{"id":5465,"date":"2021-07-21T12:50:35","date_gmt":"2021-07-21T10:50:35","guid":{"rendered":"https:\/\/www.bitmat.it\/specialesicurezza\/?page_id=5465"},"modified":"2021-07-21T13:39:17","modified_gmt":"2021-07-21T11:39:17","slug":"home","status":"publish","type":"page","link":"https:\/\/www.bitmat.it\/specialesicurezza\/","title":{"rendered":"Home"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"5465\" class=\"elementor elementor-5465\">\n\t\t\t\t\t\t<section class=\"has-el-gap el-gap-default elementor-section elementor-top-section elementor-element elementor-element-1a6c20d4 is-full-xs elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1a6c20d4\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6670eeba\" data-id=\"6670eeba\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-14a2a394 elementor-widget elementor-widget-smartmag-featgrid\" data-id=\"14a2a394\" data-element_type=\"widget\" data-widget_type=\"smartmag-featgrid.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<section class=\"block-wrap block-feat-grid block-sc mb-none\" data-id=\"1\">\n\n\t\t\t\t\n\t\t\t<div class=\"block-content\">\n\t\t\t\t\t\n<section class=\"feat-grid feat-grid-a static feat-grid-ratio\">\n\n\t<div class=\"slides\" data-parallax>\n\t\n\t\n\t\t\t\t\t<div class=\"items-wrap slide-wrap\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t<div class=\"item item-large item-main item-1 pos-bot\">\n\n\t\t\t\t\t\n<article class=\"l-post grid-overlay grid-overlay-a hover-zoom\">\n\n\t\n\t\t\t<div class=\"media\">\n\n\t\t\n\t\t\t<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8374\/sicurezza-cloud-native-nel-2026-il-divario-di-maturita-e-limperativo-dellautomazione\" class=\"image-link\" title=\"Sicurezza cloud-native nel 2026: il divario di maturit\u00e0 e l\u2019imperativo dell\u2019automazione\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"743\" src=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/Screenshot-2025-11-02-alle-13.30.17-768x743.png\" class=\"attachment-bunyad-768 size-bunyad-768 wp-post-image\" alt=\"sicurezza-cloud-Clusit-DNS-sicurezza-Cybersecurity Summit\" sizes=\"(max-width: 585px) 100vw, 585px\" title=\"Sicurezza cloud-native nel 2026: il divario di maturit\u00e0 e l\u2019imperativo dell\u2019automazione\" srcset=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/Screenshot-2025-11-02-alle-13.30.17-768x743.png 768w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/Screenshot-2025-11-02-alle-13.30.17-1024x990.png 1024w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/Screenshot-2025-11-02-alle-13.30.17-1200x1160.png 1200w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/Screenshot-2025-11-02-alle-13.30.17.png 1266w\" \/><\/a>\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t\n\t\t<\/div>\n\t\n\n\t\t\t<div class=\"content-wrap\">\n\t\n\t\t<div class=\"content\">\n\n\t\t\t<div class=\"post-meta post-meta-a meta-contrast has-below\"><h2 class=\"is-title post-title\"><a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8374\/sicurezza-cloud-native-nel-2026-il-divario-di-maturita-e-limperativo-dellautomazione\">Sicurezza cloud-native nel 2026: il divario di maturit\u00e0 e l\u2019imperativo dell\u2019automazione<\/a><\/h2><div class=\"post-meta-items meta-below\"><span class=\"meta-item date\"><span class=\"date-link\"><time class=\"post-date\" datetime=\"2026-03-23T10:31:19+01:00\">23 Marzo 2026<\/time><\/span><\/span><\/div><\/div>\t\t\t\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\n\t\t\t<\/div>\n\t\n<\/article>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t<div class=\"item item-small item-2 pos-bot\">\n\n\t\t\t\t\t\n<article class=\"l-post grid-overlay grid-overlay-a hover-zoom\">\n\n\t\n\t\t\t<div class=\"media\">\n\n\t\t\n\t\t\t<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8371\/cybersecurity-serve-il-super-analista\" class=\"image-link\" title=\"Cybersecurity: serve il Super-analista\"><img loading=\"lazy\" decoding=\"async\" width=\"273\" height=\"300\" src=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/Screenshot-2025-11-06-alle-11.31.55-273x300.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"cybersecurity-resilienza-Marco Bavazzano-Axitea-sicurezza-supply chain\" sizes=\"(max-width: 768px) 50vw, 292px\" title=\"Cybersecurity: serve il Super-analista\" srcset=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/Screenshot-2025-11-06-alle-11.31.55-273x300.png 273w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/Screenshot-2025-11-06-alle-11.31.55-768x844.png 768w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/Screenshot-2025-11-06-alle-11.31.55-450x495.png 450w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/Screenshot-2025-11-06-alle-11.31.55.png 828w\" \/><\/a>\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t\n\t\t<\/div>\n\t\n\n\t\t\t<div class=\"content-wrap\">\n\t\n\t\t<div class=\"content\">\n\n\t\t\t<div class=\"post-meta post-meta-a meta-contrast has-below\"><h2 class=\"is-title post-title\"><a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8371\/cybersecurity-serve-il-super-analista\">Cybersecurity: serve il Super-analista<\/a><\/h2><div class=\"post-meta-items meta-below\"><span class=\"meta-item date\"><span class=\"date-link\"><time class=\"post-date\" datetime=\"2026-03-13T11:44:23+01:00\">13 Marzo 2026<\/time><\/span><\/span><\/div><\/div>\t\t\t\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\n\t\t\t<\/div>\n\t\n<\/article>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t<div class=\"item item-small item-3 pos-bot\">\n\n\t\t\t\t\t\n<article class=\"l-post grid-overlay grid-overlay-a hover-zoom\">\n\n\t\n\t\t\t<div class=\"media\">\n\n\t\t\n\t\t\t<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8369\/deepfake-al-telefono-come-individuarli-e-non-caderne-vittima\" class=\"image-link\" title=\"Deepfake al telefono: come individuarli e non caderne vittima?\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"300\" src=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/WordPress--200x300.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"WordPress-password-deepfake\" sizes=\"(max-width: 768px) 50vw, 292px\" title=\"Deepfake al telefono: come individuarli e non caderne vittima?\" srcset=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/WordPress--200x300.jpg 200w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/WordPress--683x1024.jpg 683w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/WordPress--768x1152.jpg 768w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/WordPress--150x225.jpg 150w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/WordPress--450x675.jpg 450w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/WordPress-.jpg 1000w\" \/><\/a>\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t\n\t\t<\/div>\n\t\n\n\t\t\t<div class=\"content-wrap\">\n\t\n\t\t<div class=\"content\">\n\n\t\t\t<div class=\"post-meta post-meta-a meta-contrast has-below\"><h2 class=\"is-title post-title\"><a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8369\/deepfake-al-telefono-come-individuarli-e-non-caderne-vittima\">Deepfake al telefono: come individuarli e non caderne vittima?<\/a><\/h2><div class=\"post-meta-items meta-below\"><span class=\"meta-item date\"><span class=\"date-link\"><time class=\"post-date\" datetime=\"2026-03-13T11:15:36+01:00\">13 Marzo 2026<\/time><\/span><\/span><\/div><\/div>\t\t\t\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\n\t\t\t<\/div>\n\t\n<\/article>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t<div class=\"item item-small item-4 pos-bot\">\n\n\t\t\t\t\t\n<article class=\"l-post grid-overlay grid-overlay-a hover-zoom\">\n\n\t\n\t\t\t<div class=\"media\">\n\n\t\t\n\t\t\t<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8366\/clusit-cyber-attacchi-49-nel-2025-rispetto-al-2024\" class=\"image-link\" title=\"Clusit, cyber attacchi + 49% nel 2025 rispetto al 2024\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"180\" src=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/thedigitalartist-security-4497950_1920-300x180.