IBM and NVIDIA Tesla supply the Sierra Super computer to the Lawrence Livermore National Laboratory
The world of American defense is rich in research institutes, among which, of primary importance, we can mention the Lawrence Livermore National Laboratory, Research Institute ...
Read
Information War: Microsoft's role between the US and India
A few days ago, on DNAIndia.com, a newspaper published in Mumbai in English, appeared the news that Microsoft habitually shares its clients' financial data ...
Read
What to do if Linux is also insecure?
Of the few certainties I have always had regarding operating systems I can certainly mention "Linux is better than Microsoft". But is it really so? It is these days the ...
Read
Clusit 2018 Report: in Italy the situation is serious
Also this year the "Clusit Report" was released, prepared by the "Italian Association for IT Security" which includes experts from the scientific world and ...
Read
Are US weapons systems vulnerable to cyber attacks? So it seems second ...
If you just read the news on cyber space (and related attacks) you are led to think that these problems are typical of the civilized world and that they have nothing to ...
Read
Press and GDPR: the importance of the security of paper documents
The entry into force of the General Data Protection Regulation (GDPR) last May 25, has finally defined at European level the delicate question related to ...
Read
6 September 2007: Orchard operation
In the 2007 in Italy one could barely hear of cyber. Some dared to write their own thesis trying to illustrate the meaning of terms like cyberspace, ...
Read
Live Cyber ​​Attack Threat Map
Check Point Software Technologies Ltd. is one of Israel's largest computer companies. Founded in 1993 by Gil Shwed, Shlomo Kramer and Marius Nacht, it has its headquarters ...
Read
Global Conflict Tracker: a quick guide on wars and American interests
It may happen that you need real-time information on a conflict or on the interests of a state, ...
Read
Talos intelligence map
One of the open tools that can be used to explore the cyber dimension is Talos. I talked about ...
Read
Investing in the Israeli cyber? Let's take a look at startups ...
In today's world, that characterized by the invasive and almost oppressive presence of the fifth dimension (the ...
Read
Kaspersky cyber-threat real time map
Kaspersky is a Russian computer security company, at the center of several controversies in recent times as ...
Read
Undersecretary Tofalo visits the C4 Defense Command and the Interforces Command for Cybernetic Operations
The undersecretary of state for defense Angelo Tofalo today visited the C4 Defense Command, established the 20 May ...
Read
8200 unit: the cyber warfare elite and the "engine" of Israeli high technology
What the famous legend of David and Goliath, also reported in the Bible, may have in common with the unity of ...
Read
The COSCO Group under Cyber ​​attack
To be under attack Cyber ​​these days is one of the largest logistics and shipping companies in the world, the ...
Read
Singapore: cyber attack on health information systems
Singapore, a city-state at the center of the economic and financial world, at the top of the ranking published by the World ...
Read
Germany also has its fourth armed force
Someone will remember that last summer President Trump announced the promotion to Unified Combatant Command ...
Read
After Japan also Romania announces entry into the Cyber ​​Defense Center of Excellence in Tallinn (CCDCOE)
The news was published last June 15 on the CCDCOE website. The official announcement was given during ...
Read
Video surveillance for mass events, concrete help to law enforcement agencies
In recent years Europe has been the scene of news events that have caused numerous victims, hardships and insecurity ...
Read
USA and Thailand: the use of reserve personnel in the Cyber ​​environment
How to face militarily the now constant danger deriving from the fifth dimension known as ...
Read

Pages