
7
Feb
Welcome to Rewrite.technology
We are officially launching our new blog dedicated to Cyber Security and Technological Innovation!
Why this project?
Simple—we want to create a technical reference point for professionals and enthusiasts, offering high-value content on:
- Cybersecurity, best practices, and advanced IT solutions such as quantum computing and artificial intelligence.
- Analysis of emerging technologies and practical case studies.
- Technical guides for experts and educational resources for those new to technology and cybersecurity.
Who is this for?
- IT experts, engineers, security managers, and technicians looking for in-depth insights.
- Non-technical professionals and curious minds who want to understand the basics of cybersecurity and the latest trends in tech.
What are our strengths?
Experience + Accessibility: We combine technical rigor (white papers, specialized articles) with a fresh tone to engage both seasoned experts and newcomers.
What will we talk about?
- Technical articles on vulnerabilities, pentesting, cryptography, intelligence, quantum computing, artificial intelligence, and future innovations
- Real case studies and lessons learned from cyber incidents and our years of experience
- Infographics to grasp complex concepts in minutes
- Deep dives into AI, Quantum Computing, Cyber Security, and other disruptive technologies
Follow us to stay updated and be part of a community that values shared knowledge.
We aim to be your compass in the vast sea of cybersecurity.
Let’s build a safer digital future, together.
RELATED
Posts
12
Mar
Cybersecurity KPIs: How to Measure and Improve Your Security Posture
“If you don’t measure it, you can’t improve it.” This maxim also applies to cybersecurity: without clear KPIs and constant monitoring, companies are blindly navigating a sea of ever-changing threats. But which metrics really matter? And how can we use...
7
Feb
Phishing 2.0: The Emergence of AI-Powered Threats and the Rise of Deepfake Fraud
AI has revolutionized phishing, enabling deepfake videos, synthetic voices, and AI-generated text to bypass security measures. Cybercriminals use machine learning to craft highly personalized attacks, mimicking real communication. This article explores the growing threat and highlights the urgent need for...
3
Feb
Supply Chain Security: A Critical Analysis of Threats, Strategies, and Geopolitical Implications
The globalization of technological supply chains has exponentially amplified cybersecurity risks. As observed by Dunn Cavelty (2013), the supply chain represents today a “vector of systemic vulnerability,” where a single weak link can compromise entire ecosystems. The article Supply Chain...
3
Apr
Systematic Biases in Generative AI Models: The Hidden Influence of Design Decisions and Training Data
This article examines the multifaceted nature of biases in generative artificial intelligence systems, with particular emphasis on the significant yet often overlooked influence of developer-implemented guardrails. While biases inherited from training datasets have received substantial scholarly attention, this analysis argues...
12
Mar
Cybersecurity KPIs: How to Measure and Improve Your Security Posture
“If you don’t measure it, you can’t improve it.” This maxim also applies to cybersecurity: without clear KPIs and constant monitoring, companies are blindly navigating a sea of ever-changing threats. But which metrics really matter? And how can we use...
7
Feb
Phishing 2.0: The Emergence of AI-Powered Threats and the Rise of Deepfake Fraud
AI has revolutionized phishing, enabling deepfake videos, synthetic voices, and AI-generated text to bypass security measures. Cybercriminals use machine learning to craft highly personalized attacks, mimicking real communication. This article explores the growing threat and highlights the urgent need for...
3
Feb
Supply Chain Security: A Critical Analysis of Threats, Strategies, and Geopolitical Implications
The globalization of technological supply chains has exponentially amplified cybersecurity risks. As observed by Dunn Cavelty (2013), the supply chain represents today a “vector of systemic vulnerability,” where a single weak link can compromise entire ecosystems. The article Supply Chain...
3
Apr
Systematic Biases in Generative AI Models: The Hidden Influence of Design Decisions and Training Data
This article examines the multifaceted nature of biases in generative artificial intelligence systems, with particular emphasis on the significant yet often overlooked influence of developer-implemented guardrails. While biases inherited from training datasets have received substantial scholarly attention, this analysis argues...
12
Mar
Cybersecurity KPIs: How to Measure and Improve Your Security Posture
“If you don’t measure it, you can’t improve it.” This maxim also applies to cybersecurity: without clear KPIs and constant monitoring, companies are blindly navigating a sea of ever-changing threats. But which metrics really matter? And how can we use...
7
Feb
Phishing 2.0: The Emergence of AI-Powered Threats and the Rise of Deepfake Fraud
AI has revolutionized phishing, enabling deepfake videos, synthetic voices, and AI-generated text to bypass security measures. Cybercriminals use machine learning to craft highly personalized attacks, mimicking real communication. This article explores the growing threat and highlights the urgent need for...