From North Korea, The Lazarus Group. Cyber ​​warriors or cyber criminals?
Being able to orient yourself correctly in the enormous "gray zone" that is becoming cyber-space is a very complex undertaking. Being able to determine who really is the performer ...
Read
China: National Cyberspace Security Strategy
In December of the 2016 China made public the national strategy of the cyber sector through the publication of a high-level document called precisely ...
Read
Cyber ​​defense? Cisco Umbrella and Investigate
The term "cyber" has now become part of the common vocabulary and associated with other terms such as "attack", "defense", "operations", circumscribes a very specific sector of ...
Read
The future computed: artificial intelligence according to Microsoft
The theme of Artificial Intelligence (AI in English) has strongly entered our homes, projecting us suddenly into that future which, like me, have so far read in ...
Read
Chaos Computer Club vs Italy!
The 23 December 2016 entered into force in Italy the so-called FOIA, or the Freedom Of Information Act advertised as the law that gives all citizens the possibility of ...
Read
SATORI, "the awakening" of the botnets and the other 2018 challenges for cyber security
Understanding what will be the most important trends for the year just opened with regards to cyber security, is certainly not a simple matter. Consulting the security companies' reports ...
Read
Cryptocurrency hacked? And the bitcoins go down!
One of the businesses of the moment seems to be the investment in cryptocurrency. The best known are Bitcoin, Ripple, Ethereum, Litecoin and others about 700 types of money ...
Read
"Andromeda" botnet dismantled
It is a few days ago the news, passed as usual in silence, of the dismantling of the Andromeda botnet following an international cyber operation led ...
Read
The higher the digitization level the greater the cyber risk
What factors determine cyber risk? What happens to a society that is too digitized? These questions arise ...
Read
Can a cyber attack endanger life?
The answer is yes. It's been like that for a long time, even if you do not talk about it. A cyber attack is as dangerous as an attack for ...
Read
US Cyber ​​Attack against North Korean missile capabilities?
Has the United States of America carried out cyber activities to sabotage the missile capabilities of North Korea? ...
Read
Sandworms and Ukraine: when cyber security takes on a strategic role
During the two days of Cybertech Europe (see article), inside the famous "cloud" of the new congress center in Rome ...
Read
There are no shortcuts in Cybersecurity!
In my last article: "Artificial Intelligence: opportunity or risk?", I tried to highlight some aspects ...
Read
Artificial Intelligence: Opportunity or Risk?
In Italy it has passed virtually unnoticed - perhaps for fear of derision - a fact that happened a few months ago and that ...
Read
In Prague, from October 23, the Open Source Summit Europe
The Open Source Summit Europe is perhaps the most awaited event on the European scene in relation to the famous "penguin" of ...
Read
Injection, Broken Authentication and XSS are the main cyber risks
OWASP is a standard for the production of secure web applications and if we consider that by now almost all ...
Read
Cyber ​​security: what is a SOC?
The world of cyber security is more complex every day and to be able to manage the numerous cyber incidents ...
Read
Cybertech Europe 2017: an opportunity for Italy
Network Vulnerability, Cybercrime, Cybersecurity, these are just some of the themes that we feel more and more often ...
Read
"Barometers mad" in cyber-space. Here's how NotPetya and the other cyber-hurricanes have fired the 2017 summer
That just finished will certainly be remembered as one of the hottest and most dry seasons since the data ...
Read
Cyber ​​attack at the base of USS John S. McCain collision?
It has appeared in various newspapers, since the first days after the accident, the news of ongoing investigations into the collision ...
Read

Pages