USA and Thailand: the use of reserve personnel in the Cyber ​​environment
How should the now constant danger arising from the fifth dimension known as cyberspace be faced militarily? Someone has posed the problem for some time and ...
Read
"The art of war consists in defeating the enemy without having to face it". 61398 unit: win without firing a shot
At the time when he developed his own theories on "The art of war", Sun Tzu certainly could not have imagined the reality of our days. Today, now, next to ...
Read
Cybersecurity (for insiders): analysis of a threat on Hadoop systems and not only ...
NOTICE TO READERS: THIS ARTICLE IS INTENDED FOR CYBERSECURITY PROFESSIONALS. DO NOT RESET THE PUBLISHED LINKS! We are not aware of the complexity of some ...
Read
Cyber ​​and Japan: announced entry into the CCDCOE club
Last January the news that Japan is preparing to join the cyber club of Tallin as a partner state. The news was given after a meeting between the first ...
Read
The Russian Cyber ​​doctrine: 646 decree of the 5 December 2016
The 5 December 2016, with the decree n. 646 signed by the President of the Russian Federation, the Cyber ​​doctrine of Russia is renewed. Previously, in 2011, Russia had ...
Read
The 2018 Locked Shields ended today. the largest and most advanced international Cyber ​​Defense exercise in the world
The Locked Shields 2018 exercise was organized by NATO's Cyber ​​Defense Center of Excellence (CCDCOE - NATO Cooperative Cyber ​​Defense Center of Excellence ...
Read
The WebStresser website closed for hacking activities
The WebStresser.org site was deactivated yesterday following a joint operation by the Dutch police, the British National Crime Agency, Europol and ...
Read
Codemotion 2018: when Rome hosts the future ...
Codemotion has been in Italy the largest technical conference dedicated to software developers for years. Held in the Department of Computer Engineering of the Roma Tre University and ...
Read
Fourth industrial revolution: Internet users from all over the world ... you are already united!
Every evolutionary leap in human society is characterized by a discriminating factor that uniquely identifies it ...
Read
Jeff Boleng will take over the DoD of the 35 Joint Strike Fighter software
13 April 2018: a special piece of news comes out in the Washington Business Journal, "The Pentagon has created a new post to ...
Read
The deadly cyber-claws of the Russian bear hit both military and civilian targets. The unstoppable rise of Fancy Bear in cyberspace
The universe of hacker groups is extremely vast and varied. As mentioned in the previous articles, while those “...
Read
Oracle and R1 Group present: Beyond Bitcoin
In recent months the rapid increase (and partial decline) in value of many crypto-coins has resulted in heated ...
Read
Locked Shield 2018 to the starting blocks!
Also this year in Tallin (but indeed throughout Europe) the largest Cyber ​​exercise will be held as usual ...
Read
Meltdown: considerations on the impact on classified systems
Meltdown, a term whose meaning is synonymous with "disastrous collapse", or "nuclear catastrophe" has entered ...
Read
WannaCry infects Boeing: does the law of retribution strike again?
Who doesn't know Boeing? The main US aerospace company seems to have been hit by ...
Read
How the security measures in the GDPR will change our approach to risks involving personal data
As indicated in the previous article (read) the new European legislation concerning the protection of personal data is ...
Read
The secret war of hackers: The Equation Group, the "armed" cyber arm of US intelligence
That the network of the Internet was designed and implemented in the military in the United States is certainly not a ...
Read
INTERconNETtiamoci but with your head!
Italy is a strange country, one in which the inconclusiveness of institutions are flanked (and supply!) ...
Read
Interview with Carlo Mauceli: The theft of credentials, risk factors and guidelines for the safety of Italian companies
Today we have the opportunity to talk about the theft of credentials with one of the leading experts in computer security in ...
Read
DefenseReady, the software for the US Defense organizations
It is known that the Defense of the United States of America has for years a good relationship with Microsoft, the multinational of ...
Read

Pages