Fileless malware attacks are based on a type of malware that doesn't infect a computer through a...
The Cyber Threat Intelligence specialist is one of the professional figures in the field of...
In the complex digital ecosystem, the constantly growing IT threats prove to be increasingly...
A penetration test, also known as a pen test, is a simulated cyber attack on a computer system,...
It is a standard created to offer simpler ways of accessing certain sites, which takes advantage...
This term identifies those techniques and technologies that allow data protection during their...
As often happens, underestimating cyber security leads to considerable damage and risks.
Tips for implementing NIST, a framework that encompasses best practices in cybersecurity.
The automotive cybersecurity market could exceed $22 billion over the next seven years, based on...
2022 proved to be a particularly interesting year for Italian startups, which recorded over 2...
According to recent studies, biometric data, which should ensure safer and easier access by...
More and more cities are entering the smart world, in Italy a still very recent concept, but in...
The great success that ChatGpt, the model developed by OpenAI based on machine learning, made...
Robotaxis are vehicles that use artificial intelligence (AI) technology to drive autonomously,...
Recent news has reported growing fears that home robots may have been harvesting sensitive data...
A drone capable of seeing beyond the walls, of identifying every device connected to the wi-fi...
In 2021 the robotics sector grew by 50% compared to the previous year, with over 11,000 robots...
Even in the agricultural sector, innovation and tradition find the way to collaborate, promising...
Technological innovations in recent years are recording a high growth that often does not go hand...