05/09/22 | Cyber
Robot and Artificial Intelligence
We now hear a lot about Artificial Intelligence (AI), the Strategic Program for Artificial Intelligence 2022-2024 (see document) defines it as the whole ...
22/08/22 | Cyber
Zero trust: what does it mean?
The world of security is constantly evolving and with it, the language used by technicians and the security industry and new technologies. One of the terms increasingly ...
26/07/22 | Cyber
Hacked the Revenue Agency?
July 25, in Rome the temperature is always higher, and not just that of the weather! A few days ago the government fell, today it seems that it is the turn of the Revenue Agency ....
25/07/22 | Cyber
Cyber Influence, and we are all part of the global community!
"Cyber-Influence, a new term created to indicate an activity as old as the world, influence, carried out with modern methods and means (cyber) in particular relating to ...
23/07/22 | Cyber
I have often had the opportunity to evaluate different approaches to cyber protection, in different areas. Many times the setting was too superficial, the security policies ...
18/07/22 | Cyber
Information warfare and cyber warfare, what are the relationships?
As it happens more and more often, I find myself writing an article to answer the curiosity of friends. This time the question comes in the middle of a chat about ...
07/07/22 | Cyber
Grandma in Alexa
Personally I am fascinated by artificial intelligence, technology and how it gradually but inexorably creeps into our lives in a pervasive way ....
27/06/22 | Cyber
How safe are VPNs?
With this short article I will try to answer the question I was asked a few days ago: "How secure is a VPN?" On this occasion I will also face two ...
13/06/22 | Cyber
Metaverse, society and cybersecurity
For some time now I have been thinking of writing something about it. As I reflected, time passed and the web is now ...
06/06/22 | Cyber
What is a computer virus?
Someone argues that when disclosure in the cyber sector, everything is fine to get the message across ...
16/05/22 | Cyber
DDoS and viruses
It may seem strange but in our hyper-connected world, where you go by dint of English acronyms and terms, you don't ...
11/05/22 | Cyber
ALAMEDA: Artificial Intelligence for the treatment of brain disorders
Provide personalized care and better treatments to patients with major brain disorders by reducing the ...
09/05/22 | Cyber
Locked shields 2022: Finland in first place
This year Finland takes first place in one of the largest and most complex live cyber defense exercises in the ...
26/04/22 | Cyber
Multicloud: what risks and challenges
The accelerated multi-cloud strategy - which has characterized the past two years - has enabled organizations ...
11/04/22 | Cyber
The Metaverse is now a reality: what challenges await us?
The Metaverse is mostly described as a virtual world that was created by combining different technologies. It...
06/04/22 | Cyber
Cyber Defense: the 6th edition of the Cyber Eagle exercise concluded
With the final conference on 5 April, held in the presence of the Deputy Chief of Staff of the Air Force ...
04/04/22 | Cyber
Cyber Threat Intelligence: what are we talking about?
The use of English in the tech-rich world we live in is a constant, as is the speed of ...
28/03/22 | Cyber
How to create our Artificial Intelligence
We have often talked about Artificial Intelligence, but we haven't done it yet from the point of view of those who want ...
18/03/22 | Cyber
France: "Training in cyber crisis management"
Since cyber defense is a strategic national security issue, the "DEFNET" exercise is ...
14/03/22 | Cyber
Artificial Intelligence and Law Enforcement: technology and ethics of the AIDA project
More and more frequently, Artificial Intelligence (AI) is used by law enforcement agencies to fight crimes ...