First of all thank you for visiting the English version of the website edoardolimone.com. The site has over 470 articles that deal with cybersecurity, artificial intelligence, digitization. Translating all the material takes a lot of time and for this reason not all the content has been translated into other languages. It is a gradual process that aims to safeguard quality and costs. If an article of interest has not yet been translated, please be patient or, in the meantime, use one of the online translators.

Thank you for your patience and trust.

Edoardo Limone

Cybersecurity

Insight: Holy League

The Holy League is a cybergang involved in many socially motivated offensives: the main purpose of the Holy League is to protect certain Christian values. The Holy League is supposedly

Read More »
Cybersecurity

Insight: Sylhet Gang

The Sylhet Gang collective (also SG) has been involved in numerous cyber offensives such as the famous #OpIsrael and the even more famous #OpFreePalestine. It has very clear pro-Palestinian connotations

Read More »
Cybersecurity

Insight: Mr Hamza

This is a fact sheet on the collective called Mr Hamza, which has been involved in numerous cyber attacks, including in collaboration with DieNet, discussed here.

Read More »
Various

The no data centre movement

As anyone interested in technology is well aware by now, there is a serious competitiveness problem in Europe compared to countries such as the U.S. and China. In Italy, in

Read More »
Artificial Intelligence

War and Peace: I.A. in warfare

The purpose of this article is to reflect on how artificial intelligence can be used in a war context and subsequently introduced into a civil operational environment.

Read More »
Artificial Intelligence

Contracts and artificial intelligence

The purpose of this article is to suggest a simple and functional approach to cataloguing the risks arising from the implementation of artificial intelligence within organisations.

Read More »
Cybersecurity

The Culture of Safety – Part 2

Italy is facing an increasing number of cyber threats both in quantity and complexity, yet there seems to be no equally effective evolution in terms of cybersecurity. Let us try

Read More »
Various

The future of Europe and the world

In these hours stadium choruses are rising on social networks for and against the self-styled agreement with Elon Musk’s Space X company, wanted by Prime Minister Giorgia Meloni.

Read More »
Cybersecurity

Cyber Anti-Sec 2024

Welcome to the ‘Cyber Anti-Sec’ security report covering the year 2024, in which the most relevant data, trends and data breaches will be analysed.

Read More »
Cybersecurity

Data breach: AIAD

AIAD is the Federation, member of Confindustria, representing Italian Aerospace, Defence and Security Companies.

Read More »
Cybersecurity

Data breach: INPS Servizi S.p.A.

The company INPS Servizi S.p.A. was the subject of a data breach by the LYNX collective, with data exfiltration and interruption of services. Let’s find out more.

Read More »
Cybersecurity

NIS 2: General Considerations

NIS 2 is bringing a number of compliance activities by private companies and public administrations, sometimes not very consistent with the regulations. Let us try to make some reflections on

Read More »
Cybersecurity

The culture of data management

The Equalize case is filling the front pages of the national press and is spreading like wildfire. On social media, it is being talked about in a very technical way,

Read More »
Artificial Intelligence

The usefulness of technology

For a few months now, we have been beginning to read articles that seem to re-propose the importance of certain technologies that have been much talked about until now. Among

Read More »