End of year from "shivering" in cyber space, between new risks and old "mutant" threats
The cyber space even at this beginning 2017 is, as always, in turmoil. Unfortunately it is not only for the innovations that bring well-being and progress but, unfortunately, also for the ...
Read
Soldiers on a New Year's eve mission can wish to be happy with PrP Channel
A month ago the dedicated website and YouTube channel was born, many are the videos that reach the editorial office of PrP Channel. A web channel born as a game, is proving to be a ...
Read
"MIRAI": from the Japanese comics the name of the last "cyber-nightmare"
I read the plot of the Japanese manga "MIRAI NIKKI" ("future diary"), however, except to realize that it is not a properly educational product, I have not understood much (...
Read
The US is still under attack! The cyber-influence campaign on the American elections is another success
As noted by many observers, we are witnessing an escalation in the world of cyberwarfare that is revealing scenarios so far only hypothesized. After the attack on the Democratic ...
Read
Cyberwarfare, Russia-USA
The 14 June 2016, during the NATO summit in Warsaw, cyberspace has been recognized as the "fifth strategic dimension" in which powers will necessarily ...
Read
Cyber ​​Security, we finally have an "Infosec" web application
According to recent studies, a constant number of companies have claimed to have suffered a cyber attack (37,6%) with an exponential growth in the frequency of the number of ...
Read
Cybertech 2016, 50 nations are confronted in Rome
The third conference and world exhibition scheduled for Cybertech 2016 was held yesterday at the Palazzo dei Congressi in Rome, the biggest event dedicated to cyber security in ...
Read
Where do hackers dare: with the attack on the US political system has an impassable limit been exceeded?
Nowadays there is a lot of talk about everything that has the prefix "cyber" (cyberdefence, cybersecurity, cyber warfare, cyber attacks, etc.). Governments who can ...
Read

  
Cyberattacks and defense of critical infrastructures: the risk track
According to the railway development plan prepared by Network Rail, the major manager and developer of ...
Read
Quis custodiet ipsos custodes: the new PNR Directive and the risks of mass surveillance
During the first quarter of the 2016, traffic data at Italian airports provided by Assaeroporti are ...
Read
New cyber threats among the US Report on US military activity in China
The Chinese government and the PLA (People Liberation's Army) are strongly involved in a series of targeted investments and ...
Read
Cyber ​​Strategy and public-private cooperation for effective defense of critical infrastructures
That cyber attacks and related threats are on the rise, is now a well-known fact. A quick ...
Read
Cyber ​​Warfare: The British Army creates a new brigade to fight in the information age
According to the latest statements made by British Army General Sir Nick Carter, since April ...
Read
Cyber ​​Warfare, critical scenarios and current risks
More and more the conflicts and the consequences of the terrorist acts carried out generate repercussions or even new ...
Read
"We Defend Italy": cybersecurity, why is the "world governance" of the internet a pretext for a few private individuals in the US?
The cyber security of a country and its citizens is one of the most significant challenges of all ...
Read
ISIS: Russians unveil the Cyber ​​Caliphate divisions
The Cyber ​​Caliphate, last fall, attracted attention during the global recruitment of hackers with the ...
Read
Completed Cyber ​​Eagle 2014
CE2014, organized by the 3ª division of the AM Logistic Command, participated in all the CIRTs (Computer Incident ...
Read
Cyber ​​defense at Cecchignola
The event is part of the Defense Ministry's work on the Italian presidency of the ...
Read

Pages