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"clusit-cybersecurity\" sizes=\"(max-width: 768px) 50vw, 292px\" title=\"Clusit, cyber attacchi + 49% nel 2025 rispetto al 2024\" srcset=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/thedigitalartist-security-4497950_1920-1024x614.png 1024w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/thedigitalartist-security-4497950_1920-768x461.png 768w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/thedigitalartist-security-4497950_1920-1536x922.png 1536w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/thedigitalartist-security-4497950_1920-450x270.png 450w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/thedigitalartist-security-4497950_1920-1200x720.png 1200w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/thedigitalartist-security-4497950_1920.png 1920w\" \/><\/a>\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t\n\t\t<\/div>\n\t\n\n\t\t\t<div class=\"content-wrap\">\n\t\n\t\t<div class=\"content\">\n\n\t\t\t<div class=\"post-meta post-meta-a meta-contrast has-below\"><h2 class=\"is-title post-title\"><a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8366\/clusit-cyber-attacchi-49-nel-2025-rispetto-al-2024\">Clusit, cyber attacchi + 49% nel 2025 rispetto al 2024<\/a><\/h2><div class=\"post-meta-items meta-below\"><span class=\"meta-item date\"><span class=\"date-link\"><time class=\"post-date\" datetime=\"2026-03-11T14:43:55+01:00\">11 Marzo 2026<\/time><\/span><\/span><\/div><\/div>\t\t\t\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\n\t\t\t<\/div>\n\t\n<\/article>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t<div class=\"item item-small item-5 pos-bot\">\n\n\t\t\t\t\t\n<article class=\"l-post grid-overlay grid-overlay-a hover-zoom\">\n\n\t\n\t\t\t<div class=\"media\">\n\n\t\t\n\t\t\t<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8363\/attacchi-alla-supply-chain-la-minaccia-informatica-piu-comune-per-le-aziende-nellultimo-anno\" class=\"image-link\" title=\"Attacchi alla supply chain: la minaccia informatica pi\u00f9 comune per le aziende nell\u2019ultimo anno\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"221\" src=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/Kaspersky_Supply-Chain-300x221.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"Kaspersky-Supply Chain\" sizes=\"(max-width: 768px) 50vw, 292px\" title=\"Attacchi alla supply chain: la minaccia informatica pi\u00f9 comune per le aziende nell\u2019ultimo anno\" srcset=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/Kaspersky_Supply-Chain-300x221.png 300w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/Kaspersky_Supply-Chain-768x566.png 768w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/Kaspersky_Supply-Chain-150x110.png 150w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/Kaspersky_Supply-Chain-450x331.png 450w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/Kaspersky_Supply-Chain.png 850w\" \/><\/a>\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t\n\t\t<\/div>\n\t\n\n\t\t\t<div class=\"content-wrap\">\n\t\n\t\t<div class=\"content\">\n\n\t\t\t<div class=\"post-meta post-meta-a meta-contrast has-below\"><h2 class=\"is-title post-title\"><a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8363\/attacchi-alla-supply-chain-la-minaccia-informatica-piu-comune-per-le-aziende-nellultimo-anno\">Attacchi alla supply chain: la minaccia informatica pi\u00f9 comune per le aziende nell\u2019ultimo anno<\/a><\/h2><div class=\"post-meta-items meta-below\"><span class=\"meta-item date\"><span class=\"date-link\"><time class=\"post-date\" datetime=\"2026-03-11T11:25:28+01:00\">11 Marzo 2026<\/time><\/span><\/span><\/div><\/div>\t\t\t\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\n\t\t\t<\/div>\n\t\n<\/article>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\n\t\t<\/div>\n\n<\/section>\n\t\t\t<\/div>\n\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has-el-gap el-gap-xlg elementor-section elementor-top-section elementor-element elementor-element-5f62386c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5f62386c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-1848ba11 main-content\" data-id=\"1848ba11\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4217ee5 elementor-widget elementor-widget-smartmag-newsfocus\" data-id=\"4217ee5\" data-element_type=\"widget\" data-widget_type=\"smartmag-newsfocus.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<section class=\"block-wrap block-news-focus block-sc\" data-id=\"2\" data-is-mixed=\"1\">\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t<div class=\"block-head block-head-ac block-head-c is-left\">\n\n\t\t\t\t\t<h4 class=\"heading\">Attualit\u00e0<\/h4>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t<div class=\"block-content\">\n\t\t\t\t\t\n\t<div class=\"grid cols-not-eq loops-mixed grid-2 md:grid-2 sm:grid-1\">\n\n\t\t\t\n\t<div class=\"loop loop-grid loop-grid-base grid grid-1 md:grid-1 xs:grid-1\">\n\n\t\t\t\t\t\n<article class=\"l-post grid-post grid-base-post\">\n\n\t\n\t\t\t<div class=\"media\">\n\n\t\t\n\t\t\t<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8376\/proofpoint-ridefinisce-la-sicurezza-di-email-e-dati-per-lagentic-workspace\" class=\"image-link media-ratio ratio-3-2\" title=\"Proofpoint ridefinisce la sicurezza di email e dati per l\u2019agentic workspace\"><img loading=\"lazy\" decoding=\"async\" width=\"377\" height=\"251\" src=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/sicurezza-e-mail-450x315.jpg\" class=\"attachment-bunyad-medium size-bunyad-medium wp-post-image\" alt=\"sicurezza-e-mail\" sizes=\"(max-width: 377px) 100vw, 377px\" title=\"Proofpoint ridefinisce la sicurezza di email e dati per l\u2019agentic workspace\" srcset=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/sicurezza-e-mail-450x315.jpg 450w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/sicurezza-e-mail-300x210.jpg 300w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/sicurezza-e-mail-1024x717.jpg 1024w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/sicurezza-e-mail-768x538.jpg 768w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/sicurezza-e-mail-1536x1075.jpg 1536w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/sicurezza-e-mail-2048x1434.jpg 2048w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/sicurezza-e-mail-150x105.jpg 150w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/sicurezza-e-mail-1200x840.jpg 1200w\" \/><\/a>\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t\n\t\t<\/div>\n\t\n\n\t\n\t\t<div class=\"content\">\n\n\t\t\t<div class=\"post-meta post-meta-a has-below\"><h2 class=\"is-title post-title\"><a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8376\/proofpoint-ridefinisce-la-sicurezza-di-email-e-dati-per-lagentic-workspace\">Proofpoint ridefinisce la sicurezza di email e dati per l\u2019agentic workspace<\/a><\/h2><div class=\"post-meta-items meta-below\"><span class=\"meta-item post-author\"><span class=\"by\">By<\/span> <a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/author\/bitmat\" title=\"Articoli scritti da Redazione BitMAT\" rel=\"author\">Redazione BitMAT<\/a><\/span><span class=\"meta-item date\"><span class=\"date-link\"><time class=\"post-date\" datetime=\"2026-03-23T10:41:52+01:00\">23 Marzo 2026<\/time><\/span><\/span><\/div><\/div>\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t<div class=\"excerpt\">\n\t\t\t\t\t<p>Una nuova architettura di posta elettronica integrata e basata sull\u2019intento e funzionalit\u00e0 di governance dell\u2019accesso ai dati guidate dall\u2019AI rafforzano la protezione in tutti gli ambienti di collaborazione e dati<\/p>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\n\t\n<\/article>\t\t\n\t<\/div>\n\n\t\t\n\n\t\t\n\t<div class=\"loop loop-small loop-small-a grid grid-1 md:grid-1 sm:grid-1 xs:grid-1\">\n\n\t\t\t\t\t\n<article class=\"l-post small-post small-a-post m-pos-left\">\n\n\t\n\t\t\t<div class=\"media\">\n\n\t\t\n\t\t\t<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8371\/cybersecurity-serve-il-super-analista\" class=\"image-link media-ratio ar-bunyad-thumb\" title=\"Cybersecurity: serve il Super-analista\"><img loading=\"lazy\" decoding=\"async\" width=\"110\" height=\"76\" src=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/Screenshot-2025-11-06-alle-11.31.55-273x300.