Note to the reader
First of all thank you for visiting the English version of the website edoardolimone.com. The site has over 470 articles that deal with cybersecurity, artificial intelligence, digitization. Translating all the material takes a lot of time and for this reason not all the content has been translated into other languages. It is a gradual process that aims to safeguard quality and costs. If an article of interest has not yet been translated, please be patient or, in the meantime, use one of the online translators.
Thank you for your patience and trust.
Edoardo Limone

Technology and energy consumption
We are constantly talking about technologies such as blockchain and artificial intelligence, but we also have to assess the energy consumption and pollution related to their deployment. Let us try to get into the numbers with the aim of understanding the real importance of these technologies but also the heavy impact they have on the environment and available resources. We must use them wisely!

Artificial intelligence and online violence on animals and children
After the analysis carried out in 2021 and reported in the article‘Videos of animal violence are increasing on the net‘, it was decided to return to the subject a few

What is DWELL TIME in cybersecurity
It is a term little known to the uninitiated, but dwell time is perhaps one of the most important elements to know for those working in cybersecurity.

Data breach: Azienda Socio Sanitaria Territoriale Rhodense
Another data breach to the detriment of public health has hit the Lombardy region, this time it is the turn of ASST Rhodense, let’s try to understand what happened.

Artificial intelligence and data integrity
On 24 May, the final event of the Mastercourse 2024 organised by ANORC took place in Milan: the event is called MEDDLE. On that occasion, I had the opportunity to

Health data and use of management systems
As many will know, in April the Synlab facility was attacked by the BlackBasta collective. Among the data exfiltrated, in addition to identity documents and internal information on the facility,

How to respond to a data breach
Apart from the legal obligations in the event of a data breach and thus the notification to be made to the Data Protection Authority, it is necessary to understand how

Data Breach: Sella Bank
It has now been a few days since the Banca Sella data breach, and it is time to make a few remarks about what happened, outside of any controversy but

Data breach in the Lazio Region: the Garante’s measures
On the portal of the Garante per la Potezione dei Dati Personali (Italian Data Protection Authority), the measures against the Lazio Region, the company LazioCrea S.p.A. and ASL Roma 3

The importance of imperfection in the digital age
In recent years, a current has emerged against the purification process resulting from audio/video digitisation. It is an argument that music and film enthusiasts are familiar with, and it has

Segregation of functions in risk management
The GDPR has given clear rules for the correct handling of information, including through the adoption of specific organisational measures. There are some that are closely related to the technical

Environmental risk in the ICT context
In the landscape of cyber risks, it is correct to make appropriate distinctions because risk classification and risk management is one of the most interesting topics to investigate. Among the

Critical Security Controls: Incident Management
CSC control number 17 deals with‘Incident Management and Response‘ and is a very topical subject because, starting from the assumption that nobody is invulnerable to an IT incident, one of

Transhumanism: the relationship between technology and man
With the development of artificial intelligence, the term transhumanism has come up again. We try to understand what it is, what implications it has for society and, above all, how

Critical Security Controls: Training and Skills
Control 14 of CSCs is based on ‘Security Awareness and Competence Training’, an undoubtedly important but also surprising topic to find within documents of this type. Let us delve into

Critical Security Controls: Data Recovery
CSCs pay special attention to data recovery. Let us address this topic and analyse it in the light of current risks.

Artificial Intelligence and Postmodern Society
We continue to talk about Artificial Intelligence in every field, but it is also important to understand the social context in which this technology is set.

Critical Security Controls: Malware Defence
The journey through Critical Security Control, which began with the presentation, continues with one of the most interesting topics: defence against network threats.

Human Intelligence and Artificial Intelligence
We continue to use the term artificial intelligence to describe a discipline that currently has very little in common with the meaning of the word intelligence. Let us delve deeper

Critical Security Controls 8: presentation
Critical Security Controls are an essential resource for anyone wishing to approach cybersecurity at the enterprise level and are the basis of AgID Circular 2/2017. Few people are familiar with

Artificial Intelligence and Automata
A commonplace is to associate artificial intelligence with automata, with what are commonly referred to as robots. In this article, some thoughts on this issue will be expressed.

Artificial Intelligence: Technocracy, ecology and the future
There is an interesting text by Emanuele Severino, now certainly marked by time but equally stimulating, entitled ‘The Decline of Capitalism’, published by BUR, ISBN: 9788817018739. The text was revised

Data breach: Westpole S.p.A.
What happened to Westpole S.p.A. Let’s try to summarise the events, but above all, let’s try to better understand who Westpole S.p.A. is.

Artificial intelligence and the evolution of work
The belief that artificial intelligence will cause a retraining of labour is often misplaced. This is due to a lack of consideration of the process behind the revolution in the