6 MINUTES to breach your IT infrastructure

Confindustria Belluno, SCP, Margas and CLUSIT advocacy A conference that will demonstrate live what happens during a hacker attack and how cyber criminals manage to get into companies. Most importantly, how to prevent dangerous situations, limit risks and prepare to resume business operations as quickly as possible.
DIGITAL DEFENSE

Innovations and Trends in Cybersecurity
Cybersecurity: anticipating the future

How Public Administrations and Companies Move, the Effectiveness of Futures Thinking What are organizations doing to defend themselves in cyber security? What is the importance of Future Thinking and anticipatory thinking in strategic foresight? As Clusit, the Italian association for cyber security that will also be the host of the event, confirms, there is a […]
The abuse of vulnerable drivers (BYOVD)

An increasingly popular and handy technique The abuse of vulnerable drivers, known as BYOVD (Bring Your Own Vulnerable Driver), has emerged in recent years as an increasingly common and accessible attack technique. This methodology exploits any vulnerabilities in the drivers to gain full access to the systems’ memory and evade defence mechanisms. With the wide […]
AI: Hype and Reality

Navigating the Artificial Intelligence landscape Artificial intelligence technologies are a powerful tool in the hands of cyber criminals who use this technology to refine, speed up and extend cyber attacks on a large scale. While there is enthusiasm among the ‘BlackHats’ for the advent of WormGPT, the ‘good guys’ must quickly discuss the pressing need […]
RADIO 24 – With Enrico Pagliarini | Westpole ransomware attack

Case of the month On Friday, December 22, Corrado Giustozzi, host of Enrico Pagliarini, accurately and thoroughly analyzed on Radio24 the ransomware attack suffered by Westpole for the serious consequences on Italy.
RADIO 24 – WITH ENRICO PAGLIARINI | The Almost Catastrophe of Linux

The Discovery of a Critical Vulnerability in Linux The largest attempted sabotage in Linux history was thwarted thanks to the timely discovery of a backdoor by engineer Andres Freund. If exploited, the vulnerability could have had devastating global consequences. Corrado Giustozzi will delve into the technical details of the attack, its implications, and the security […]
Project Health: Home as first place of care and telemedicine

From the clinic to cybersecurity: multidisciplinarity and innovation for an evolved territorial health At the event, scheduled in Trani at the Biblioteca Comunale ‘B. Ronchi’, cybersecurity expert Corrado Giustozzi will be among the protagonists of Section III – Cybersecurity and healthcare. In his speech, Giustozzi will address the topic: ‘Unthinkable complexity: the dark side of […]
Exploring MDR Services: Opportunities or Risks for MSSP Partners?

Scenarios, Trends, and Prospects in Italian Security The event “Exploring MDR Services: Opportunities or Risks for MSSP Partners?” will feature Corrado Giustozzi, Founding Partner & Chief Strategist at Rexilience, as the host and moderator. Giustozzi will engage attendees with insights on the latest scenarios, trends, and prospects in the Italian security landscape. This event, organized […]
The IT Week – Radio Radicale – Interview with Stefano Quintarelli

Trump’s backtrack, killer drones and violated privacy In the new episode of the podcast La Settimana Informatica, Stefano Quintarelli addresses the regulatory and strategic chaos generated by Trump’s trade policy, which first threatened and then retracted duties on chips, smartphones and PCs. A confusion that undermines global confidence in the American system. Also discussed are […]