
Cybersecurity and summer (1)
It’s a scene that we have seen many times; on a beautiful Greek beach, an executive reviews a contract on his tablet and responds to

It’s a scene that we have seen many times; on a beautiful Greek beach, an executive reviews a contract on his tablet and responds to

The emergence of conversational artificial intelligence is profoundly changing the way content is consumed and monetized on the web. Traditional models based on classic SEO

For more than two decades, the web has been structured around an implicit but effective pact: internet users accessed a variety of content—articles, tutorials, videos,

In the first part of this article, we saw how crypto-currencies, originally designed to foster financial independence, have been massively hijacked by cybercriminals: ransomware, money

At the outset, crypto-currencies were the stuff of dreams: an autonomous financial system, free from banks, states and borders. More transparency, more freedom, more privacy.

In the first part of this article we reported that several major artificial intelligence models have been trained—at least partially—on copyrighted content obtained illegally. This

Artificial intelligence, particularly in its form based on Large Language Models (LLMs), relies on the ingestion of very large amounts of textual data. However, revelations

In the first part of our article, we looked at some of the most significant cyberattacks of the past decade. Here, we continue the analysis

Over the past decade, the IT threat landscape has changed radically, marked by spectacular cyberattacks that have shaken businesses, governments, and individuals alike. In our

We saw in the first part of our article why humans can be considered the weakest link in cybersecurity. Faced with the numerous human-induced vulnerabilities,