Festival of Diplomacy

The geopolitical challenge of quantum supercomputers As part of the Festival of Diplomacy 2023, Corrado Giustozzi at the Center for American Studies in Rome participated in a discussion on “The Geopolitical Challenge of Quantum Supercomputers.” The event was held in English, and it was possible to participate in person or via live streaming.

CLUSIT Security Summit Streaming Edition 2023

How is the scenario evolving? Global and national cybersecurity in the first 6 months 2023 On Thursday, November 9, Corrado Giustozzi, along with other authors of the “Clusit Report 2023 on ICT Security in Italy,” presented the new CLUSIT report with data analysis of attacks that occurred in the first half of 2023.

IEA Convention Autumn 2023

Istituto Superiore di Sanità di Roma Corrado Giustozzi will speak at the second day of the Fall Conference of the Italian Association of Epidemiology at the Istituto Superiore di Sanità in Rome. His presentation, “Limits and Vulnerabilities of Artificial Intelligence,” will open the section dedicated to “Reflections on Data Security, Ethics and Digital Health: an […]

Convention Nazionale CSQA Certificazioni

On Monday, Jan. 8, Corrado Giustozzi, chief strategist of Rexilience, will participate as a speaker at the CSQA Certifications National Convention with a talk on the topical issue : “Vulnerabilities and Risks in AI Systems.”

Technical round table at the Chamber: AI, cybersecurity and data under the European lens

Focus on investments, EU regulations and interoperability An important technical round table promoted by the National Association of Young Innovators, with the patronage of the European Parliament, will be held in the Refectory Room of the Chamber of Deputies. At the centre of the meeting will be the intervention of the Hon. Alessandro Giglio Vigna, […]

Intelligence repot

New attack vectors and business models of cybercrime Illegally stolen information is sold with different schemes to the past; business models evolve favoring subscription subscriptions. Exactly the same as in the legal economy! RaaS, MaaS, toolkits, and associated services are frantically evolving.

Step-by-step cyber attack

A journey through security technologies and services Analysis of the Technical Tactics and Procedures (TTP) of an attack, by the Managed Detection and Response (MDR) team through ESET XDR and Endpoint technologies. Through a step-by-step analyzed attack, it will be shown how an MDR service, with supporting XDR telemetry and Endpoint Protection, allows attackers’ tactics […]

Contact us

If you need further information about our services, please fill in the form below. We will get back to you as soon as possible.