{"id":13112,"date":"2024-03-11T15:51:20","date_gmt":"2024-03-11T15:51:20","guid":{"rendered":"https:\/\/www.cyber40.it\/i-explain-how-our-lives-depend-on-cybersecurity-space\/"},"modified":"2025-05-15T20:04:33","modified_gmt":"2025-05-15T20:04:33","slug":"i-explain-how-our-lives-depend-on-cybersecurity-space","status":"publish","type":"post","link":"https:\/\/www.cyber40.it\/en\/i-explain-how-our-lives-depend-on-cybersecurity-space\/","title":{"rendered":"I explain how our lives depend on cybersecurity space"},"content":{"rendered":"\n<p>&#8220;If our economy is already space-based, so is our society. Cyber security is strategic for the 8,000 satellites in orbit, while enemy states and hackers lurk. Space is a useful but vulnerable economic domain. The most threatened sector is government. Essential components of our life on Earth depend on those few thousand objects. Planetary observation tools are substantial for several critical systems: from finance to agriculture, from transportation to intelligence. Thanks to satellite transmissions, a significant part of our smartphones&#8217; data connection and the<em>Internet of Things<\/em> exist. Hardly an average citizen could imagine a week without weather forecasts and directions. Space is actually an economic domain and has become so thanks to services we have discovered. Useful but also vulnerable. That&#8217;s why <strong>a successful cyber attack could have significant repercussions on our lives<\/strong>.&#8221;            <\/p>\n\n<p>These are the words in our Director, <strong>Matteo Lucchetti<\/strong>, interviewed by <strong>Federico Gennari Santori<\/strong> for <strong>Infra Journal<\/strong><\/p>\n\n<p>Read the full article here:<\/p>\n\n<p><a href=\"https:\/\/www.infrajournal.com\/it\/w\/cybersecurity-aerospaziale-satelliti\">https:\/\/www.infrajournal.com\/it\/w\/cybersecurity-aerospaziale-satelliti<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;If our economy is already space-based, so is our society. Cyber security is strategic for the 8,000 satellites in orbit, while enemy states and hackers lurk. Space is a useful but vulnerable economic domain. The most threatened sector is government&#8230;.<\/p>\n","protected":false},"author":17,"featured_media":11503,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"iawp_total_views":3,"footnotes":""},"categories":[614],"tags":[],"class_list":["post-13112","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>I explain how our lives depend on cybersecurity space - Cyber 4.0<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyber40.it\/en\/i-explain-how-our-lives-depend-on-cybersecurity-space\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"I explain how our lives depend on cybersecurity space - Cyber 4.0\" \/>\n<meta property=\"og:description\" content=\"&#8220;If our economy is already space-based, so is our society. Cyber security is strategic for the 8,000 satellites in orbit, while enemy states and hackers lurk. Space is a useful but vulnerable economic domain. The most threatened sector is government....\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyber40.it\/en\/i-explain-how-our-lives-depend-on-cybersecurity-space\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber 4.0\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-11T15:51:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-15T20:04:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/03\/Schermata-2024-03-11-alle-16.49.59-1024x747.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"747\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"giovanna buono\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"giovanna buono\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cyber40.it\/en\/i-explain-how-our-lives-depend-on-cybersecurity-space\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/i-explain-how-our-lives-depend-on-cybersecurity-space\/\"},\"author\":{\"name\":\"giovanna buono\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/d1cfb3a0a515988e98011798f5449a8f\"},\"headline\":\"I explain how our lives depend on cybersecurity space\",\"datePublished\":\"2024-03-11T15:51:20+00:00\",\"dateModified\":\"2025-05-15T20:04:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/i-explain-how-our-lives-depend-on-cybersecurity-space\/\"},\"wordCount\":171,\"publisher\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/i-explain-how-our-lives-depend-on-cybersecurity-space\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/03\/Schermata-2024-03-11-alle-16.49.59.png\",\"articleSection\":[\"Insights\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyber40.it\/en\/i-explain-how-our-lives-depend-on-cybersecurity-space\/\",\"url\":\"https:\/\/www.cyber40.it\/en\/i-explain-how-our-lives-depend-on-cybersecurity-space\/\",\"name\":\"I