Information War: Microsoft's role between the US and India
A few days ago, on DNAIndia.com, a newspaper published in Mumbai in English, the news that Microsoft routinely shares the financial data of its customers ...
Read
What to do if Linux is also insecure?
Of the few certainties I have always had regarding operating systems I can certainly mention "Linux is better than Microsoft". But is it really so? It is these days the ...
Read
Clusit 2018 Report: in Italy the situation is serious
Also this year the "Clusit Report" was released, prepared by the "Italian Association for IT Security" which includes experts from the scientific world and ...
Read
Are US weapons systems vulnerable to cyber attacks? So it seems according to ...
If you just read the news on cyber space (and related attacks) you are led to think that these problems are typical of the civilized world and that they have nothing to ...
Read
Press and GDPR: the importance of the security of paper documents
The entry into force of the General Data Protection Regulation (GDPR) last May 25, has finally defined at European level the delicate question related to ...
Read
6 September 2007: Orchard operation
In the 2007 in Italy one could barely hear of cyber. Some dared to write their own thesis trying to illustrate the meaning of terms like cyberspace, ...
Read
Live Cyber ​​Attack Threat Map
Check Point Software Technologies Ltd. is one of the largest Israeli computer companies. Founded in 1993 by Gil Shwed, Shlomo Kramer and Marius Nacht, it has its headquarters ...
Read
Global Conflict Tracker: a quick guide on wars and American interests
It may happen that you need real-time information on a conflict or on the interests of a state, perhaps simply because you are reading an article and you do not ...
Read

  
Talos intelligence map
One of the open tools that can be used to explore the cyber dimension is Talos. I talked about ...
Read
Investing in the Israeli cyber? Let's take a look at startups ...
In today's world, that characterized by the invasive and almost oppressive presence of the fifth dimension (the ...
Read
Kaspersky cyber-threat real time map
Kaspersky is a Russian computer security company, at the center of several controversies in recent times as ...
Read
Undersecretary Tofalo visits the C4 Defense Command and the Interforces Command for Cybernetic Operations
The Undersecretary of State for Defense Angelo Tofalo today visited the C4 Defense Command, established on May 20 ...
Read
Unit 8200: the elite of cyber warfare and the "engine" of Israeli high technology
What the famous legend of David and Goliath, also reported in the Bible, may have in common with the unity of ...
Read
The COSCO Group under Cyber ​​attack
To be under attack Cyber ​​these days is one of the largest logistics and shipping companies in the world, the ...
Read
Singapore: cyber attack on health information systems
Singapore, a city-state at the center of the economic and financial world, at the top of the ranking published by the World ...
Read
Germany also has its fourth armed force
Some will recall that President Trump announced his promotion to Unified Combatant Command last summer ...
Read
After Japan also Romania announces entry into the Cyber ​​Defense Center of Excellence in Tallinn (CCDCOE)
The news was published last June 15 on the CCDCOE website. The official announcement was given during ...
Read
Video surveillance for mass events, concrete help to law enforcement agencies
In recent years Europe has been the scene of news events that have caused numerous victims, hardships and insecurity ...
Read
USA and Thailand: the use of reserve personnel in the Cyber ​​environment
How to face militarily the now constant danger deriving from the fifth dimension known as ...
Read
"The art of war is to defeat the enemy without having to face him". Unit 61398: Win without firing a shot
At the time he worked out his theories on "The Art of War", Sun Tzu could not have imagined ...
Read

Pages