Trojan Source Attack, what is it?
How about if it were possible to trick compilers into producing binary files other than the logic visible to human eyes in the source code? We show you ...
Read
Cybercriminals vs Pirates
We live in really interesting times: exactly ten years ago the US Department of Defense defined the cyber domain as the fifth domain of warfare, but it was ...
Read
Network systems automation techniques
The reference to the use of automation techniques and possibly AI (Artificial Intelligence) has become common practice in addressing many analysis problems ...
Read
The Strange Case of Spongebob's GreenPass
A couple of days ago, while I was having breakfast, I received a message on my smartphone saying “Good morning. It seems that they have leaked the keys to create the green passes ...
Read
NATO Strategy for Artificial Intelligence
On 21 October 2021, the defense ministers of NATO countries approved and released, for the first time, the NATO strategy for Artificial Intelligence (Artificial ...
Read
October, Cyber ​​Security month
Online Defense and SICYNT united in the month of Cyber ​​Security invite you to share the ABC of Security on Digital Information. Print a copy for the class of ...
Read
The impact of artificial intelligence on intelligence analysis
Let's go back to the discussion, only mentioned in a previous article, relating to the role of Artificial Intelligence in the field of intelligence analysis. The question that ...
Read
The evolution of the Operating Systems
The computer as we know it, that is a small and relatively inexpensive device, capable of performing numerous calculation functions in a very short time, is ...
Read

  
Zero Day vulnerabilities: the new and powerful cyber weapons
That computer viruses are now a consistent and persistent threat to companies is something everyone knows ...
Read
Quantum Supremacy: the Italian race
In recent years, the term Quantum Computing is increasingly used even outside research laboratories, ...
Read
Deep Instinct: from detection to prevention
It has been established that antiviruses are not always able to protect us. In a 2012 study, the seasoned journalist ...
Read
Situational Awareness, Artificial Intelligence, cyber security and adaptive systems
In the modern world, it is increasingly important to make conscious decisions relatively quickly. It is the case...
Read
Adaptive Systems and Situational Awareness
The world is changing at an incredible speed ... in all sectors. What would you say if from one day to the next you didn't ...
Read
Cisco Networking Academy, a resource!
It often happens that to find an interesting and well done course you have to pay an arm and a leg, perhaps having to ...
Read
War law and humanitarian protection symbols in cyber space
One grows up in military schools with the principle - moral, rather than juridical - of never attacking anyone, in the field of ...
Read
Cyber ​​Security: differences between Firewall and Web Application Firewall
Untangling among the IT security products, comparing them and then choosing them is not easy at all, not even ...
Read
Chaos in the cosmos (DB)
A few days ago, while glimmers of coolness crept into the Augustan heat wave, he appeared again on social media ...
Read
The new SOC Exprivia: between technology and territory
In this period talking about Cyber ​​security is more and more common, even if it is not always spoken with knowledge of ...
Read
Internet of Things: the Internet of Things
The term Internet of Things or IoT, often mistranslated with Internet of Things when it would be more appropriate ...
Read
And so let's go to the cloud, but carefully!
To quote a famous American saying, cloud is the best invention from sliced ​​bread to the present day! It is one of ...
Read

Pages