05/04/21 | Cyber
The Quantum-Secure Net project (part 3/3): European product of QUANTUM KEY DISTRIBUTION
The following is the third and final part of the series of articles on quantum cryptography, which began with the previous two articles, where the elements were introduced ...
29/03/21 | Cyber
What is the cyber kill chain?
In several articles we have mentioned the so-called "cyber kill chain" but on closer inspection we have never really explained what it is. Today in this short article ...
22/03/21 | Cyber
Whaling: what it is and what are the risks
In recent years, cyber attacks have evolved, changing shape and intensity. The global health crisis has forced a large part of workers to the so-called ...
08/03/21 | Cyber
The SolarWinds case, let's take stock
In an article from December 14, 2020, we talked about FireEye and how it was hacked. It was the same company, last December 8, to inform the public of how much ...
03/03/21 | Cyber
The cyber national security perimeter: a new challenge for general counsel and compliance officers
In the difficult moment of reconstruction that will follow the great economic crisis caused by the pandemic, one of the most precious assets that a country holds is information, ...
01/03/21 | Cyber
The Quantum-Secure Net project (part 2/3): European product of Quantum Key Distribution
In the first article we introduced what are the main problems of modern cryptography, or rather, what are the mathematical limitations that are exposed by the world ...
22/02/21 | Cyber
TryHackMe: cyber and gamification
Some time ago I told you about the Ares project, an online platform developed according to the concept of gamification, today we resume the discussion by presenting the ...
15/02/21 | Cyber
Microsoft: security and privacy at the time of Covid
A few months ago we talked about the importance of security and privacy at the time of COVID (see article), highlighting some ethical and social aspects of ...
01/02/21 | Cyber
CyberChallenge.it, the 2021 edition at the starting blocks
CyberChallenge.it is one of the many answers that Italy is giving (together with new degree courses, ...
25/01/21 | Cyber
The Quantum-Secure Net Project (part 1/3): The quantum threat to modern cryptography
This article is divided into three parts, and aims to retrace the main elements of cryptography and ...
18/01/21 | Cyber
The AIDA project: Artificial Intelligence at the service of law enforcement
The postulate of the eternal struggle between cops and thieves is also confirmed in its digital transposition. The...
11/01/21 | Cyber
Money muling: a way to launder money
In this article I will talk about "money muling": an illegal practice that favors drug trafficking, trafficking ...
04/01/21 | Cyber
2020: a year of hacking
Cyberspace is the most complex thing man has ever built: on the one hand, it represents the union of thousands of ...
28/12/20 | Cyber
IMD WORLD DIGITAL COMPETITIVENESS RANKING 2020: Italy in 42nd place
Still an achievement to forget! This time it is a Swiss organization that says it, it is the International ...
21/12/20 | Cyber
Sunburst: a Pearl Harbor Cyber?
In a few years, when the current terrible pandemic is finally under control, 2020 will not be remembered ...
14/12/20 | Cyber
FireEye hacked, by whom?
The US company FireEye, cyber security giant, recently reported being a victim ...
14/12/20 | Cyber
Little Red Riding Hood and Climbing Beyond the Cloud (How to Become a Hacker)
"Once upon a time there was the real world ..." In a hundred years with this premise we will tell a fairy tale to make the ...
07/12/20 | Cyber
Quantum Supremacy to China?
For some time we have been talking about the evolution of quantum technology applied to computers and ...
30/11/20 | Cyber
Cloud and Confidential Computing ...
For years, cybersecurity experts from private companies and public organizations have faced the ...
23/11/20 | Cyber
Microsoft Pluton, for a safer world
A few days ago Microsoft presented its latest novelty to the world: Microsoft Pluton. Announced in ...