Some articles written by the members of our community: the topics could vary from regulations to new technologies, from some new threats to privacy.
How to participate?
You are welcome to participate to our blog, you can contribute at different levels: you could share the articles or make comments to our posts. In case that you are an expert in CyberSecurity you could write us to publish your article.
In this article, you will find an analysis, from a jurist point of view, on the possible resolution of cyber-security threat from the ever-expanding Internet of Things (IoT) or connected objects
New discovers about the attack to Yahoo in November 2014: the attack started in August 2013, where also passwords and other sensible data were compromised, including the source code of Yahoo that allowed the second attack that allowed to bypass the authentication to the portal.
The connected things (IoT) and the protection of privacy in EU. New development, security requirements every consumer and IoT producer should be aware of: any “Thing” can potentially become connected, surrounding us with a growing number of computers never turned off.