Cybersecurity (for insiders): analysis of a threat on Hadoop systems and not only ...
NOTICE TO READERS: THIS ARTICLE IS INTENDED FOR CYBERSECURITY PROFESSIONALS. DO NOT RESTORE PUBLISHED LINKS! You don't realize the complexity of some ...
Read
Cyber ​​and Japan: CCDCOE's entry into the club announced
The news came last January that Japan is preparing to join the cyber club of Tallin as a partner state. The news was given after a meeting between the first ...
Read
The Russian Cyber ​​doctrine: 646 decree of the 5 December 2016
The 5 December 2016, with the decree n. 646 signed by the President of the Russian Federation, the Cyber ​​doctrine of Russia is renewed. Previously, in 2011, Russia had ...
Read
The 2018 Locked Shields ended today. the largest and most advanced international Cyber ​​Defense exercise in the world
The Locked Shields 2018 exercise was organized by NATO's Cyber ​​Defense Center of Excellence (CCDCOE - NATO Cooperative Cyber ​​Defense Center of Excellence ...
Read
The WebStresser website closed for hacking activities
The WebStresser.org site was deactivated yesterday following a joint operation by the Dutch police, the British National Crime Agency, Europol and ...
Read
Codemotion 2018: when Rome hosts the future ...
Codemotion has been the largest technical conference dedicated to software developers in Italy for years. Held in the Department of Computer Engineering of the Roma Tre University and ...
Read
Fourth industrial revolution: Internet users from all over the world ... you are already united!
Every evolutionary leap in human society is characterized by a discriminating factor that univocally identifies it from the previous one. The figure below summarizes the ...
Read
Jeff Boleng will handle the software for the F 35 Joint Strike Fighter for the DoD
13 April 2018: in the Washington Business Journal comes a special news, "The Pentagon has created a new post to guide how it buys software". The news might seem ...
Read

  
The deadly cyber-claws of the Russian bear strike both military and civilian targets. Fancy Bear's unstoppable rise to cyberspace
The universe of hacker groups is extremely vast and varied. As mentioned in the previous articles, while those “...
Read
Oracle and R1 Group present: Beyond Bitcoin
In recent months the rapid increase (and partial decline) in value of many crypto-coins has resulted in heated ...
Read
Locked Shield 2018 to the starting blocks!
Also this year in Tallin (but indeed throughout Europe) the largest Cyber ​​exercise will be held as usual ...
Read
Meltdown: considerations on the impact on classified systems
Meltdown, a term whose meaning is synonymous with "disastrous collapse", or "nuclear catastrophe" has entered ...
Read
WannaCry infects Boeing: does the law of retribution strike again?
Who doesn't know Boeing? The leading US company in the aerospace field seems to have been hit by the ...
Read
How the security measures in the GDPR will change our approach to risks involving personal data
As indicated in the previous article (read) the new European legislation concerning the protection of personal data is ...
Read
The secret war of hackers: The Equation Group, the "armed" cyber arm of US intelligence
That the network of the Internet was designed and implemented in the military in the United States is certainly not a ...
Read
INTERconNETtiamoci but with your head!
Italy is a strange country, one in which the inconclusiveness of institutions are flanked (and supply!) ...
Read
Interview with Carlo Mauceli: The theft of credentials, risk factors and guidelines for the safety of Italian companies
Today we have the opportunity to talk about credential theft with one of the leading cybersecurity experts in ...
Read
DefenseReady, the software for the US Defense organizations
It is known that the Defense of the United States of America has for years a good relationship with Microsoft, the multinational of ...
Read
From North Korea, The Lazarus Group. Cyber ​​warriors or cyber criminals?
Being able to orientate correctly in that huge "gray area" that is becoming cyber-space is a very ...
Read
China: National Cyberspace Security Strategy
In December of 2016, China published the national cyber strategy through the ...
Read

Pages