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"cybersecurity-resilienza-Marco Bavazzano-Axitea-sicurezza-supply chain\" sizes=\"(max-width: 110px) 100vw, 110px\" title=\"Cybersecurity: serve il Super-analista\" srcset=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/Screenshot-2025-11-06-alle-11.31.55-273x300.png 273w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/Screenshot-2025-11-06-alle-11.31.55-768x844.png 768w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/Screenshot-2025-11-06-alle-11.31.55-150x165.png 150w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/Screenshot-2025-11-06-alle-11.31.55-450x495.png 450w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/Screenshot-2025-11-06-alle-11.31.55.png 828w\" \/><\/a>\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t\n\t\t<\/div>\n\t\n\n\t\n\t\t<div class=\"content\">\n\n\t\t\t<div class=\"post-meta post-meta-a post-meta-left has-below\"><h4 class=\"is-title post-title\"><a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8371\/cybersecurity-serve-il-super-analista\">Cybersecurity: serve il Super-analista<\/a><\/h4><div class=\"post-meta-items meta-below\"><span class=\"meta-item date\"><span class=\"date-link\"><time class=\"post-date\" datetime=\"2026-03-13T11:44:23+01:00\">13 Marzo 2026<\/time><\/span><\/span><\/div><\/div>\t\t\t\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\n\t\n<\/article>\t\n\t\t\t\t\t\n<article class=\"l-post small-post small-a-post m-pos-left\">\n\n\t\n\t\t\t<div class=\"media\">\n\n\t\t\n\t\t\t<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8369\/deepfake-al-telefono-come-individuarli-e-non-caderne-vittima\" class=\"image-link media-ratio ar-bunyad-thumb\" title=\"Deepfake al telefono: come individuarli e non caderne vittima?\"><img loading=\"lazy\" decoding=\"async\" width=\"110\" height=\"76\" src=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/WordPress--200x300.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"WordPress-password-deepfake\" sizes=\"(max-width: 110px) 100vw, 110px\" title=\"Deepfake al telefono: come individuarli e non caderne vittima?\" srcset=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/WordPress--200x300.jpg 200w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/WordPress--683x1024.jpg 683w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/WordPress--768x1152.jpg 768w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/WordPress--150x225.jpg 150w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/WordPress--450x675.jpg 450w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/WordPress-.jpg 1000w\" \/><\/a>\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t\n\t\t<\/div>\n\t\n\n\t\n\t\t<div class=\"content\">\n\n\t\t\t<div class=\"post-meta post-meta-a post-meta-left has-below\"><h4 class=\"is-title post-title\"><a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8369\/deepfake-al-telefono-come-individuarli-e-non-caderne-vittima\">Deepfake al telefono: come individuarli e non caderne vittima?<\/a><\/h4><div class=\"post-meta-items meta-below\"><span class=\"meta-item date\"><span class=\"date-link\"><time class=\"post-date\" datetime=\"2026-03-13T11:15:36+01:00\">13 Marzo 2026<\/time><\/span><\/span><\/div><\/div>\t\t\t\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\n\t\n<\/article>\t\n\t\t\t\t\t\n<article class=\"l-post small-post small-a-post m-pos-left\">\n\n\t\n\t\t\t<div class=\"media\">\n\n\t\t\n\t\t\t<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8358\/cyberdifesa-la-sovranita-e-ben-piu-che-un-requisito-normativo\" class=\"image-link media-ratio ar-bunyad-thumb\" title=\"Cyberdifesa: la sovranit\u00e0 \u00e8 ben pi\u00f9 che un requisito normativo\"><img loading=\"lazy\" decoding=\"async\" width=\"110\" height=\"76\" src=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/Screenshot-2026-03-03-alle-12.59.02-300x198.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"Stormshield-sovranit\u00e0\" sizes=\"(max-width: 110px) 100vw, 110px\" title=\"Cyberdifesa: la sovranit\u00e0 \u00e8 ben pi\u00f9 che un requisito normativo\" srcset=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/Screenshot-2026-03-03-alle-12.59.02-300x198.png 300w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/Screenshot-2026-03-03-alle-12.59.02-1024x676.png 1024w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/Screenshot-2026-03-03-alle-12.59.02-768x507.png 768w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/Screenshot-2026-03-03-alle-12.59.02-1536x1014.png 1536w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/Screenshot-2026-03-03-alle-12.59.02-2048x1353.png 2048w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/Screenshot-2026-03-03-alle-12.59.02-150x99.png 150w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/Screenshot-2026-03-03-alle-12.59.02-450x297.png 450w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/Screenshot-2026-03-03-alle-12.59.02-1200x793.png 1200w\" \/><\/a>\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t\n\t\t<\/div>\n\t\n\n\t\n\t\t<div class=\"content\">\n\n\t\t\t<div class=\"post-meta post-meta-a post-meta-left has-below\"><h4 class=\"is-title post-title\"><a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8358\/cyberdifesa-la-sovranita-e-ben-piu-che-un-requisito-normativo\">Cyberdifesa: la sovranit\u00e0 \u00e8 ben pi\u00f9 che un requisito normativo<\/a><\/h4><div class=\"post-meta-items meta-below\"><span class=\"meta-item date\"><span class=\"date-link\"><time class=\"post-date\" datetime=\"2026-03-03T13:07:33+01:00\">3 Marzo 2026<\/time><\/span><\/span><\/div><\/div>\t\t\t\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\n\t\n<\/article>\t\n\t\t\t\t\t\n<article class=\"l-post small-post small-a-post m-pos-left\">\n\n\t\n\t\t\t<div class=\"media\">\n\n\t\t\n\t\t\t<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8347\/ce-sempre-piu-spazio-per-i-soc-autonomi\" class=\"image-link media-ratio ar-bunyad-thumb\" title=\"C&#8217;\u00e8 sempre pi\u00f9 spazio per i SOC autonomi\"><img loading=\"lazy\" decoding=\"async\" width=\"110\" height=\"76\" src=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2024\/11\/servizi-Managed-dSOC-300x188.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"servizi-Managed-dSOC-soc autonomi\" sizes=\"(max-width: 110px) 100vw, 110px\" title=\"C&#8217;\u00e8 sempre pi\u00f9 spazio per i SOC autonomi\" srcset=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2024\/11\/servizi-Managed-dSOC-300x188.jpg 300w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2024\/11\/servizi-Managed-dSOC-150x94.jpg 150w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2024\/11\/servizi-Managed-dSOC-450x281.jpg 450w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2024\/11\/servizi-Managed-dSOC.jpg 640w\" \/><\/a>\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t\n\t\t<\/div>\n\t\n\n\t\n\t\t<div class=\"content\">\n\n\t\t\t<div class=\"post-meta post-meta-a post-meta-left has-below\"><h4 class=\"is-title post-title\"><a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8347\/ce-sempre-piu-spazio-per-i-soc-autonomi\">C&#8217;\u00e8 sempre pi\u00f9 spazio per i SOC autonomi<\/a><\/h4><div class=\"post-meta-items meta-below\"><span class=\"meta-item date\"><span class=\"date-link\"><time class=\"post-date\" datetime=\"2026-02-26T16:48:05+01:00\">26 Febbraio 2026<\/time><\/span><\/span><\/div><\/div>\t\t\t\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\n\t\n<\/article>\t\n\t\t\n\t<\/div>\n\n\t\t\t<\/div>\n\t\n\t\t\t\t<\/div>\n\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29e12c62 elementor-widget elementor-widget-smartmag-newsfocus\" data-id=\"29e12c62\" data-element_type=\"widget\" data-widget_type=\"smartmag-newsfocus.