
22/09/21 | Cyber
Cisco Networking Academy, a resource!
It often happens that to find an interesting and well done course you have to pay an arm and a leg, perhaps having to enroll at some more or less private institution that ...
668
Read

20/09/21 | Cyber
War law and humanitarian protection symbols in cyber space
One grows up in military schools with the principle - moral, rather than juridical - never to attack anyone who, on the battlefield, wears the emblem of the red cross on his helmet ...
861
Read

08/09/21 | Cyber
Cyber Security: differences between Firewall and Web Application Firewall
Untangling among the products for cybersecurity, comparing them and then choosing them is not at all easy, even for experts. A multitude of ...
1418
Read

06/09/21 | Cyber
Chaos in the cosmos (DB)
A few days ago, while glimmers of coolness crept into the August heat wave, a very important but somewhat ...
533
Read

02/09/21 | Cyber
The new SOC Exprivia: between technology and territory
In this period, talking about Cyber security is increasingly common, even if it is not always spoken about with full knowledge of the facts. This time we thought we'd talk about it with Domenico ...
591
Read

30/08/21 | Cyber
Internet of Things: the Internet of Things
The term Internet of Things or IoT, often wrongly translated as Internet of Things when the translation "Internet of Things" would be more appropriate, has now entered ...
438
Read

25/08/21 | Cyber
And so let's go to the cloud, but carefully!
To quote a famous American saying, cloud is the best invention from sliced bread to the present day! It is one of those historical inventions that change habits, paradigms ...
829
Read

21/08/21 | Cyber
Towards "controlled and guaranteed origin" software. Will they be enough to make us safer?
President Biden orders the safety labeling of the software and the communication to the consumer of the list of ingredients of which it is composed. The aim is to ...
658
Read

17/08/21 | Cyber
OWASP ZAP - Zed Attack Proxy
What I am about to describe to you is an event that often happened years ago but now, fortunately, it has become rather ...
1094
Read

16/08/21 | Cyber
DNS and IT security
Smart technologies solve problems, effective technologies prevent them. What are DNS? DNS acronym ...
799
Read

11/08/21 | Cyber
PEBKAC: the problem of level 8
PEBKAC. Never heard this word, of nerdy origin but which represents one of the biggest and most difficult plagues ...
2279
Read

09/08/21 | Cyber
Windows 11, an even safer operating system
We want to move people from needing Windows, to choosing Windows, to loving Windows. [Satya Nadella] Microsoft had ...
1855
Read

04/08/21 | Cyber
A new way to certify open-source software. The challenge of the AssureMOSS project
Europe largely depends on open-source software designed primarily overseas. Inside the Market ...
572
Read

02/08/21 | Cyber
Internet-of-Things, a systemic risk technology. Here because
For Internet-of-Things (IoT) we mean all those technologies that enable the use of intelligent objects, ...
714
Read

28/07/21 | Cyber
Cybersecurity: prioritize remediation of the vulnerable surface
Prioritization is the art of answering the questions "where do I start?" and "with what do I continue?" In this article ...
868
Read

26/07/21 | Cyber
Windows versus Sourgum
It is Saturday 17 July 2021 and together with Alessandro Rugolo, Danilo Mancinone, Giorgio Giacinto and their respective families we ...
1364
Read

21/07/21 | Cyber
Estonia and Russian Special Services influence operations in Cyberspace
According to the annual report "International security and Estonia" of 2021, Russia continues to be the main ...
507
Read

19/07/21 | Cyber
Artificial Intelligence: evasion techniques and cyber defenses
It is counterintuitive to the idea of rationality, speed, effectiveness and efficiency that we have made of computers, ...
545
Read

14/07/21 | Cyber
Fake News, Deepfake, Fake People: the new frontier of Cyber Security
During last year's lockdown I started writing an article that never had the light and that had as ...
1538
Read

12/07/21 | Cyber
From raw data to usable information: visibility and observability
Once upon a time there was traditional IT ... In a well-defined and limited company perimeter, servers, routers, ...
436
Read