Note to the reader
First of all thank you for visiting the English version of the website edoardolimone.com. The site has over 470 articles that deal with cybersecurity, artificial intelligence, digitization. Translating all the material takes a lot of time and for this reason not all the content has been translated into other languages. It is a gradual process that aims to safeguard quality and costs. If an article of interest has not yet been translated, please be patient or, in the meantime, use one of the online translators.
Thank you for your patience and trust.
Edoardo Limone

Operational Continuity and Resilience
One of the most discussed aspects related to data breaches and regulatory compliance is certainly that of business continuity; let’s try to learn more about it and get a good

The cultural revolution of cybersecurity
Following the splendid DigEat Festival, organised by Digitalaw Srl in Lecce on 27-29 November, we feel it is useful to take a closer look at some of the topics discussed

Health: an issue yet to be resolved
Digital healthcare is still an absolutely critical element, also due to a non-federalised and heterogeneous organisation between regions. It is often the patients who suffer, but sometimes also the doctors.

The question of privacy on the European proposal against child abuse
The European Commission is to evaluate a proposal to reduce child abuse through mechanisms to control material on users’ devices. This initiative has raised a number of controversies and comments

E-Mail and Service Reliability
Let us talk about e-mail and, in particular, ordinary e-mail and its reliability. Today we are talking about the reliability of a service that allows billions of messages to be

Ransomware and UEFI: Insight
The ransomware threat has existed for more than ten years and in that time has developed into an increasingly sophisticated application logic that is difficult to detect and counter. Recently,

Data breach and supply chain
The relationship between data breach and the supply chain is often underestimated despite the fact that, for more than a decade, best practices have established useful methods and approaches to

Ransomware: reflections on the handling procedure
On 19 December 2024, the National Cybersecurity Agency (NCA) published a document entitled‘Ransomware. Characteristics, preparation and response to ransomware attacks‘ with the aim of defining good practice for managing and

Data breaches at Italian hotels
This summer was characterised by a number of quite interesting data breaches, including those against some Italian hotels.

A.I. and accuracy of answers
The purpose of this article is to reflect on some aspects of artificial intelligence including prompting, i.e. the ability to correctly ask the artificial intelligence algorithm a question in order

ACEA S.p.A.: Data Breach
On 31 July 2025, the data breach against the well-known company ACEA S.p.A. was published by the World Leaks group. The published data are many and would amount to some

Our (difficult) relationship with data
We are approaching the summer period, an optimal time to draw some conclusions related to this first part of 2025, with a critical and never trivial look.

Insight: Holy League
The Holy League is a cybergang involved in many socially motivated offensives: the main purpose of the Holy League is to protect certain Christian values. The Holy League is supposedly

Insight: Sylhet Gang
The Sylhet Gang collective (also SG) has been involved in numerous cyber offensives such as the famous #OpIsrael and the even more famous #OpFreePalestine. It has very clear pro-Palestinian connotations

Insight: Mr Hamza
This is a fact sheet on the collective called Mr Hamza, which has been involved in numerous cyber attacks, including in collaboration with DieNet, discussed here.

Cyber domination in the war between Israel and Iran
The protracted war between Israel and Iran has also been characterised, predictably, by actions carried out on the cyber level. Let us try to delve into some of them in

Data breach: Municipality of Pisa
The Municipality of Pisa was subject to a data breach by the NOVA collective. Let us try to understand what happened and the consequences of this action.

The ACN case and ‘cyber-dignity’
If you want, you can call it that, because in recent years it can be said that anything has become‘cyber‘; with the help of market opportunities and the ‘fashion’ of

The no data centre movement
As anyone interested in technology is well aware by now, there is a serious competitiveness problem in Europe compared to countries such as the U.S. and China. In Italy, in

From NIS 2 to Today: Failure and Opportunity
NIS 2 came into force in Italy on 16 October 2024, following transposition through Legislative Decree No. 138 of 4 September 2024, published in the Official Gazette on 1 October

Between data breaches and embarrassing communications
A few months after the entry into force of NIS 2, security shortcomings continue to be found in many commercial sectors that are impacted by the European Directive and beyond;

War and Peace: I.A. in warfare
The purpose of this article is to reflect on how artificial intelligence can be used in a war context and subsequently introduced into a civil operational environment.

Contracts and artificial intelligence
The purpose of this article is to suggest a simple and functional approach to cataloguing the risks arising from the implementation of artificial intelligence within organisations.

Risk Management and Artificial Intelligence
The purpose of this article is to show the evolution of ISO 27005, to present a compatible and alternative methodological paradigm for cyber risk management, and to observe some of