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<section class=\"block-wrap block-news-focus block-sc\" data-id=\"5\" data-is-mixed=\"1\">\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t<div class=\"block-head block-head-ac block-head-c is-left\">\n\n\t\t\t\t\t<h4 class=\"heading\">Opinioni<\/h4>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t<div class=\"block-content\">\n\t\t\t\t\t\n\t<div class=\"grid cols-not-eq loops-mixed grid-2 md:grid-2 sm:grid-1\">\n\n\t\t\t\n\t<div class=\"loop loop-grid loop-grid-base grid grid-1 md:grid-1 xs:grid-1\">\n\n\t\t\t\t\t\n<article class=\"l-post grid-post grid-base-post\">\n\n\t\n\t\t\t<div class=\"media\">\n\n\t\t\n\t\t\t<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8381\/la-corporate-social-responsibility-csr-e-un-tema-sempre-piu-rilevante-anche-nel-settore-della-cybersecurity\" class=\"image-link media-ratio ratio-3-2\" title=\"La Corporate Social Responsibility (CSR) \u00e8 un tema sempre pi\u00f9 rilevante anche nel settore della cybersecurity\"><img loading=\"lazy\" decoding=\"async\" width=\"377\" height=\"251\" src=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/Screenshot-2026-03-25-alle-13.25.54-450x299.png\" class=\"attachment-bunyad-medium size-bunyad-medium wp-post-image\" alt=\"CSR\" sizes=\"(max-width: 377px) 100vw, 377px\" title=\"La Corporate Social Responsibility (CSR) \u00e8 un tema sempre pi\u00f9 rilevante anche nel settore della cybersecurity\" srcset=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/Screenshot-2026-03-25-alle-13.25.54-450x299.png 450w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/Screenshot-2026-03-25-alle-13.25.54-300x200.png 300w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/Screenshot-2026-03-25-alle-13.25.54-1024x681.png 1024w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/Screenshot-2026-03-25-alle-13.25.54-768x511.png 768w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/Screenshot-2026-03-25-alle-13.25.54-150x100.png 150w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/Screenshot-2026-03-25-alle-13.25.54-1200x798.png 1200w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/Screenshot-2026-03-25-alle-13.25.54.png 1266w\" \/><\/a>\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t\n\t\t<\/div>\n\t\n\n\t\n\t\t<div class=\"content\">\n\n\t\t\t<div class=\"post-meta post-meta-a has-below\"><h2 class=\"is-title post-title\"><a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8381\/la-corporate-social-responsibility-csr-e-un-tema-sempre-piu-rilevante-anche-nel-settore-della-cybersecurity\">La Corporate Social Responsibility (CSR) \u00e8 un tema sempre pi\u00f9 rilevante anche nel settore della cybersecurity<\/a><\/h2><div class=\"post-meta-items meta-below\"><span class=\"meta-item post-author\"><span class=\"by\">By<\/span> <a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/author\/bitmat\" title=\"Articoli scritti da Redazione BitMAT\" rel=\"author\">Redazione BitMAT<\/a><\/span><span class=\"meta-item date\"><span class=\"date-link\"><time class=\"post-date\" datetime=\"2026-03-25T13:30:47+01:00\">25 Marzo 2026<\/time><\/span><\/span><\/div><\/div>\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t<div class=\"excerpt\">\n\t\t\t\t\t<p>Impatto ambientale, resilienza e nuove responsabilit\u00e0: un\u2019analisi di Sylvie Blondel, HR &amp; CSR Director di Stormshield, sul ruolo della Corporate Social Responsibility nelle aziende<\/p>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\n\t\n<\/article>\t\t\n\t<\/div>\n\n\t\t\n\n\t\t\n\t<div class=\"loop loop-small loop-small-a grid grid-1 md:grid-1 sm:grid-1 xs:grid-1\">\n\n\t\t\t\t\t\n<article class=\"l-post small-post small-a-post m-pos-left\">\n\n\t\n\t\t\t<div class=\"media\">\n\n\t\t\n\t\t\t<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8356\/resilienza-2026-perche-la-sicurezza-di-unazienda-dipende-anche-dai-fornitori\" class=\"image-link media-ratio ar-bunyad-thumb\" title=\"Resilienza 2026: perch\u00e9 la sicurezza di un\u2019azienda dipende anche dai fornitori\"><img loading=\"lazy\" decoding=\"async\" width=\"110\" height=\"76\" src=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/Screenshot-2025-11-06-alle-11.31.55-273x300.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"cybersecurity-resilienza-Marco Bavazzano-Axitea-sicurezza-supply chain\" sizes=\"(max-width: 110px) 100vw, 110px\" title=\"Resilienza 2026: perch\u00e9 la sicurezza di un\u2019azienda dipende anche dai fornitori\" srcset=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/Screenshot-2025-11-06-alle-11.31.55-273x300.png 273w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/Screenshot-2025-11-06-alle-11.31.55-768x844.png 768w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/Screenshot-2025-11-06-alle-11.31.55-150x165.png 150w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/Screenshot-2025-11-06-alle-11.31.55-450x495.png 450w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/Screenshot-2025-11-06-alle-11.31.55.png 828w\" \/><\/a>\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t\n\t\t<\/div>\n\t\n\n\t\n\t\t<div class=\"content\">\n\n\t\t\t<div class=\"post-meta post-meta-a post-meta-left has-below\"><h4 class=\"is-title post-title\"><a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8356\/resilienza-2026-perche-la-sicurezza-di-unazienda-dipende-anche-dai-fornitori\">Resilienza 2026: perch\u00e9 la sicurezza di un\u2019azienda dipende anche dai fornitori<\/a><\/h4><div class=\"post-meta-items meta-below\"><span class=\"meta-item date\"><span class=\"date-link\"><time class=\"post-date\" datetime=\"2026-03-03T12:26:59+01:00\">3 Marzo 2026<\/time><\/span><\/span><\/div><\/div>\t\t\t\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\n\t\n<\/article>\t\n\t\t\t\t\t\n<article class=\"l-post small-post small-a-post m-pos-left\">\n\n\t\n\t\t\t<div class=\"media\">\n\n\t\t\n\t\t\t<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8353\/cybersecurity-limiti-e-futuro-dellattuale-crittografia\" class=\"image-link media-ratio ar-bunyad-thumb\" title=\"Cybersecurity: limiti e futuro dell&#8217;attuale crittografia\"><img loading=\"lazy\" decoding=\"async\" width=\"110\" height=\"76\" src=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/Screenshot-2026-03-03-alle-12.00.46-296x300.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"Sergio Ajani-Innovaway-crittografia\" sizes=\"(max-width: 110px) 100vw, 110px\" title=\"Cybersecurity: limiti e futuro dell&#8217;attuale crittografia\" srcset=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/Screenshot-2026-03-03-alle-12.00.46-296x300.png 296w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/Screenshot-2026-03-03-alle-12.00.46-768x779.png 768w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/Screenshot-2026-03-03-alle-12.00.46-150x152.png 150w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/Screenshot-2026-03-03-alle-12.00.46-450x457.png 450w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/Screenshot-2026-03-03-alle-12.00.46.png 948w\" \/><\/a>\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t\n\t\t<\/div>\n\t\n\n\t\n\t\t<div class=\"content\">\n\n\t\t\t<div class=\"post-meta post-meta-a post-meta-left has-below\"><h4 class=\"is-title post-title\"><a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8353\/cybersecurity-limiti-e-futuro-dellattuale-crittografia\">Cybersecurity: limiti e futuro dell&#8217;attuale crittografia<\/a><\/h4><div class=\"post-meta-items meta-below\"><span class=\"meta-item date\"><span class=\"date-link\"><time class=\"post-date\" datetime=\"2026-03-03T12:06:27+01:00\">3 Marzo 2026<\/time><\/span><\/span><\/div><\/div>\t\t\t\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\n\t\n<\/article>\t\n\t\t\t\t\t\n<article class=\"l-post small-post small-a-post m-pos-left\">\n\n\t\n\t\t\t<div class=\"media\">\n\n\t\t\n\t\t\t<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8301\/lai-e-la-nuova-minaccia-interna-come-cambia-la-gestione-del-rischio\" class=\"image-link media-ratio ar-bunyad-thumb\" title=\"L\u2019AI \u00e8 la nuova minaccia interna: come cambia la gestione del rischio\"><img loading=\"lazy\" decoding=\"async\" width=\"110\" height=\"76\" src=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/02\/Marco-Zani_Proofpoint-300x200.