Cisco Networking Academy, a resource!
It often happens that to find an interesting and well done course you have to pay an arm and a leg, perhaps having to enroll at some more or less private institution that ...
Read
War law and humanitarian protection symbols in cyber space
One grows up in military schools with the principle - moral, rather than juridical - never to attack anyone who, on the battlefield, wears the emblem of the red cross on his helmet ...
Read
Cyber ​​Security: differences between Firewall and Web Application Firewall
Untangling among the products for cybersecurity, comparing them and then choosing them is not at all easy, even for experts. A multitude of ...
Read
Chaos in the cosmos (DB)
A few days ago, while glimmers of coolness crept into the August heat wave, a very important but somewhat ...
Read
The new SOC Exprivia: between technology and territory
In this period, talking about Cyber ​​security is increasingly common, even if it is not always spoken about with full knowledge of the facts. This time we thought we'd talk about it with Domenico ...
Read
Internet of Things: the Internet of Things
The term Internet of Things or IoT, often wrongly translated as Internet of Things when the translation "Internet of Things" would be more appropriate, has now entered ...
Read
And so let's go to the cloud, but carefully!
To quote a famous American saying, cloud is the best invention from sliced ​​bread to the present day! It is one of those historical inventions that change habits, paradigms ...
Read
Towards "controlled and guaranteed origin" software. Will they be enough to make us safer?
President Biden orders the safety labeling of the software and the communication to the consumer of the list of ingredients of which it is composed. The aim is to ...
Read

  
OWASP ZAP - Zed Attack Proxy
What I am about to describe to you is an event that often happened years ago but now, fortunately, it has become rather ...
Read
DNS and IT security
Smart technologies solve problems, effective technologies prevent them. What are DNS? DNS acronym ...
Read
PEBKAC: the problem of level 8
PEBKAC. Never heard this word, of nerdy origin but which represents one of the biggest and most difficult plagues ...
Read
Windows 11, an even safer operating system
We want to move people from needing Windows, to choosing Windows, to loving Windows. [Satya Nadella] Microsoft had ...
Read
A new way to certify open-source software. The challenge of the AssureMOSS project
Europe largely depends on open-source software designed primarily overseas. Inside the Market ...
Read
Internet-of-Things, a systemic risk technology. Here because
For Internet-of-Things (IoT) we mean all those technologies that enable the use of intelligent objects, ...
Read
Cybersecurity: prioritize remediation of the vulnerable surface
Prioritization is the art of answering the questions "where do I start?" and "with what do I continue?" In this article ...
Read
Windows versus Sourgum
It is Saturday 17 July 2021 and together with Alessandro Rugolo, Danilo Mancinone, Giorgio Giacinto and their respective families we ...
Read
Estonia and Russian Special Services influence operations in Cyberspace
According to the annual report "International security and Estonia" of 2021, Russia continues to be the main ...
Read
Artificial Intelligence: evasion techniques and cyber defenses
It is counterintuitive to the idea of ​​rationality, speed, effectiveness and efficiency that we have made of computers, ...
Read
Fake News, Deepfake, Fake People: the new frontier of Cyber ​​Security
During last year's lockdown I started writing an article that never had the light and that had as ...
Read
From raw data to usable information: visibility and observability
Once upon a time there was traditional IT ... In a well-defined and limited company perimeter, servers, routers, ...
Read

Pages