explain how our lives depend on cybersecurity space - Cyber 4.0\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/i-explain-how-our-lives-depend-on-cybersecurity-space\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/i-explain-how-our-lives-depend-on-cybersecurity-space\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/03\/Schermata-2024-03-11-alle-16.49.59.png\",\"datePublished\":\"2024-03-11T15:51:20+00:00\",\"dateModified\":\"2025-05-15T20:04:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/i-explain-how-our-lives-depend-on-cybersecurity-space\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyber40.it\/en\/i-explain-how-our-lives-depend-on-cybersecurity-space\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/i-explain-how-our-lives-depend-on-cybersecurity-space\/#primaryimage\",\"url\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/03\/Schermata-2024-03-11-alle-16.49.59.png\",\"contentUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/03\/Schermata-2024-03-11-alle-16.49.59.png\",\"width\":1698,\"height\":1238,\"caption\":\"Schermata 2024 03 11 alle 16.49.59\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyber40.it\/en\/i-explain-how-our-lives-depend-on-cybersecurity-space\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyber40.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"I explain how our lives depend on cybersecurity space\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#website\",\"url\":\"https:\/\/www.cyber40.it\/en\/\",\"name\":\"Cyber 4.0\",\"description\":\"Strategie e Competenze per la Cyber Sicurezza\",\"publisher\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyber40.it\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\",\"name\":\"Cyber 4.0\",\"url\":\"https:\/\/www.cyber40.it\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png\",\"contentUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png\",\"width\":395,\"height\":122,\"caption\":\"Cyber 4.0\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/cyber40\/?originalSubdomain=it\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/d1cfb3a0a515988e98011798f5449a8f\",\"name\":\"giovanna buono\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d758a31e93ab06d8ab3b5b41bdff4da5d5780d654149caef42d4b264d3855724?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d758a31e93ab06d8ab3b5b41bdff4da5d5780d654149caef42d4b264d3855724?s=96&d=mm&r=g\",\"caption\":\"giovanna buono\"},\"sameAs\":[\"https:\/\/www.cyber40.it\/\"],\"url\":\"https:\/\/www.cyber40.it\/en\/author\/cyber40\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"I explain how our lives depend on cybersecurity space - Cyber 4.0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyber40.it\/en\/i-explain-how-our-lives-depend-on-cybersecurity-space\/","og_locale":"en_US","og_type":"article","og_title":"I explain how our lives depend on cybersecurity space - Cyber 4.0","og_description":"&#8220;If our economy is already space-based, so is our society. Cyber security is strategic for the 8,000 satellites in orbit, while enemy states and hackers lurk. Space is a useful but vulnerable economic domain. The most threatened sector is government....","og_url":"https:\/\/www.cyber40.it\/en\/i-explain-how-our-lives-depend-on-cybersecurity-space\/","og_site_name":"Cyber 4.0","article_published_time":"2024-03-11T15:51:20+00:00","article_modified_time":"2025-05-15T20:04:33+00:00","og_image":[{"width":1024,"height":747,"url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/03\/Schermata-2024-03-11-alle-16.49.59-1024x747.png","type":"image\/png"}],"author":"giovanna buono","twitter_card":"summary_large_image","twitter_misc":{"Written by":"giovanna buono","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyber40.it\/en\/i-explain-how-our-lives-depend-on-cybersecurity-space\/#article","isPartOf":{"@id":"https:\/\/www.cyber40.it\/en\/i-explain-how-our-lives-depend-on-cybersecurity-space\/"},"author":{"name":"giovanna buono","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/d1cfb3a0a515988e98011798f5449a8f"},"headline":"I explain how our lives depend on cybersecurity