"My mission is to strengthen the capabilities of our Armed Forces in guaranteeing the protection of the country system in the cybernetic domain and, consequently, in making them effective in their reactions to possible threats or attacks. After the first six months of taking up my position, I have realized the quality and the competence from which we start, but there is still a lot to do to improve the organization and make it really efficient and reactive in a domain, which is the cybernetic one, traveling at very high speeds ", said Undersecretary of State for Defense Angelo Tofalo, with specific proxy cyber, who this morning, in Milan, introduced the works of the 9na Edition National Cyber Warfare Conference, entitled "From passive defense to active response - Effectiveness and legitimacy of the active response to cyber threats".
Cyber: Undersecretary Tofalo, strengthen Armed Forces capacity to protect the country system in the cybernetic domain
(To Massimiliano Rizzo)
12/12/18
336
19/04/24 | Cyber
Biden establishes the figure of CAIO (Chief Artificial Intelligence Officer)
Last March 28, Memorandum M-24-10 was issued, the subject of which is: "Advancing Governance, Innovation, and Risk...
422
Read
11/04/24 | Cyber
The XSS threat and the role of the WAF
Among the cyber attacks that exploit script injection methodologies, Cross Site Scripting (XSS) is certainly...
298
Read
05/04/24 | Cyber
How to trick defenses to do a SQL attack with JSON
As we have seen previously, SQLi are still fearsome despite their age. If anyone missed the...
261
Read
02/04/24 | Cyber
What's happening in the Linux community: xz backdoor, trust attack!
Just three days ago, on March 29, 2024, a new attack was discovered: it affected open source software that...
1517
Read
02/04/24 | Cyber
The risks of online exposure: the role of Open-Source Intelligence
The current world is increasingly oriented towards the digitalization of assets, such as currencies, physical properties and...
847
Read
25/03/24 | Cyber
“John The Ripper”
John The Ripper, not to be confused with “Jack the Ripper” (Jack the Ripper, so to speak) is an Open instrument...
929
Read
19/03/24 | Cyber
AI and Cyber: what programming skills are needed?
As banal as it may seem, programming was born in response to the request to have tasks performed by...
536
Read
13/03/24 | Cyber
Security Summit 2024 is coming!
The main event of the cybersecurity panorama in Italy will be held in Milan between 19 and 21 March: Security...
169
Read
11/03/24 | Cyber
SQL Injection: always current despite its age
A few weeks ago I published an article entitled: "SQL Injection attack: what is it?", thinking...
953
Read
06/03/24 | Cyber
Cyber and Artificial Intelligence in military applications
“The Russian-Ukrainian war, the Israeli conflict against Hamas” stated the Undersecretary of State for Defense...
231
Read
Events
Click on the days highlighted in red and find out what's in evidence.
Tribute (due) to the 80th "Roma" infantry who takes leave with honor
Well, yes, we are now used to witnessing the closure of the barracks and perhaps even a little to burying the long history of the departments, a phenomenon which however does not erase the memories. It also touched...
"Il Signor Parolini" (ninth part)
The baked chicken, as expected, had lived up to its reputation, consolidating, where needed, the undisputed culinary mastery of Gastone, chief ...