment...
1561
Read

11/03/25 | Cyber
Pentagon: New Strategy to Accelerate Military Software Development and Strengthen Operational Effectiveness
The U.S. Department of Defense (DOD) has begun a process to modernize the acquisition of the...
309
Read

17/02/25 | Cyber
Spyware and Adware: Silent Threats Between Espionage and Information Warfare
Spyware and adware, often underestimated or ignored, are extremely dangerous threats, especially in the...
327
Read

03/02/25 | Cyber
DNS Tunneling: An Invisible Threat That Passes Through Corporate Networks
In the context of cybersecurity, monitoring and defending against threats from cyber traffic...
571
Read

28/01/25 | Cyber
DeepSeek R1: China's Strategic Advance in Open Source AI and the Implications for the Global Tech Balance
In a geopolitical context characterized by growing technological tensions between East and West, China with Liang...
1198
Read

24/01/25 | Cyber
Virus = Malware? Like calling every insect a "mosquito"!
In the world of cybersecurity, the terms “virus” and “malware” are often used interchangeably, but...
404
Read
Events
Click on the days highlighted in red and find out what's in evidence.

Tribute (due) to the 80th "Roma" infantry who takes leave with honor
Well, yes, we are now used to witnessing the closure of the barracks and perhaps even a little to burying the long history of the departments, a phenomenon which however does not erase the memories. It also touched...
"Il Signor Parolini" (ninth part)
The baked chicken, as expected, had lived up to its reputation, consolidating, where needed, the undisputed culinary mastery of Gastone, chief ...