
03/11/22 | Cyber
Browser fingerprint, with all due respect to privacy!
I think everyone knows what a browser is, so I take it for granted and ask instead if you know what a browser fingerprint is. If we try to translate we get "imprint of ...
1956
Read

17/10/22 | Cyber
Is there democracy without cyber security?
“If we want everything to remain as it is, everything must change”. So spoke Tancredi Falconeri in "Il Gattopardo" addressing his uncle, prince of Salina, skeptical of ...
429
Read

10/10/22 | Cyber
SICYNT: the importance of disclosure in the digital society
The first SICYNT conference on the importance of ...
419
Read

12/09/22 | Cyber
The geopolitics of chips
For several years now we have been hearing about semiconductor geopolitics and for me it is time to deepen the subject. To do this, let's start with a recent article ...
3316
Read

05/09/22 | Cyber
Robot and Artificial Intelligence
We now hear a lot about Artificial Intelligence (AI), the Strategic Program for Artificial Intelligence 2022-2024 (see document) defines it as the whole ...
2318
Read

22/08/22 | Cyber
Zero trust: what does it mean?
The world of security is constantly evolving and with it, the language used by technicians and the security industry and new technologies. One of the terms increasingly ...
913
Read

26/07/22 | Cyber
Hacked the Revenue Agency?
July 25, in Rome the temperature is always higher, and not just that of the weather! A few days ago the government fell, today it seems that it is the turn of the Revenue Agency ....
1767
Read

25/07/22 | Cyber
Cyber Influence, and we are all part of the global community!
"Cyber-Influence, a new term created to indicate an activity as old as the world, influence, carried out with modern methods and means (cyber) in particular relating to ...
538
Read

23/07/22 | Cyber
Ergonomic Cybersecurity
I have often had the opportunity to evaluate different approaches to cyber protection, in different areas. Many times the ...
606
Read

18/07/22 | Cyber
Information warfare and cyber warfare, what are the relationships?
As it happens more and more often, I find myself writing an article to answer the curiosity of friends. This...
1184
Read

07/07/22 | Cyber
Grandma in Alexa
Personally I am fascinated by artificial intelligence, technology and how gradually but ...
1023
Read

27/06/22 | Cyber
How safe are VPNs?
With this short article I will try to answer the question that was asked to me a few days ago: "How much is ...
3620
Read

13/06/22 | Cyber
Metaverse, society and cybersecurity
For some time now I have been thinking of writing something about it. As I reflected, time passed and the web is now ...
877
Read

06/06/22 | Cyber
What is a computer virus?
Someone argues that when disclosure in the cyber sector, everything is fine to get the message across ...
1065
Read

16/05/22 | Cyber
DDoS and viruses
It may seem strange but in our hyper-connected world, where you go by dint of English acronyms and terms, you don't ...
1657
Read

11/05/22 | Cyber
ALAMEDA: Artificial Intelligence for the treatment of brain disorders
Provide personalized care and better treatments to patients with major brain disorders by reducing the ...
733
Read

09/05/22 | Cyber
Locked shields 2022: Finland in first place
This year Finland takes first place in one of the largest and most complex live cyber defense exercises in the ...
864
Read

26/04/22 | Cyber
Multicloud: what risks and challenges
The accelerated multi-cloud strategy - which has characterized the past two years - has enabled organizations ...
727
Read

11/04/22 | Cyber
The Metaverse is now a reality: what challenges await us?
The Metaverse is mostly described as a virtual world that was created by combining different technologies. It...
2842
Read

06/04/22 | Cyber
Cyber Defense: the 6th edition of the Cyber Eagle exercise concluded
With the final conference on 5 April, held in the presence of the Deputy Chief of Staff of the Air Force ...
345
Read