
05/09/22 | Cyber
Robot and Artificial Intelligence
We now hear a lot about Artificial Intelligence (AI), the Strategic Program for Artificial Intelligence 2022-2024 (see document) defines it as the whole ...
2041
Read

22/08/22 | Cyber
Zero trust: what does it mean?
The world of security is constantly evolving and with it, the language used by technicians and the security industry and new technologies. One of the terms increasingly ...
816
Read

26/07/22 | Cyber
Hacked the Revenue Agency?
July 25, in Rome the temperature is always higher, and not just that of the weather! A few days ago the government fell, today it seems that it is the turn of the Revenue Agency ....
1689
Read

25/07/22 | Cyber
Cyber Influence, and we are all part of the global community!
"Cyber-Influence, a new term created to indicate an activity as old as the world, influence, carried out with modern methods and means (cyber) in particular relating to ...
482
Read

23/07/22 | Cyber
Ergonomic Cybersecurity
I have often had the opportunity to evaluate different approaches to cyber protection, in different areas. Many times the setting was too superficial, the security policies ...
554
Read

18/07/22 | Cyber
Information warfare and cyber warfare, what are the relationships?
As it happens more and more often, I find myself writing an article to answer the curiosity of friends. This time the question comes in the middle of a chat about ...
935
Read

07/07/22 | Cyber
Grandma in Alexa
Personally I am fascinated by artificial intelligence, technology and how it gradually but inexorably creeps into our lives in a pervasive way ....
1013
Read

27/06/22 | Cyber
How safe are VPNs?
With this short article I will try to answer the question I was asked a few days ago: "How secure is a VPN?" On this occasion I will also face two ...
3384
Read

13/06/22 | Cyber
Metaverse, society and cybersecurity
For some time now I have been thinking of writing something about it. As I reflected, time passed and the web is now ...
833
Read

06/06/22 | Cyber
What is a computer virus?
Someone argues that when disclosure in the cyber sector, everything is fine to get the message across ...
822
Read

16/05/22 | Cyber
DDoS and viruses
It may seem strange but in our hyper-connected world, where you go by dint of English acronyms and terms, you don't ...
1535
Read

11/05/22 | Cyber
ALAMEDA: Artificial Intelligence for the treatment of brain disorders
Provide personalized care and better treatments to patients with major brain disorders by reducing the ...
660
Read

09/05/22 | Cyber
Locked shields 2022: Finland in first place
This year Finland takes first place in one of the largest and most complex live cyber defense exercises in the ...
847
Read

26/04/22 | Cyber
Multicloud: what risks and challenges
The accelerated multi-cloud strategy - which has characterized the past two years - has enabled organizations ...
565
Read

11/04/22 | Cyber
The Metaverse is now a reality: what challenges await us?
The Metaverse is mostly described as a virtual world that was created by combining different technologies. It...
2683
Read

06/04/22 | Cyber
Cyber Defense: the 6th edition of the Cyber Eagle exercise concluded
With the final conference on 5 April, held in the presence of the Deputy Chief of Staff of the Air Force ...
313
Read

04/04/22 | Cyber
Cyber Threat Intelligence: what are we talking about?
The use of English in the tech-rich world we live in is a constant, as is the speed of ...
954
Read

28/03/22 | Cyber
How to create our Artificial Intelligence
We have often talked about Artificial Intelligence, but we haven't done it yet from the point of view of those who want ...
1442
Read

18/03/22 | Cyber
France: "Training in cyber crisis management"
Since cyber defense is a strategic national security issue, the "DEFNET" exercise is ...
334
Read

14/03/22 | Cyber
Artificial Intelligence and Law Enforcement: technology and ethics of the AIDA project
More and more frequently, Artificial Intelligence (AI) is used by law enforcement agencies to fight crimes ...
1441
Read