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"Marco Zani-Proofpoint-AI\" sizes=\"(max-width: 110px) 100vw, 110px\" title=\"L\u2019AI \u00e8 la nuova minaccia interna: come cambia la gestione del rischio\" srcset=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/02\/Marco-Zani_Proofpoint-300x200.jpg 300w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/02\/Marco-Zani_Proofpoint-1024x683.jpg 1024w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/02\/Marco-Zani_Proofpoint-768x512.jpg 768w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/02\/Marco-Zani_Proofpoint-1536x1024.jpg 1536w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/02\/Marco-Zani_Proofpoint-2048x1365.jpg 2048w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/02\/Marco-Zani_Proofpoint-150x100.jpg 150w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/02\/Marco-Zani_Proofpoint-450x300.jpg 450w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/02\/Marco-Zani_Proofpoint-1200x800.jpg 1200w\" \/><\/a>\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t\n\t\t<\/div>\n\t\n\n\t\n\t\t<div class=\"content\">\n\n\t\t\t<div class=\"post-meta post-meta-a post-meta-left has-below\"><h4 class=\"is-title post-title\"><a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8301\/lai-e-la-nuova-minaccia-interna-come-cambia-la-gestione-del-rischio\">L\u2019AI \u00e8 la nuova minaccia interna: come cambia la gestione del rischio<\/a><\/h4><div class=\"post-meta-items meta-below\"><span class=\"meta-item date\"><span class=\"date-link\"><time class=\"post-date\" datetime=\"2026-02-10T11:23:00+01:00\">10 Febbraio 2026<\/time><\/span><\/span><\/div><\/div>\t\t\t\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\n\t\n<\/article>\t\n\t\t\t\t\t\n<article class=\"l-post small-post small-a-post m-pos-left\">\n\n\t\n\t\t\t<div class=\"media\">\n\n\t\t\n\t\t\t<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8291\/disaster-recovery-e-tempo-di-passare-da-una-sicurezza-preventiva-alla-cyber-resilience\" class=\"image-link media-ratio ar-bunyad-thumb\" title=\"Disaster recovery: \u00e8 tempo di passare da una sicurezza preventiva alla cyber resilience\"><img loading=\"lazy\" decoding=\"async\" width=\"110\" height=\"76\" src=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/Wayfinder-300x180.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"cybersecurity analysts-disaster recovery-Wayfinder-deloitte-cybersecurity-Vantage IQ\" sizes=\"(max-width: 110px) 100vw, 110px\" title=\"Disaster recovery: \u00e8 tempo di passare da una sicurezza preventiva alla cyber resilience\" srcset=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/Wayfinder-300x180.jpg 300w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/Wayfinder-150x90.jpg 150w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/Wayfinder-450x270.jpg 450w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/Wayfinder.jpg 640w\" \/><\/a>\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t\n\t\t<\/div>\n\t\n\n\t\n\t\t<div class=\"content\">\n\n\t\t\t<div class=\"post-meta post-meta-a post-meta-left has-below\"><h4 class=\"is-title post-title\"><a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8291\/disaster-recovery-e-tempo-di-passare-da-una-sicurezza-preventiva-alla-cyber-resilience\">Disaster recovery: \u00e8 tempo di passare da una sicurezza preventiva alla cyber resilience<\/a><\/h4><div class=\"post-meta-items meta-below\"><span class=\"meta-item date\"><span class=\"date-link\"><time class=\"post-date\" datetime=\"2026-01-30T12:55:40+01:00\">30 Gennaio 2026<\/time><\/span><\/span><\/div><\/div>\t\t\t\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\n\t\n<\/article>\t\n\t\t\n\t<\/div>\n\n\t\t\t<\/div>\n\t\n\t\t\t\t<\/div>\n\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-69e2e94b elementor-widget elementor-widget-smartmag-newsfocus\" data-id=\"69e2e94b\" data-element_type=\"widget\" data-widget_type=\"smartmag-newsfocus.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<section class=\"block-wrap block-news-focus block-sc\" data-id=\"8\" data-is-mixed=\"1\">\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t<div class=\"block-head block-head-ac block-head-c is-left\">\n\n\t\t\t\t\t<h4 class=\"heading\">Ricerche<\/h4>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t<div class=\"block-content\">\n\t\t\t\t\t\n\t<div class=\"grid cols-not-eq loops-mixed grid-2 md:grid-2 sm:grid-1\">\n\n\t\t\t\n\t<div class=\"loop loop-grid loop-grid-base grid grid-1 md:grid-1 xs:grid-1\">\n\n\t\t\t\t\t\n<article class=\"l-post grid-post grid-base-post\">\n\n\t\n\t\t\t<div class=\"media\">\n\n\t\t\n\t\t\t<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8378\/akamai-soti-report-con-lai-le-api-diventano-il-principale-punto-di-vulnerabilita\" class=\"image-link media-ratio ratio-3-2\" title=\"Akamai SOTI Report: con l&#8217;AI le API diventano il principale punto di vulnerabilit\u00e0\"><img loading=\"lazy\" decoding=\"async\" width=\"377\" height=\"251\" src=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/download.png\" class=\"attachment-large size-large wp-post-image\" alt=\"Akamai SOTI Report\" sizes=\"(max-width: 377px) 100vw, 377px\" title=\"Akamai SOTI Report: con l&#8217;AI le API diventano il principale punto di vulnerabilit\u00e0\" srcset=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/download.png 237w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/download-150x94.png 150w\" \/><\/a>\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t\n\t\t<\/div>\n\t\n\n\t\n\t\t<div class=\"content\">\n\n\t\t\t<div class=\"post-meta post-meta-a has-below\"><h2 class=\"is-title post-title\"><a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8378\/akamai-soti-report-con-lai-le-api-diventano-il-principale-punto-di-vulnerabilita\">Akamai SOTI Report: con l&#8217;AI le API diventano il principale punto di vulnerabilit\u00e0<\/a><\/h2><div class=\"post-meta-items meta-below\"><span class=\"meta-item post-author\"><span class=\"by\">By<\/span> <a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/author\/bitmat\" title=\"Articoli scritti da Redazione BitMAT\" rel=\"author\">Redazione BitMAT<\/a><\/span><span class=\"meta-item date\"><span class=\"date-link\"><time class=\"post-date\" datetime=\"2026-03-24T11:24:01+01:00\">24 Marzo 2026<\/time><\/span><\/span><\/div><\/div>\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t<div class=\"excerpt\">\n\t\t\t\t\t<p>Con l\u2019accelerazione dell\u2019adozione dell\u2019AI da parte delle aziende, le API sono diventate la principale superficie di attacco. I dati dei ricercatori Akamai<\/p>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\n\t\n<\/article>\t\t\n\t<\/div>\n\n\t\t\n\n\t\t\n\t<div class=\"loop loop-small loop-small-a grid grid-1 md:grid-1 sm:grid-1 xs:grid-1\">\n\n\t\t\t\t\t\n<article class=\"l-post small-post small-a-post m-pos-left\">\n\n\t\n\t\t\t<div class=\"media\">\n\n\t\t\n\t\t\t<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8374\/sicurezza-cloud-native-nel-2026-il-divario-di-maturita-e-limperativo-dellautomazione\" class=\"image-link media-ratio ar-bunyad-thumb\" title=\"Sicurezza cloud-native nel 2026: il divario di maturit\u00e0 e l\u2019imperativo dell\u2019automazione\"><img loading=\"lazy\" decoding=\"async\" width=\"110\" height=\"76\" src=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/Screenshot-2025-11-02-alle-13.30.17-300x290.