First of all thank you for visiting the English version of the website edoardolimone.com. The site has over 470 articles that deal with cybersecurity, artificial intelligence, digitization. Translating all the material takes a lot of time and for this reason not all the content has been translated into other languages. It is a gradual process that aims to safeguard quality and costs. If an article of interest has not yet been translated, please be patient or, in the meantime, use one of the online translators.

Thank you for your patience and trust.

Edoardo Limone

Healthcare

Health: an issue yet to be resolved

Digital healthcare is still an absolutely critical element, also due to a non-federalised and heterogeneous organisation between regions. It is often the patients who suffer, but sometimes also the doctors.

Read More »
Cybersecurity

E-Mail and Service Reliability

Let us talk about e-mail and, in particular, ordinary e-mail and its reliability. Today we are talking about the reliability of a service that allows billions of messages to be

Read More »
Cybersecurity

Ransomware and UEFI: Insight

The ransomware threat has existed for more than ten years and in that time has developed into an increasingly sophisticated application logic that is difficult to detect and counter. Recently,

Read More »
Cybersecurity

Data breach and supply chain

The relationship between data breach and the supply chain is often underestimated despite the fact that, for more than a decade, best practices have established useful methods and approaches to

Read More »
Artificial Intelligence

A.I. and accuracy of answers

The purpose of this article is to reflect on some aspects of artificial intelligence including prompting, i.e. the ability to correctly ask the artificial intelligence algorithm a question in order

Read More »
Cybersecurity

ACEA S.p.A.: Data Breach

On 31 July 2025, the data breach against the well-known company ACEA S.p.A. was published by the World Leaks group. The published data are many and would amount to some

Read More »
Cybersecurity

Insight: Holy League

The Holy League is a cybergang involved in many socially motivated offensives: the main purpose of the Holy League is to protect certain Christian values. The Holy League is supposedly

Read More »
Cybersecurity

Insight: Sylhet Gang

The Sylhet Gang collective (also SG) has been involved in numerous cyber offensives such as the famous #OpIsrael and the even more famous #OpFreePalestine. It has very clear pro-Palestinian connotations

Read More »
Cybersecurity

Insight: Mr Hamza

This is a fact sheet on the collective called Mr Hamza, which has been involved in numerous cyber attacks, including in collaboration with DieNet, discussed here.

Read More »
Various

The no data centre movement

As anyone interested in technology is well aware by now, there is a serious competitiveness problem in Europe compared to countries such as the U.S. and China. In Italy, in

Read More »
Artificial Intelligence

War and Peace: I.A. in warfare

The purpose of this article is to reflect on how artificial intelligence can be used in a war context and subsequently introduced into a civil operational environment.

Read More »
Artificial Intelligence

Contracts and artificial intelligence

The purpose of this article is to suggest a simple and functional approach to cataloguing the risks arising from the implementation of artificial intelligence within organisations.

Read More »