Ing. Rustaggia (Revobyte): "we will be present in Rome with the 'Design your digital transformation' event on November 30th"
We continue our crusade aimed at spreading knowledge of the cyber world and new technologies in our country, Italy. This time we have the opportunity to...
Read
The culture of cyber security in secondary schools
The pilot project for the promotion of the culture of cyber security in secondary schools starts from Rome, promoted by the Cyber ​​Security Italy Foundation, the first...
Read
Cybersecurity training: interview with Dr. Manlio Longinotti (responsible for SANS Institute in Italy)
As the reader of this column knows, we have always tried to promote training in cyber and new technologies, convinced that it can "make a difference". Here you are...
Read
Technological warfare: a new chapter
As many readers will have noticed, for some time now we have been trying to follow what is happening in the world of technology, with particular regard to the geopolitical implications and...
Read
Electronic Warfare, Cyber ​​Attack or Sabotage? Train attack in Poland
In recent days there has been news that between 25 and 26 August around twenty passenger and freight trains were blocked along their route. Who did it still can not say ...
Read
Attacks against Active Directory ? Also, but not only...
Reading while reading I came across a really interesting infographics. I must admit that infographics appeal to me for their ability to represent concepts in…
Read
Artificial Intelligence in the Social Era
Artificial Intelligence (AI) is a discipline in the field of information technology that aims to create systems and machines capable of performing tasks that typically require the ...
Read
Interview with Enrico Ingenito (PWNX): “From Zero To Hero”
What is PWNX? If you browse the Internet (https://pwnx.io/) you come across a site that talks about: challenges, games, red, blue and purple... But what do these refer to...
Read

  
Crypto Wallets: What are they and which are the safest?
A feature advertised by Ledger, a well-known hardware wallet manufacturer, has caused quite a stir lately...
Read
Second SICYNT annual meeting
The second annual SICYNT meeting was held on Saturday 20 May at the CISCO headquarters in Rome....
Read
The cyber security department and the Army cyber protection brigade train jointly
The exercise conducted as part of bilateral activities with allied countries, between the Department ...
Read
The CHIRONEX 23-1, the first cyber exercise of the Navy, has ended
This morning on board the Cavour aircraft carrier in the Open Sea 23-1 the CHIRONEX 23-1 ended, the first ...
Read
Link with the Forum International de la Cybersécurité in Lille
The Forum Internacional de la Cybersécurité (FIC) is underway in Lille, France. French and international companies...
Read
Windows vs Linux
The article I am about to write wants to emphasize some aspect of two different visions and at the same time...
Read
CyberSec2023: also Defense on the front line
On March 2023, XNUMX, Luigi Garofalo, director of Cybersecurity Italy, launched the second edition of...
Read
Innovation: on the edge of reality with Robots that change their state of matter
Some time ago, for science fiction lovers, films called "Terminator" were released in which a robot was capable...
Read
How phishing campaigns are performed and what data is useful for attackers
Part of my job is to test the human element of security in organizations by building and launching...
Read
ChatGPT: an instructive chat with an Artificial Intelligence
Surely in the last few weeks you have heard of ChatGPT, a chat that makes use of Artificial Intelligence...
Read
EU and project funding (cyber)
Knowledge is the basis of everything! Who knows how many times you've heard that. Yet, although the concept is…
Read
Quantum Threat: Challenge to modern cryptographic systems
In recent months, the world of cryptography has been shaken by two announcements: the White House has issued a memorandum…
Read

Pages