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"sicurezza-cloud-Clusit-DNS-sicurezza-Cybersecurity Summit\" sizes=\"(max-width: 110px) 100vw, 110px\" title=\"Sicurezza cloud-native nel 2026: il divario di maturit\u00e0 e l\u2019imperativo dell\u2019automazione\" srcset=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/Screenshot-2025-11-02-alle-13.30.17-300x290.png 300w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/Screenshot-2025-11-02-alle-13.30.17-1024x990.png 1024w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/Screenshot-2025-11-02-alle-13.30.17-768x743.png 768w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/Screenshot-2025-11-02-alle-13.30.17-150x145.png 150w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/Screenshot-2025-11-02-alle-13.30.17-450x435.png 450w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/Screenshot-2025-11-02-alle-13.30.17-1200x1160.png 1200w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/11\/Screenshot-2025-11-02-alle-13.30.17.png 1266w\" \/><\/a>\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t\n\t\t<\/div>\n\t\n\n\t\n\t\t<div class=\"content\">\n\n\t\t\t<div class=\"post-meta post-meta-a post-meta-left has-below\"><h4 class=\"is-title post-title\"><a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8374\/sicurezza-cloud-native-nel-2026-il-divario-di-maturita-e-limperativo-dellautomazione\">Sicurezza cloud-native nel 2026: il divario di maturit\u00e0 e l\u2019imperativo dell\u2019automazione<\/a><\/h4><div class=\"post-meta-items meta-below\"><span class=\"meta-item date\"><span class=\"date-link\"><time class=\"post-date\" datetime=\"2026-03-23T10:31:19+01:00\">23 Marzo 2026<\/time><\/span><\/span><\/div><\/div>\t\t\t\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\n\t\n<\/article>\t\n\t\t\t\t\t\n<article class=\"l-post small-post small-a-post m-pos-left\">\n\n\t\n\t\t\t<div class=\"media\">\n\n\t\t\n\t\t\t<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8366\/clusit-cyber-attacchi-49-nel-2025-rispetto-al-2024\" class=\"image-link media-ratio ar-bunyad-thumb\" title=\"Clusit, cyber attacchi + 49% nel 2025 rispetto al 2024\"><img loading=\"lazy\" decoding=\"async\" width=\"110\" height=\"76\" src=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/thedigitalartist-security-4497950_1920-300x180.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"clusit-cybersecurity\" sizes=\"(max-width: 110px) 100vw, 110px\" title=\"Clusit, cyber attacchi + 49% nel 2025 rispetto al 2024\" srcset=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/thedigitalartist-security-4497950_1920-300x180.png 300w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/thedigitalartist-security-4497950_1920-1024x614.png 1024w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/thedigitalartist-security-4497950_1920-768x461.png 768w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/thedigitalartist-security-4497950_1920-1536x922.png 1536w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/thedigitalartist-security-4497950_1920-150x90.png 150w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/thedigitalartist-security-4497950_1920-450x270.png 450w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/thedigitalartist-security-4497950_1920-1200x720.png 1200w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/thedigitalartist-security-4497950_1920.png 1920w\" \/><\/a>\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t\n\t\t<\/div>\n\t\n\n\t\n\t\t<div class=\"content\">\n\n\t\t\t<div class=\"post-meta post-meta-a post-meta-left has-below\"><h4 class=\"is-title post-title\"><a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8366\/clusit-cyber-attacchi-49-nel-2025-rispetto-al-2024\">Clusit, cyber attacchi + 49% nel 2025 rispetto al 2024<\/a><\/h4><div class=\"post-meta-items meta-below\"><span class=\"meta-item date\"><span class=\"date-link\"><time class=\"post-date\" datetime=\"2026-03-11T14:43:55+01:00\">11 Marzo 2026<\/time><\/span><\/span><\/div><\/div>\t\t\t\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\n\t\n<\/article>\t\n\t\t\t\t\t\n<article class=\"l-post small-post small-a-post m-pos-left\">\n\n\t\n\t\t\t<div class=\"media\">\n\n\t\t\n\t\t\t<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8363\/attacchi-alla-supply-chain-la-minaccia-informatica-piu-comune-per-le-aziende-nellultimo-anno\" class=\"image-link media-ratio ar-bunyad-thumb\" title=\"Attacchi alla supply chain: la minaccia informatica pi\u00f9 comune per le aziende nell\u2019ultimo anno\"><img loading=\"lazy\" decoding=\"async\" width=\"110\" height=\"76\" src=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/Kaspersky_Supply-Chain-300x221.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"Kaspersky-Supply Chain\" sizes=\"(max-width: 110px) 100vw, 110px\" title=\"Attacchi alla supply chain: la minaccia informatica pi\u00f9 comune per le aziende nell\u2019ultimo anno\" srcset=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/Kaspersky_Supply-Chain-300x221.png 300w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/Kaspersky_Supply-Chain-768x566.png 768w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/Kaspersky_Supply-Chain-150x110.png 150w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/Kaspersky_Supply-Chain-450x331.png 450w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/03\/Kaspersky_Supply-Chain.png 850w\" \/><\/a>\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t\n\t\t<\/div>\n\t\n\n\t\n\t\t<div class=\"content\">\n\n\t\t\t<div class=\"post-meta post-meta-a post-meta-left has-below\"><h4 class=\"is-title post-title\"><a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8363\/attacchi-alla-supply-chain-la-minaccia-informatica-piu-comune-per-le-aziende-nellultimo-anno\">Attacchi alla supply chain: la minaccia informatica pi\u00f9 comune per le aziende nell\u2019ultimo anno<\/a><\/h4><div class=\"post-meta-items meta-below\"><span class=\"meta-item date\"><span class=\"date-link\"><time class=\"post-date\" datetime=\"2026-03-11T11:25:28+01:00\">11 Marzo 2026<\/time><\/span><\/span><\/div><\/div>\t\t\t\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\n\t\n<\/article>\t\n\t\t\t\t\t\n<article class=\"l-post small-post small-a-post m-pos-left\">\n\n\t\n\t\t\t<div class=\"media\">\n\n\t\t\n\t\t\t<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8349\/anche-le-imprese-familiari-italiane-nel-mirino-del-cybercrime\" class=\"image-link media-ratio ar-bunyad-thumb\" title=\"Anche le imprese familiari italiane nel mirino del cybercrime\"><img loading=\"lazy\" decoding=\"async\" width=\"110\" height=\"76\" src=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/02\/Screenshot-2026-02-26-alle-16.52.20-274x300.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"imprese familiari\" sizes=\"(max-width: 110px) 100vw, 110px\" title=\"Anche le imprese familiari italiane nel mirino del cybercrime\" srcset=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/02\/Screenshot-2026-02-26-alle-16.52.20-274x300.png 274w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/02\/Screenshot-2026-02-26-alle-16.52.20-768x841.png 768w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/02\/Screenshot-2026-02-26-alle-16.52.20-150x164.png 150w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/02\/Screenshot-2026-02-26-alle-16.52.20-450x493.png 450w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/02\/Screenshot-2026-02-26-alle-16.52.20.png 842w\" \/><\/a>\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t\n\t\t<\/div>\n\t\n\n\t\n\t\t<div class=\"content\">\n\n\t\t\t<div class=\"post-meta post-meta-a post-meta-left has-below\"><h4 class=\"is-title post-title\"><a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8349\/anche-le-imprese-familiari-italiane-nel-mirino-del-cybercrime\">Anche le imprese familiari italiane nel mirino del cybercrime<\/a><\/h4><div class=\"post-meta-items meta-below\"><span class=\"meta-item date\"><span class=\"date-link\"><time class=\"post-date\" datetime=\"2026-02-26T16:55:39+01:00\">26 Febbraio 2026<\/time><\/span><\/span><\/div><\/div>\t\t\t\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\n\t\n<\/article>\t\n\t\t\n\t<\/div>\n\n\t\t\t<\/div>\n\t\n\t\t\t\t<\/div>\n\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ca226fb elementor-widget elementor-widget-smartmag-postslist\" data-id=\"2ca226fb\" data-element_type=\"widget\" data-widget_type=\"smartmag-postslist.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<section class=\"block-wrap block-posts-list block-sc mb-none\" data-id=\"11\">\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t<div class=\"block-head block-head-ac block-head-c is-left\">\n\n\t\t\t\t\t<h4 class=\"heading\">Soluzioni<\/h4>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t<div class=\"block-content\">\n\t\t\t\t\t\n\t<div class=\"loop loop-list loop-sep loop-list-sep grid grid-1 md:grid-1 sm:grid-1\">\n\n\t\t\t\t\n\t\t\t\n<article class=\"l-post list-post list-post-on-sm m-pos-left\">\n\n\t\n\t\t\t<div class=\"media\">\n\n\t\t\n\t\t\t<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8334\/con-kata-8-0-kaspersky-potenzia-le-sue-funzionalita-di-rilevamento-e-risposta-di-rete\" class=\"image-link media-ratio ratio-3-2\" title=\"Con KATA 8.0 Kaspersky potenzia le sue funzionalit\u00e0 di rilevamento e risposta di rete\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2020\/11\/kaspersky-logo-300x182.