Non-fungible Tokens — by Alessandro Civati

Non-fungible tokens (NFT) are digital assets that include a wide range of unique tangible and intangible items such as virtual real estate, sports cards, and digital sneakers.

One significant advantage of owning a digital collectible over a physical collectible such as a rare minted coin is that the NFTs contain distinguishing information to make it unique and verifiable. That makes it impossible to create and circulate fake collectibles since each asset can be traced back to the original issuer.

An NFT cannot be directly exchanged for another NFT since they cannot be identical even when existing in the same platform…

AI in Health Care — by Alessandro Civati

In the last decade, we have seen the increased use of AI in the health sector. With the adoption of big data and AI in health, the public has its hopes and fears about health data use. According to most people, health data is an asset that should be used for research purposes and that should be handled with privacy. The public has its fears about commercial motives with the adoption of AI and risks associated with health data use. The other worry concerning the adoption of AI is the potential for job losses within the health sector. …

AI for Financial Services — by Alessandro Civati

With the recovery from the COVID-19 pandemic, financial services institutions are now moving from experimentation to implementation with artificial intelligence (AI) and machine learning (ML). We increasingly see the large-scale adoption of these technologies. The pandemic compelled financial organizations to adopt technologies that will help respond to customer needs around the clock. The effect has been widespread transformation at such as rapid pace to ensure critical operations run without interruptions.

More companies in the financial services sector have developed a keen interest in AI and ML-backed solutions. The advantages are reducing the need for manual interventions in their operations, improved…

Cybersecurity Awareness Culture — by Alessandro Civati

In 2020, security breaches were at an all-time high due to the effects of the COVID-19 pandemic. Malicious actors have taken advantage of the health fears, remote work arrangements, and the economic uncertainty to launch an unprecedented number of attacks.

The rise in the number and complexity of attacks has led to costly and devastating effects on businesses and businesses. We have seen targeted attacks on hospitals and ongoing research efforts to find a COVID-19 vaccine. …

Blockchain & Covid Pandemic — by Alessandro Civati

2020 has brought high-level interest in blockchain technology. The unfettered interest in the technology has not been an anomaly. The COVID-19 pandemic and the resulting challenges have exposed significant shortcomings in existing business processes and systems as well as the technologies that support them. Industry players across all sectors, including economic and health sectors, have experienced significant security challenges and other gaps.

2020 has proven to be a good year for blockchain technology which high levels of interest and growth. Such has been the blockchain technology impact that the Congressional Blockchain Caucus lobbied the US Federal government to use the…

Digital credentials and Skills — by Alessandro Civati

Technology is evolving fast and is transforming whole sectors of society. Significant changes around credentialing are happening in the education sector, seeing that the workforce’s needs in the 21st century have changed drastically. The revolution is happening in post-secondary education, with colleges and universities leading this change.

The fundamental structure of higher education is being transformed by digital technology, seeing that brick and mortar classrooms are gradually moving to digital space and awarding transcripts that have previously been tightly controlled by the institution awarding them.


A massive change is occurring in post-secondary credentialing which there being numerous pathways to…

Six important questions attackers ask when choosing a target — by Alessandro Civati

The past decade has seen a significant shift to the cloud for many businesses and organizations. With increasing numbers of assets being migrated to the cloud, security specialists have more work to safeguard them from attacks. The challenge has become even more prominent with businesses adopting remote work arrangements following the onset of the COVID-19 pandemic.

Remote work has accelerated the movement of businesses to the cloud. Security teams must adapt to offer support to cloud-based systems and become agile in protecting their assets across different attack surfaces. …

Mobile endpoint security, by Alessandro Civati

Enterprises use a combination of top-rated technology options and best practices in keeping away attackers who have become emboldened and more sophisticated. For example, businesses use a wide range of security solutions to protect their data both in motion and residing in the cloud or physical storage. You will find a wide array of tools ranging from firewalls to data loss prevention software.

Despite all these efforts to secure networks and data, the mobile endpoint remains the most significant security challenges for enterprises today. Attackers are aware of this and are always finding ways of exploiting mobile endpoints each day…

Blockchain & Education, by Alessandro Civati

Blockchain is essentially a distributed ledger technology more popular for being the technology backing cryptocurrencies such as Bitcoin and Ethereum. Blockchain technology can find widespread application in different economic sectors, including financial, education, healthcare, and security sectors.

As a distributed ledger technology, blockchain provides a transparent, verifiable register of transactions, which can help transform the education sector. One significant advantage of blockchain is that it is a decentralized technology that makes it secure and not susceptible to fraud. Different stakeholders have already deployed blockchain within the education ecosystem for various reasons, including improving learning opportunities. …

SaaS Misconfigurations by Alessandro Civati

On-premise or cloud? Enterprises are now highly dependent on SaaS applications for different organization functions, including marketing, file sharing, and collaboration. With the pandemic, businesses have come to appreciate one significant benefit of SaaS solutions — business continuity. There has been a substantial shift to the cloud and remote work as people were sent home as part of the measures to fight the pandemic.

One challenge identified with SaaS applications’ widespread adoption is the lack of resources to properly configure apps to ward off cyber-attacks, data breaches, and other cybersecurity risks. …

LutinX Inc.

LutinX digitally protect your idea, skills and values. We are an Hybrid Blockchain Platform KYC & AML Compliance with multiple Blockchain APPs in a single SUITE

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store