
07/03/22 | Cyber
Amazon and Stellantis for the automotive of the future
In January of this splendid (so to speak) 2022, a piece of news was reported by some newspapers but it probably went unnoticed by most, myself included. Yup...
589
Read

28/02/22 | Cyber
The need to apply specific standards for the cybersecurity of Industrial Control Systems in Critical Infrastructures
In this article I will give some references to implement a methodological approach, developed on the basis of international experiences, with the use of a specific standard ...
662
Read

21/02/22 | Cyber
Is it true that we will soon have a robot judge?
Man and machine. A combination to which, by now, we are used to and which frightens every time it is pronounced. The basic dilemma is to understand to what extent man should ...
688
Read

16/02/22 | Cyber
The value of the data
It is well known that on the Internet there are a lot of data of different types and sources. Data that are generally available for consultation through those browsers that ...
431
Read

14/02/22 | Cyber
Is the M1A2 Abrams cyber protected?
Let's keep it simple: Vehicles are susceptible to cyber attacks. If you think of a modern vehicle you will realize that it is nothing more than a handful of computers on wheels or ...
4164
Read

09/02/22 | Cyber
Does NATO need a Cyber Command?
The security environment defined by NATO in the "Strategic Concept" document of 2010, already underlined that the level of the threat in the cyber sector was high for both ...
692
Read

07/02/22 | Cyber
The new digital revolution, deep learning
Recognize a photo, a song, a user's habit. With artificial intelligence it is already possible. But why does it matter, and how is it affecting the way we ...
683
Read

31/01/22 | Cyber
A subtle threat to be countered with "attention"!
Some time ago I read about the increase in cases of "vishing": the theft of credentials implemented through a pretext phone call in which an impostor (or an answering machine ...
853
Read

26/01/22 | Cyber
West Point Strategic Concept Seminar: in February we begin to answer the many questions
The expected "West Point Strategic Concept Seminar" organized by the Social Sciences Research Lab will be held in a few days ...
485
Read

24/01/22 | Cyber
WPScan: web security scanner for WorpPress
WordPress is an Open Source CMS (Content management system) software, i.e. a platform that allows you to create and ...
638
Read

17/01/22 | Cyber
Nation State Threat Actors: Intelligence Services at the forefront of the next war
NATO has repeatedly reiterated that "a cyber attack targeting a nation is an aggression to all member countries". L'...
1304
Read

12/01/22 | Cyber
Not just IT protection
Verkada, Triton, Colonial Pipeline ... are not mysterious words in a quiz game, but simply the mirror of ...
576
Read

10/01/22 | Cyber
Google Dorks, these strangers ...
Google Dork is an advanced search technique that can help uncover hidden data from the Google search engine ...
3908
Read

05/01/22 | Cyber
The value of eXpanded Detection and Response
In CyberSecurity, what does eXpanded Detection and Response (XDR) mean? What features does an XDR system have? How can...
495
Read

03/01/22 | Cyber
Alexa, Artificial Intelligence and Common Sense
You might be wondering what "common sense" means, perhaps looking for a definition in the Treccani dictionary, from which you ...
2103
Read

29/12/21 | Cyber
Deepfakes: the art of creating "fake authors" at the time of artificial intelligence
In recent years, the development and implementation of deep neural networks has ...
942
Read

27/12/21 | Cyber
Vulnerability ALARM: CVE-2021-44228, "Apache Zero-Day Log4j" for friends!
Once again the world of computer technology is shocked by the discovery of a vulnerability distributed on ...
2557
Read

20/12/21 | Cyber
CyberSecurity and Health
Cyber attacks on healthcare infrastructures are intensifying in number and quality and increasingly ...
739
Read

16/12/21 | Cyber
Fighting the bad guys in a structured way
The world of technology, more particularly that of cyber security, is today full of acronyms and acronyms that make ...
554
Read

13/12/21 | Cyber
Ethical Biohacking and Supply Chain
Since I was a boy I have been intrigued by Bioengineering so much that it has become the specialization of my path ...
501
Read