Analysis and investigation play a fundamental role in identifying malicious actions

Today we are talking about a solution that uses an investigation system to...

Insurance policies for cyber risks are growing

The cyber threat is becoming more and more pressing and insurance coverage...

Anon: being hacked

Imagine a world where all the updates, information, advertisements are visible...

Working in cyber security

For years it has been highlighted that the necessary figures in the cyber...

Cyber Security

Can a hacker attack be configured as terrorism?

An interesting question related to the new, current ecosystem that sees the virtual world and the real world by now inevitably coexisting.

The weak link in the chain

Cyber attacks carried out by exploiting vulnerabilities in the systems of a victim's supplier are growing. Here's how cybercriminals know how to...

IoT

Deep Learning: how to apply it to cyber security?

The concept of Deep Learning belongs to the category of Artificial Intelligence and is a...

Are smart cities safe?

No, according to a recent report by the World Economic Forum, written in collaboration with...

Artificial Intelligence development in cybersecurity

In recent years, the technology that uses HPC (High Performance Computing) has evolved enormously,...

Agriculture 4.0: from agricultural drones to cybersecurity

Even in the agricultural sector, innovation and tradition find the way to collaborate, promising...

Automotive: the new threats for "smart cars"

The evolution in the automotive field has made it possible to open the doors to the advent of new...

Tips

Tips to defend against cyber risks.

CYBER DUCKS TIPS: APP SECURITY

As often happens, underestimating cyber security leads to considerable damage and risks.

Tools

Free useful tools for cyber security.

Daemonlogger

Quick and easy network packet logger for use in NSM environments.

Partner