space","datePublished":"2024-03-11T15:51:20+00:00","dateModified":"2025-05-15T20:04:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyber40.it\/en\/i-explain-how-our-lives-depend-on-cybersecurity-space\/"},"wordCount":171,"publisher":{"@id":"https:\/\/www.cyber40.it\/en\/#organization"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/i-explain-how-our-lives-depend-on-cybersecurity-space\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/03\/Schermata-2024-03-11-alle-16.49.59.png","articleSection":["Insights"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cyber40.it\/en\/i-explain-how-our-lives-depend-on-cybersecurity-space\/","url":"https:\/\/www.cyber40.it\/en\/i-explain-how-our-lives-depend-on-cybersecurity-space\/","name":"I explain how our lives depend on cybersecurity space - Cyber 4.0","isPartOf":{"@id":"https:\/\/www.cyber40.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyber40.it\/en\/i-explain-how-our-lives-depend-on-cybersecurity-space\/#primaryimage"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/i-explain-how-our-lives-depend-on-cybersecurity-space\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/03\/Schermata-2024-03-11-alle-16.49.59.png","datePublished":"2024-03-11T15:51:20+00:00","dateModified":"2025-05-15T20:04:33+00:00","breadcrumb":{"@id":"https:\/\/www.cyber40.it\/en\/i-explain-how-our-lives-depend-on-cybersecurity-space\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyber40.it\/en\/i-explain-how-our-lives-depend-on-cybersecurity-space\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/i-explain-how-our-lives-depend-on-cybersecurity-space\/#primaryimage","url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/03\/Schermata-2024-03-11-alle-16.49.59.png","contentUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/03\/Schermata-2024-03-11-alle-16.49.59.png","width":1698,"height":1238,"caption":"Schermata 2024 03 11 alle 16.49.59"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyber40.it\/en\/i-explain-how-our-lives-depend-on-cybersecurity-space\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyber40.it\/en\/"},{"@type":"ListItem","position":2,"name":"I explain how our lives depend on cybersecurity space"}]},{"@type":"WebSite","@id":"https:\/\/www.cyber40.it\/en\/#website","url":"https:\/\/www.cyber40.it\/en\/","name":"Cyber 4.0","description":"Strategie e Competenze per la Cyber Sicurezza","publisher":{"@id":"https:\/\/www.cyber40.it\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyber40.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cyber40.it\/en\/#organization","name":"Cyber 4.0","url":"https:\/\/www.cyber40.it\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png","contentUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png","width":395,"height":122,"caption":"Cyber 4.0"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cyber40\/?originalSubdomain=it"]},{"@type":"Person","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/d1cfb3a0a515988e98011798f5449a8f","name":"giovanna buono","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d758a31e93ab06d8ab3b5b41bdff4da5d5780d654149caef42d4b264d3855724?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d758a31e93ab06d8ab3b5b41bdff4da5d5780d654149caef42d4b264d3855724?s=96&d=mm&r=g","caption":"giovanna buono"},"sameAs":["https:\/\/www.cyber40.it\/"],"url":"https:\/\/www.cyber40.it\/en\/author\/cyber40\/"}]}},"taxonomy_info":{"category":[{"value":614,"label":"Insights"}]},"featured_image_src_large":["https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/03\/Schermata-2024-03-11-alle-16.49.59-1024x747.png",1024,747,true],"author_info":{"display_name":"giovanna buono","author_link":"https:\/\/www.cyber40.it\/en\/author\/cyber40\/"},"comment_info":"","category_info":[{"term_id":614,"name":"Insights","slug":"insights-en","term_group":0,"term_taxonomy_id":614,"taxonomy":"category","description":"","parent":0,"count":14,"filter":"raw","term_order":"0","cat_ID":614,"category_count":14,"category_description":"","cat_name":"Insights","category_nicename":"insights-en","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts\/13112","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/comments?post=13112"}],"version-history":[{"count":0,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts\/13112\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/media\/11503"}],"wp:attachment":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/media?parent=13112"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/categories?post=13112"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/tags?post=13112"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}