Cyber ​​defense? Safe programming is the basis of everything
When we talk about cyber defense we always think of bad cyber pirates and those who, on the other side of the fence, fight them. Yet, it all starts much earlier ...
Read
Future military decision-making processes will be supported by cloud supercomputers?
For the US Department of Defense, the answer appears to be positive. At least so he just appeared on the DoD website in an article by Rick Docksai: "Brain-like" ...
Read
President Trump elevates the United States Cyber ​​Command to the rank of Unified Combatant Command
That cyberspace and operations carried out through this fifth dimension had grown in importance was clear to everyone, but few could imagine a ...
Read
A security helmet: view the Cyberspace
Cyberspace, intended as a new dimension in which man can interact (and, if necessary, make war), presents a great difficulty to those who try to understand it ...
Read
At Cyber ​​Space Frontiers: What happens if a video can be encoded in the DNA of a bacterium?
The world is increasingly complex and scientific discoveries can often have implications that are not always predictable. What happens in a world where a video can be encoded ...
Read
The CIA also recruits Star Wars rebels, while cyber attacks prove to trigger a real international crisis
The Vault 7 operation of Wikileaks is about to reach the first six months of its inception, the 7 last March. At the rate of four "releases" per month on average, Mr.
Read
What is FIWARE?
This is a European initiative born from the Public Private Partnership Future Internet, aimed at increasing European competitiveness in the field of Information and Communication ...
Read
Cyber ​​News: DPCM 17 February 2017 released
The new "directive with indications for cybernetic protection and national IT security" has recently been released. Was a new law necessary? I would say yes. Let's see ...
Read

  
ELT: First Workshop on "Electromagnetic Spectrum Operations" in collaboration with SMD Information and Security Department
The 15 June 2017, at the head office of Elettronica Spa in Rome, the first meeting on the Electromagnetic Spectrum took place ...
Read
Wannacryptor: chronicle of a disaster announced (and it will not be the last). Here's what happened ...
In cyber space, reality is hardly what it seems and a cyber attack, although it has risen to the honor of ...
Read
"Blue Whale Challenge", a deadly game on social networks. The postal police sound the alarm
The police post intervenes with a page on Facebook "a social life" to stem the dangers from a ...
Read
Operation Vault 7: the point on the "secrets" of the CIA unveiled until today, while in the world rages WannaCry
In the almost total indifference of the general media, the Vault 7 operation, launched by WikiLeaks last March 7, ...
Read
Privacy in the Cyber-Era
Technological innovation continuously offers new tools for an increasingly connected planet1, but at the same time ...
Read
Locked Shields 2017: the most important Cyber ​​exercise in the world
In the days between the 24 and the 28, April was held at the NATO Cooperative Cyber ​​Defense Center of Excellence, in ...
Read
Cyber ​​Defense: AlienVault OSSIM, the most widely used SIEM open source in the world
At least so states AlienVault, a private American software development company based in San Mateo in ...
Read
Does Cyber ​​become a science?
A bit 'by chance, a little' because my curiosity always leads me to search for new experiences, a few days ago ...
Read
The harsh law of counterintelligence: Weeping Angelo, Pterodactyl and the other CIA "cyber creatures" revealed
The news quickly made the rounds of the world at the beginning of the month: WikiLeaks, the organization that belongs to the ...
Read
New frontier: data encryption and DNA
Sandia National Laboratories scientists are looking for partners for the application of technologies for the ...
Read
Has Italy awakened in cyber-space?
"Keep quiet the enemy listens to you", he warned of a manifesto conceived at the time of the last world war. The need was ...
Read
Information management and cyber risks of the Forza NEC system: some reflections
The "Forza NEC" program is now a consolidated presence among the projects aimed at bringing together digitization and ...
Read

Pages