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"KATA 8.0-pegasus-Quadrant Knowledge Solutions-Ask Me Anything: le esperte di Kaspersky-Kaspersky Container Security\" sizes=\"(max-width: 300px) 100vw, 300px\" title=\"Con KATA 8.0 Kaspersky potenzia le sue funzionalit\u00e0 di rilevamento e risposta di rete\" srcset=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2020\/11\/kaspersky-logo-1024x621.png 1024w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2020\/11\/kaspersky-logo-768x466.png 768w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2020\/11\/kaspersky-logo-150x91.png 150w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2020\/11\/kaspersky-logo-450x273.png 450w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2020\/11\/kaspersky-logo-1200x728.png 1200w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2020\/11\/kaspersky-logo.png 1404w\" \/><\/a>\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t\n\t\t<\/div>\n\t\n\n\t\n\t\t<div class=\"content\">\n\n\t\t\t<div class=\"post-meta post-meta-a has-below\"><h2 class=\"is-title post-title\"><a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8334\/con-kata-8-0-kaspersky-potenzia-le-sue-funzionalita-di-rilevamento-e-risposta-di-rete\">Con KATA 8.0 Kaspersky potenzia le sue funzionalit\u00e0 di rilevamento e risposta di rete<\/a><\/h2><div class=\"post-meta-items meta-below\"><span class=\"meta-item post-author\"><span class=\"by\">By<\/span> <a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/author\/bitmat\" title=\"Articoli scritti da Redazione BitMAT\" rel=\"author\">Redazione BitMAT<\/a><\/span><span class=\"meta-item date\"><span class=\"date-link\"><time class=\"post-date\" datetime=\"2026-02-19T12:07:39+01:00\">19 Febbraio 2026<\/time><\/span><\/span><\/div><\/div>\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t<div class=\"excerpt\">\n\t\t\t\t\t<p>Kaspersky aggiorna Kaspersky Anti Targeted Attack 8.0 (KATA 8.0), progettato per aiutare le aziende a migliorare la visibilit\u00e0 sulle proprie reti e a rilevare in modo pi\u00f9 tempestivo minacce informatiche sofisticate<\/p>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\n\t\n<\/article>\n\t\t\t\t\n\t\t\t\n<article class=\"l-post list-post list-post-on-sm m-pos-left\">\n\n\t\n\t\t\t<div class=\"media\">\n\n\t\t\n\t\t\t<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8310\/armis-centrix-nuova-soluzione-studiata-per-la-sicurezza-applicativa\" class=\"image-link media-ratio ratio-3-2\" title=\"Armis Centrix, nuova soluzione studiata per la Sicurezza Applicativa\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/02\/download.png\" class=\"attachment-large size-large wp-post-image\" alt=\"Armis Centrix\" sizes=\"(max-width: 300px) 100vw, 300px\" title=\"Armis Centrix, nuova soluzione studiata per la Sicurezza Applicativa\" srcset=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/02\/download.png 275w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/02\/download-150x100.png 150w\" \/><\/a>\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t\n\t\t<\/div>\n\t\n\n\t\n\t\t<div class=\"content\">\n\n\t\t\t<div class=\"post-meta post-meta-a has-below\"><h2 class=\"is-title post-title\"><a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8310\/armis-centrix-nuova-soluzione-studiata-per-la-sicurezza-applicativa\">Armis Centrix, nuova soluzione studiata per la Sicurezza Applicativa<\/a><\/h2><div class=\"post-meta-items meta-below\"><span class=\"meta-item post-author\"><span class=\"by\">By<\/span> <a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/author\/bitmat\" title=\"Articoli scritti da Redazione BitMAT\" rel=\"author\">Redazione BitMAT<\/a><\/span><span class=\"meta-item date\"><span class=\"date-link\"><time class=\"post-date\" datetime=\"2026-02-11T11:58:37+01:00\">11 Febbraio 2026<\/time><\/span><\/span><\/div><\/div>\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t<div class=\"excerpt\">\n\t\t\t\t\t<p>Armis lancia Armis Centrix per la sicurezza applicativa, una soluzione basata su intelligenza artificiale che unifica la sicurezza del codice lungo l\u2019intero ciclo di sviluppo software<\/p>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\n\t\n<\/article>\n\t\t\t\t\n\t\t\t\n<article class=\"l-post list-post list-post-on-sm m-pos-left\">\n\n\t\n\t\t\t<div class=\"media\">\n\n\t\t\n\t\t\t<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8304\/sentinelone-offre-una-sicurezza-ai-end-to-end-dai-dati-allambiente-di-runtime\" class=\"image-link media-ratio ratio-3-2\" title=\"SentinelOne offre una sicurezza AI End-to-End, dai dati all\u2019ambiente di runtime\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/02\/2026-Gregor_Stewart_Chief-AI-Officer-di-SentinelOne-222x300.jpeg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"Gregor Stewart, Chief AI Officer di SentinelOne\" sizes=\"(max-width: 300px) 100vw, 300px\" title=\"SentinelOne offre una sicurezza AI End-to-End, dai dati all\u2019ambiente di runtime\" srcset=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/02\/2026-Gregor_Stewart_Chief-AI-Officer-di-SentinelOne-222x300.jpeg 222w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/02\/2026-Gregor_Stewart_Chief-AI-Officer-di-SentinelOne-150x203.jpeg 150w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/02\/2026-Gregor_Stewart_Chief-AI-Officer-di-SentinelOne-450x608.jpeg 450w, https:\/\/www.bitmat.it\/specialesicurezza\/files\/2026\/02\/2026-Gregor_Stewart_Chief-AI-Officer-di-SentinelOne.jpeg 496w\" \/><\/a>\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t\n\t\t<\/div>\n\t\n\n\t\n\t\t<div class=\"content\">\n\n\t\t\t<div class=\"post-meta post-meta-a has-below\"><h2 class=\"is-title post-title\"><a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8304\/sentinelone-offre-una-sicurezza-ai-end-to-end-dai-dati-allambiente-di-runtime\">SentinelOne offre una sicurezza AI End-to-End, dai dati all\u2019ambiente di runtime<\/a><\/h2><div class=\"post-meta-items meta-below\"><span class=\"meta-item post-author\"><span class=\"by\">By<\/span> <a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/author\/bitmat\" title=\"Articoli scritti da Redazione BitMAT\" rel=\"author\">Redazione BitMAT<\/a><\/span><span class=\"meta-item date\"><span class=\"date-link\"><time class=\"post-date\" datetime=\"2026-02-10T11:29:57+01:00\">10 Febbraio 2026<\/time><\/span><\/span><\/div><\/div>\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t<div class=\"excerpt\">\n\t\t\t\t\t<p>Nuove funzionalit\u00e0 di sicurezza dei dati promuovono l&#8217;approccio della piattaforma unificata per proteggere l&#8217;intero ciclo di vita dell&#8217;AI<\/p>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\n\t\n<\/article>\n\t\t\t\t\n\t\t\t\n<article class=\"l-post list-post list-post-on-sm m-pos-left\">\n\n\t\n\t\t\t<div class=\"media\">\n\n\t\t\n\t\t\t<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8295\/commvault-geo-shield-e-studiato-per-gestire-la-cyber-resilience-mantenendo-il-controllo-dei-propri-dati\" class=\"image-link media-ratio ratio-3-2\" title=\"Commvault Geo Shield \u00e8 studiato per gestire la cyber resilience mantenendo il controllo dei propri dati\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2025\/12\/download-300x156.