066 Radio24: Westpole ransomware attack

On Friday, December 22, Corrado Giustozzi, host of Enrico Pagliarini, accurately and thoroughly analyzed on Radio24 the ransomware attack suffered by Westpole for the serious consequences on Italy.

060 ISPI: Security risk

On Monday, October 30, Corrado Giustozzi participated, along with authoritative experts, in the episode of ISPI-Institute for International Policy Studies’ The World This Weekdedicated to delving into the impacts on European security of the terrorist risk resulting from the escalating conflict between Israel and Hamas.

062 CLUSIT Security Summit Streaming Edition 2023

On Thursday, November 9, Corrado Giustozzi, along with other authors of the “Clusit Report 2023 on ICT Security in Italy,” presented the new CLUSIT report with data analysis of attacks that occurred in the first half of 2023.

063 Webinar “Introduction to the Cloud. Risks to Consider”

The Cloud has been increasingly adopted by companies for many years, but many have yet to understand its best use and the risks that can result from misuse. In the webinar held by Alessandro Vallega, the meaning of Cloud (in its different forms) was defined, how it can be used and what steps are best […]

064 IEA Convention Fall 2023

Corrado Giustozzi will speak at the second day of the Fall Conference of the Italian Association of Epidemiology at the Istituto Superiore di Sanità in Rome. His presentation, “Limits and Vulnerabilities of Artificial Intelligence,” will open the section dedicated to “Reflections on Data Security, Ethics and Digital Health: an Integrated Framework.”

059 Festival of Diplomacy

As part of the Festival of Diplomacy 2023, Corrado Giustozzi at the Center for American Studies in Rome participated in a discussion on “The Geopolitical Challenge of Quantum Supercomputers.”The event was held in English, and it was possible to participate in person or via live streaming.

056d AI: Hype and Reality

Artificial intelligence technologies are a powerful tool in the hands of cyber criminals who use this technology to refine, speed up and extend cyber attacks on a large scale. While there is enthusiasm among the ‘BlackHats’ for the advent of WormGPT, the ‘good guys’ must quickly discuss the pressing need to transform traditional security systems […]