07/01/2014
Cybersecurity and Stability in the Gulf

The Gulf has become a flashpoint for cyber conflict. Cyberspace has become an arena for covert struggle, with the United States, Israel and other nations on one side, and Iran and Russia on the other.

30/12/2013
Inside TAO: Documents Reveal Top NSA Hacking Unit

The NSA´s TAO hacking unit is considered to be the intelligence agency´s top secret weapon. It maintains its own covert network, infiltrates computers around the world and even intercepts shipping deliveries to plant back doors in electronics ordered by those it is targeting, says Der Spiegel.

22/12/2013
Tutti preoccupati dallo spionaggio cinese. Tranne noi?

La nuova frontiera dello spionaggio potrebbe essere l´inserimento di chip-spia all´interno delle apparecchiature per le comunicazioni che le aziende nazionali vendono all´estero.

16/12/2013
The UK National Cyber Security Strategy and Forward Plans

Two years have passed since the first UK National Cyber Security Strategy was published and much has been done by the UK Government towards delivering the four Strategy objectives for the "fifth domain" of warfare.

07/12/2013
I principi strategici delle politiche di cyber-security

Sul sito istituzionale dei nostri Servizi di Intelligence è stata appena pubblicata la mia ultima ricerca dal titolo "I principi strategici delle politiche di cybersecurity".


1 |  2 |  3 |  4 |  5 |  6 |  7 |  8 |  9 |  10 |  11 |  12 |  13 |  14 |  15 |  16 |  17 |  18 |  19 |  20 |  21 |  22 |  23 |  24 |  25 |  26 |  27 |  28 |  29 |  30 |  31 |  32 |  33 |  34 |  35 |  36 |  37 |  38 |  39 |  40 |  41 |  42 |  43 |  44 |  45 |  46 |  47 |  48 |  49 |  50 |  51 |  52 |  53 |  54 |  55 |  56 |  57 |  58 |  59 |  60 |