Confidentiality - Integrity - Availability in Operation Technology from an Industry 4.0 perspective: part two
An automated production system managed in Industry 4.0 necessarily has an internal / external data and process management network available (recipe of ...
Read
Surviving under attack: cyber resilience
As repeatedly recalled on these pages, and reiterated a few days ago by the Delegated Authority of the Information System for the security of the Republic, Italy is in strong ...
Read
The Operating System: the soul of PCs
We can affirm that the first great IT revolution took place with the birth of the Operating Systems which allowed, in fact, the whole world, the use of devices ....
Read
Social Engineering: Why Should Companies Fear It?
“Cyber ​​security is difficult (maybe even impossible), but imagine for a moment that you have succeeded. Strong encryption is applied where needed, the ...
Read
Confidentiality - Integrity - Availability in Operation Technology from an Industry 4.0 perspective: part one
With this study we want to invite you to learn more about the world of Operational Technology (OT) with specific reference to cybersecurity. The studio is divided into two ...
Read
Diversity & Inclusion: the cyber protection of vulnerable groups
In the assessment of cyber risk, the consideration of a large slice of vulnerability is based on evidence and studies of a victimological nature. Organizations and ...
Read
Security and DevOps: what does "shift left" mean?
In the document DBIR (Data Breach Investigations Report) 2021 released in May by Verizon we analyze the investigations on computer accidents and data breaches of the difficult ...
Read
Microsoft PowerShell and the new frontiers of malware
Most Microsoft Windows users (in particular, system administrators) will have heard, at least once, of Windows PowerShell, an interpreter of ...
Read

  
Consume Cyber ​​Threat Intelligence
Work often leads me to have conversations with clients about CyberSecurity, their programs, their ...
Read
International alert! When the cyber-enemy breaks through the closet ...
Since the 70s, social and technological evolution has progressively changed the paradigm ...
Read
Vaccines and dark web
COVID 19 has affected our lives over the past 18 months forcing us to change our lifestyle habits ...
Read
"Networking" to defend the "network": the MITER ATT & CK case
As mentioned in my previous article, any hacker has an "attack operating profile", recognizable by the ...
Read
The attack on the TOR infrastructure - Cryptocurrencies the real target
When it comes to online anonymity and browsing the Dark Web, Tor is often referred to. In the common imagination of Tor ...
Read
Know the opponent's cyber tactics
Any cyber security and cyber protection activity is based on establishing a boundary from ...
Read
Venticento: a Made-in-Italy excellence in IT security
In other articles we have already dealt with the SOC (Security Operation Center) defining it as an organizational unit ...
Read
How vulnerable is the US energy infrastructure?
This is what Americans are discovering these days. Sure, it's not the first time this has happened, but it's probably the ...
Read
The rise of cyber crime
It might sound like a movie title, but it's not. It is much more simply a trivial reality! Everyday...
Read
l CISCO Co-Innovation Center in Milan one year after its opening
In January 2020, Cisco opened in Milan, within the structure of the Science Museum, the first in Europe ...
Read
Locked Shields: the largest cyber tutorial in the world. This year Sweden wins
Also this year, between 13 and 16 April, the cyber exercise Locked Shields was held. Like every year ...
Read
Facebook Data Public Disclosure and the disturbing feeling of addiction to the data breach
Technology is no exception, as every other area of ​​society has its own hot topics and some words ...
Read

Pages