
07/07/21 | Cyber
Confidentiality - Integrity - Availability in Operation Technology from an Industry 4.0 perspective: part two
An automated production system managed in Industry 4.0 necessarily has an internal / external data and process management network available (recipe of ...
279
Read

06/07/21 | Cyber
Surviving under attack: cyber resilience
As repeatedly recalled on these pages, and reiterated a few days ago by the Delegated Authority of the Information System for the security of the Republic, Italy is in strong ...
663
Read

05/07/21 | Cyber
The Operating System: the soul of PCs
We can affirm that the first great IT revolution took place with the birth of the Operating Systems which allowed, in fact, the whole world, the use of devices ....
3797
Read

30/06/21 | Cyber
Social Engineering: Why Should Companies Fear It?
“Cyber security is difficult (maybe even impossible), but imagine for a moment that you have succeeded. Strong encryption is applied where needed, the ...
984
Read

28/06/21 | Cyber
Confidentiality - Integrity - Availability in Operation Technology from an Industry 4.0 perspective: part one
With this study we want to invite you to learn more about the world of Operational Technology (OT) with specific reference to cybersecurity. The studio is divided into two ...
509
Read

23/06/21 | Cyber
Diversity & Inclusion: the cyber protection of vulnerable groups
In the assessment of cyber risk, the consideration of a large slice of vulnerability is based on evidence and studies of a victimological nature. Organizations and ...
339
Read

21/06/21 | Cyber
Security and DevOps: what does "shift left" mean?
In the document DBIR (Data Breach Investigations Report) 2021 released in May by Verizon we analyze the investigations on computer accidents and data breaches of the difficult ...
1284
Read

16/06/21 | Cyber
Microsoft PowerShell and the new frontiers of malware
Most Microsoft Windows users (in particular, system administrators) will have heard, at least once, of Windows PowerShell, an interpreter of ...
2041
Read

14/06/21 | Cyber
Consume Cyber Threat Intelligence
Work often leads me to have conversations with clients about CyberSecurity, their programs, their ...
507
Read

10/06/21 | Cyber
International alert! When the cyber-enemy breaks through the closet ...
Since the 70s, social and technological evolution has progressively changed the paradigm ...
855
Read

07/06/21 | Cyber
Vaccines and dark web
COVID 19 has affected our lives over the past 18 months forcing us to change our lifestyle habits ...
586
Read

02/06/21 | Cyber
"Networking" to defend the "network": the MITER ATT & CK case
As mentioned in my previous article, any hacker has an "attack operating profile", recognizable by the ...
684
Read

31/05/21 | Cyber
The attack on the TOR infrastructure - Cryptocurrencies the real target
When it comes to online anonymity and browsing the Dark Web, Tor is often referred to. In the common imagination of Tor ...
3013
Read

24/05/21 | Cyber
Know the opponent's cyber tactics
Any cyber security and cyber protection activity is based on establishing a boundary from ...
1400
Read

17/05/21 | Cyber
Venticento: a Made-in-Italy excellence in IT security
In other articles we have already dealt with the SOC (Security Operation Center) defining it as an organizational unit ...
792
Read

10/05/21 | Cyber
How vulnerable is the US energy infrastructure?
This is what Americans are discovering these days. Sure, it's not the first time this has happened, but it's probably the ...
1492
Read

03/05/21 | Cyber
The rise of cyber crime
It might sound like a movie title, but it's not. It is much more simply a trivial reality! Everyday...
452
Read

26/04/21 | Cyber
l CISCO Co-Innovation Center in Milan one year after its opening
In January 2020, Cisco opened in Milan, within the structure of the Science Museum, the first in Europe ...
646
Read

19/04/21 | Cyber
Locked Shields: the largest cyber tutorial in the world. This year Sweden wins
Also this year, between 13 and 16 April, the cyber exercise Locked Shields was held. Like every year ...
1697
Read

12/04/21 | Cyber
Facebook Data Public Disclosure and the disturbing feeling of addiction to the data breach
Technology is no exception, as every other area of society has its own hot topics and some words ...
501
Read