The evolution of the Operating Systems
The computer as we know it, that is a small and relatively inexpensive device, capable of performing numerous calculation functions in a very short time, is ...
Read
Zero Day vulnerabilities: the new and powerful cyber weapons
Everybody knows that computer viruses are now a consistent and persistent threat to companies. Attacks like Egregor Team's against the chain ...
Read
Quantum Supremacy: the Italian race
In recent years, the term Quantum Computing is increasingly used also outside research laboratories, engaging more and more specialized figures in the race to ...
Read
Deep Instinct: from detection to prevention
It has been established that antiviruses are not always able to protect us. In a 2012 study, security journalist Brian Krebs found the effectiveness of ...
Read
Situational Awareness, Artificial Intelligence, cyber security and adaptive systems
In the modern world, it is increasingly important to make conscious decisions relatively quickly. This is the case of political decision-makers in the face of a national crisis or of ...
Read
Adaptive Systems and Situational Awareness
The world is changing at an incredible speed ... in all sectors. What would you say if overnight you no longer had to waste time understanding the changes made by ...
Read
Cisco Networking Academy, a resource!
It often happens that to find an interesting and well done course you have to pay an arm and a leg, perhaps having to enroll at some more or less private institution that ...
Read
War law and humanitarian protection symbols in cyber space
One grows up in military schools with the principle - moral, rather than juridical - never to attack anyone who, on the battlefield, wears the emblem of the red cross on his helmet ...
Read

rheinmetal defense
Cyber ​​Security: differences between Firewall and Web Application Firewall
Untangling among the IT security products, comparing them and then choosing them is not easy at all, not even ...
Read
Chaos in the cosmos (DB)
A few days ago, while glimmers of coolness crept into the Augustan heat wave, he appeared again on social media ...
Read
The new SOC Exprivia: between technology and territory
In this period talking about Cyber ​​security is more and more common, even if it is not always spoken with knowledge of ...
Read
Internet of Things: the Internet of Things
The term Internet of Things or IoT, often mistranslated with Internet of Things when it would be more appropriate ...
Read
And so let's go to the cloud, but carefully!
To quote a famous American saying, cloud is the best invention from sliced ​​bread to the present day! It is one of ...
Read
Towards "controlled and guaranteed origin" software. Will they be enough to make us safer?
President Biden orders software security labeling and consumer disclosure of the list ...
Read
OWASP ZAP - Zed Attack Proxy
What I am about to describe to you is an event that often happened years ago but now, fortunately, it has become rather ...
Read
DNS and IT security
Smart technologies solve problems, effective technologies prevent them. What are DNS? DNS acronym ...
Read
PEBKAC: the problem of level 8
PEBKAC. Never heard this word, of nerdy origin but which represents one of the biggest and most difficult plagues ...
Read
Windows 11, an even safer operating system
We want to move people from needing Windows, to choosing Windows, to loving Windows. [Satya Nadella] Microsoft had ...
Read
A new way to certify open-source software. The challenge of the AssureMOSS project
Europe largely depends on open-source software designed primarily overseas. Inside the Market ...
Read
Internet-of-Things, a systemic risk technology. Here because
For Internet-of-Things (IoT) we mean all those technologies that enable the use of intelligent objects, ...
Read

Pages