The Quantum-Secure Net project (part 3/3): European product of QUANTUM KEY DISTRIBUTION
The following is the third and final part of the series of articles on quantum cryptography, which began with the previous two articles, where the elements were introduced ...
Read
What is the cyber kill chain?
In several articles we have mentioned the so-called "cyber kill chain" but on closer inspection we have never really explained what it is. Today in this short article ...
Read
Whaling: what it is and what are the risks
In recent years, cyber attacks have evolved, changing shape and intensity. The global health crisis has forced a large part of workers to the so-called ...
Read
The SolarWinds case, let's take stock
In an article from December 14, 2020, we talked about FireEye and how it was hacked. It was the same company, last December 8, to inform the public of how much ...
Read
The cyber national security perimeter: a new challenge for general counsel and compliance officers
In the difficult moment of reconstruction that will follow the great economic crisis caused by the pandemic, one of the most precious assets that a country holds is information, ...
Read
The Quantum-Secure Net project (part 2/3): European product of Quantum Key Distribution
In the first article we introduced what are the main problems of modern cryptography, or rather, what are the mathematical limitations that are exposed by the world ...
Read
TryHackMe: cyber and gamification
Some time ago I told you about the Ares project, an online platform developed according to the concept of gamification, today we resume the discussion by presenting the ...
Read
Microsoft: security and privacy at the time of Covid
A few months ago we talked about the importance of security and privacy at the time of COVID (see article), highlighting some ethical and social aspects of ...
Read

  
CyberChallenge.it, the 2021 edition at the starting blocks
CyberChallenge.it is one of the many answers that Italy is giving (together with new degree courses, ...
Read
The Quantum-Secure Net Project (part 1/3): The quantum threat to modern cryptography
This article is divided into three parts, and aims to retrace the main elements of cryptography and ...
Read
The AIDA project: Artificial Intelligence at the service of law enforcement
The postulate of the eternal struggle between cops and thieves is also confirmed in its digital transposition. The...
Read
Money muling: a way to launder money
In this article I will talk about "money muling": an illegal practice that favors drug trafficking, trafficking ...
Read
2020: a year of hacking
Cyberspace is the most complex thing man has ever built: on the one hand, it represents the union of thousands of ...
Read
IMD WORLD DIGITAL COMPETITIVENESS RANKING 2020: Italy in 42nd place
Still an achievement to forget! This time it is a Swiss organization that says it, it is the International ...
Read
Sunburst: a Pearl Harbor Cyber?
In a few years, when the current terrible pandemic is finally under control, 2020 will not be remembered ...
Read
FireEye hacked, by whom?
The US company FireEye, cyber security giant, recently reported being a victim ...
Read
Little Red Riding Hood and Climbing Beyond the Cloud (How to Become a Hacker)
"Once upon a time there was the real world ..." In a hundred years with this premise we will tell a fairy tale to make the ...
Read
Quantum Supremacy to China?
For some time we have been talking about the evolution of quantum technology applied to computers and ...
Read
Cloud and Confidential Computing ...
For years, cybersecurity experts from private companies and public organizations have faced the ...
Read
Microsoft Pluton, for a safer world
A few days ago Microsoft presented its latest novelty to the world: Microsoft Pluton. Announced in ...
Read

Pages