The most demanding challenge for cyber security in the digital transformation of enterprises, public institutions and citizens is nowadays represented by the integration of different systems, which must work together to offer new services and open new market channels. Indeed, the focus is shifting from the internet of things (ioT) and the internet of everything (IoE) to services and smart applications of the internet of systems. This last represents the required information technology need to make smart solutions to work correctly, such as processes related to data collections, artificial intelligence, domotics, public services, critical infrastructures or national security ones. In fact the digital transformation is affecting everyday life aspect from defence, industry, healthcare, to smart cities and and smart home. It follows the main question we should think about is if we are doing enough the ensure about the security of these systems, in order to assure about the safety of the technology we are using.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.