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"Commvault Cloud Unity-Commvault Geo Shield\" sizes=\"(max-width: 300px) 100vw, 300px\" title=\"Commvault Geo Shield \u00e8 studiato per gestire la cyber resilience mantenendo il controllo dei propri dati\" \/><\/a>\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t\n\t\t<\/div>\n\t\n\n\t\n\t\t<div class=\"content\">\n\n\t\t\t<div class=\"post-meta post-meta-a has-below\"><h2 class=\"is-title post-title\"><a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/8295\/commvault-geo-shield-e-studiato-per-gestire-la-cyber-resilience-mantenendo-il-controllo-dei-propri-dati\">Commvault Geo Shield \u00e8 studiato per gestire la cyber resilience mantenendo il controllo dei propri dati<\/a><\/h2><div class=\"post-meta-items meta-below\"><span class=\"meta-item post-author\"><span class=\"by\">By<\/span> <a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/author\/bitmat\" title=\"Articoli scritti da Redazione BitMAT\" rel=\"author\">Redazione BitMAT<\/a><\/span><span class=\"meta-item date\"><span class=\"date-link\"><time class=\"post-date\" datetime=\"2026-02-03T14:22:24+01:00\">3 Febbraio 2026<\/time><\/span><\/span><\/div><\/div>\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t<div class=\"excerpt\">\n\t\t\t\t\t<p>Commvault Geo Shield estende il supporto di lunga data dell\u2019azienda ad ambienti regolamentati e orientati alla compliance<\/p>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\n\t\n<\/article>\n\t\t\n\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-b602ecc main-sidebar main-sidebar ts-sticky-col\" data-id=\"b602ecc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5f4712b5 elementor-widget elementor-widget-sidebar\" data-id=\"5f4712b5\" data-element_type=\"widget\" data-widget_type=\"sidebar.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"widget bitma-widget\"><!-- \/21680074214\/SpecialeSicurezza\/Box300x250_1 -->\r\n<div id='div-gpt-ad-1516648916145-0'>\r\n<script>\r\ngoogletag.cmd.push(function() { googletag.display('div-gpt-ad-1516648916145-0'); });\r\n<\/script>\r\n<\/div><\/div><div id=\"text-5\" class=\"widget widget_text\"><div class=\"widget-title block-head block-head-ac block-head block-head-ac block-head-c is-left has-style\"><h5 class=\"heading\">Newsletter<\/h5><\/div>\t\t\t<div class=\"textwidget\"><p>Iscriviti alla Newsletter per ricevere gli aggiornamenti dai portali di BitMAT Edizioni.<\/p>\r\n<form action=\"https:\/\/www.bitmat.it\/iscrizione-alla-newsletter\" method=\"post\">\r\n       <div>\r\n\t\t<input value=\"Iscriviti Adesso\" type=\"submit\" style=\"font-size: 1.2em;border-radius: 5px;\">\r\n\t<\/div>\r\n<\/form><\/div>\n\t\t<\/div><div class=\"widget bitma-widget\"><!-- \/21680074214\/SpecialeSicurezza\/Box300x250_2 -->\r\n<div id='div-gpt-ad-1516648936366-0'>\r\n<script>\r\ngoogletag.cmd.push(function() { googletag.display('div-gpt-ad-1516648936366-0'); });\r\n<\/script>\r\n<\/div><\/div><div id=\"text-6\" class=\"widget widget_text\"><div class=\"widget-title block-head block-head-ac block-head block-head-ac block-head-c is-left has-style\"><h5 class=\"heading\">BitMATv &#8211; I video di BitMAT<\/h5><\/div>\t\t\t<div class=\"textwidget\"><div class=\"netsposts-menu\"><\/div><div class=\"netsposts-screen\"><div class=\"netsposts-block-wrapper current\"><div class=\"netsposts-items\"><div class=\"netsposts-content blog-9 post-8779 category-featured category-webinar\" style=\"\"><a href=\"https:\/\/www.bitmat.it\/tv\/hot-topic\/webinar\/nuova-transizione-5-0-cosa-cambia\" class=\"netsposts-posttitle-link\" title=\"https:\/\/www.bitmat.it\/tv\/hot-topic\/webinar\/nuova-transizione-5-0-cosa-cambia\" >Nuova Transizione 5.0: cosa cambia?<\/a><div class=\"netsposts-source\" style=\"margin-bottom: 5px;width: 100%;\"><\/div><a href=\"https:\/\/www.bitmat.it\/tv\/hot-topic\/webinar\/nuova-transizione-5-0-cosa-cambia\"  class=\"link-img-wrapper\"><img fetchpriority=\"high\" decoding=\"async\" fetchpriority=\"high\" width=\"356\" height=\"220\" src=\"https:\/\/www.bitmat.it\/tv\/wp-content\/blogs.dir\/9\/files\/2026\/03\/GRAFICA-COPERTINA-copia-2-356x220.jpg\" class=\"post-thumbnail wp-post-image\" alt=\"\" \/><\/a><div class=\"netsposts-excerpt\" style=\"color: #000000;\"><\/div><\/div><div class=\"netsposts-content blog-9 post-8780 category-featured category-interviste tag-hp tag-hp-experience-center tag-personal-system\" style=\"\"><a href=\"https:\/\/www.bitmat.it\/tv\/interviste\/il-futuro-del-lavoro-passa-dai-personal-systems-linnovazione-hp-tra-ai-e-sicurezza\" class=\"netsposts-posttitle-link\" title=\"https:\/\/www.bitmat.it\/tv\/interviste\/il-futuro-del-lavoro-passa-dai-personal-systems-linnovazione-hp-tra-ai-e-sicurezza\" >Il futuro del lavoro passa dai Personal Systems: l\u2019innovazione HP tra AI e sicurezza<\/a><div class=\"netsposts-source\" style=\"margin-bottom: 5px;width: 100%;\"><\/div><a href=\"https:\/\/www.bitmat.it\/tv\/interviste\/il-futuro-del-lavoro-passa-dai-personal-systems-linnovazione-hp-tra-ai-e-sicurezza\"  class=\"link-img-wrapper\"><img loading=\"lazy\" decoding=\"async\" width=\"356\" height=\"220\" src=\"https:\/\/www.bitmat.it\/tv\/wp-content\/blogs.dir\/9\/files\/2026\/03\/GRAFICA-COPERTINA-copia-1-356x220.jpg\" class=\"post-thumbnail wp-post-image\" alt=\"\" \/><\/a><div class=\"netsposts-excerpt\" style=\"color: #000000;\"><\/div><\/div><div class=\"netsposts-content blog-9 post-8774 category-featured category-interviste tag-asus tag-syspack tag-workstation-ai\" style=\"\"><a href=\"https:\/\/www.bitmat.it\/tv\/interviste\/ai-in-locale-la-workstation-secondo-syspack-tra-potenza-e-flessibilita\" class=\"netsposts-posttitle-link\" title=\"https:\/\/www.bitmat.it\/tv\/interviste\/ai-in-locale-la-workstation-secondo-syspack-tra-potenza-e-flessibilita\" >AI in locale: la workstation secondo Syspack tra potenza e flessibilit\u00e0<\/a><div class=\"netsposts-source\" style=\"margin-bottom: 5px;width: 100%;\"><\/div><a href=\"https:\/\/www.bitmat.it\/tv\/interviste\/ai-in-locale-la-workstation-secondo-syspack-tra-potenza-e-flessibilita\"  class=\"link-img-wrapper\"><img loading=\"lazy\" decoding=\"async\" width=\"356\" height=\"220\" src=\"https:\/\/www.bitmat.it\/tv\/wp-content\/blogs.dir\/9\/files\/2026\/03\/GRAFICA-COPERTINA-copia-356x220.jpg\" class=\"post-thumbnail wp-post-image\" alt=\"\" \/><\/a><div class=\"netsposts-excerpt\" style=\"color: #000000;\"><\/div><\/div><div class=\"netsposts-content blog-9 post-8767 category-featured category-intervista-doppia category-interviste tag-fabio-grosso tag-gci-system-integration tag-loredana-bellotti tag-system-integrator\" style=\"\"><a href=\"https:\/\/www.bitmat.it\/tv\/interviste\/tra-promesse-e-realta-vita-vera-da-system-integrator\" class=\"netsposts-posttitle-link\" title=\"https:\/\/www.bitmat.it\/tv\/interviste\/tra-promesse-e-realta-vita-vera-da-system-integrator\" >Tra promesse e realt\u00e0: vita (vera) da System Integrator<\/a><div class=\"netsposts-source\" style=\"margin-bottom: 5px;width: 100%;\"><\/div><a href=\"https:\/\/www.bitmat.it\/tv\/interviste\/tra-promesse-e-realta-vita-vera-da-system-integrator\"  class=\"link-img-wrapper\"><img loading=\"lazy\" decoding=\"async\" loading=\"lazy\" width=\"356\" height=\"220\" src=\"https:\/\/www.bitmat.it\/tv\/wp-content\/blogs.dir\/9\/files\/2026\/03\/thumb-356x220.jpg\" class=\"post-thumbnail wp-post-image\" alt=\"\" \/><\/a><div class=\"netsposts-excerpt\" style=\"color: #000000;\"><\/div><\/div><div class=\"netsposts-content blog-9 post-8759 category-featured category-interviste tag-andrea-faeti tag-vertiv-italia\" style=\"\"><a href=\"https:\/\/www.bitmat.it\/tv\/interviste\/data-center-nellera-dellai-infrastrutture-densita-e-nuove-sfide-per-lenterprise\" class=\"netsposts-posttitle-link\" title=\"https:\/\/www.bitmat.it\/tv\/interviste\/data-center-nellera-dellai-infrastrutture-densita-e-nuove-sfide-per-lenterprise\" >Data center nell\u2019era dell\u2019AI: infrastrutture, densit\u00e0 e nuove sfide per l\u2019enterprise<\/a><div class=\"netsposts-source\" style=\"margin-bottom: 5px;width: 100%;\"><\/div><a href=\"https:\/\/www.bitmat.it\/tv\/interviste\/data-center-nellera-dellai-infrastrutture-densita-e-nuove-sfide-per-lenterprise\"  class=\"link-img-wrapper\"><img loading=\"lazy\" decoding=\"async\" loading=\"lazy\" width=\"356\" height=\"220\" src=\"https:\/\/www.bitmat.it\/tv\/wp-content\/blogs.dir\/9\/files\/2026\/02\/GRAFICA-COPERTINA-copia-356x220.jpg\" class=\"post-thumbnail wp-post-image\" alt=\"\" \/><\/a><div class=\"netsposts-excerpt\" style=\"color: #000000;\"><\/div><\/div><div class=\"end-netsposts-content\"><\/div><\/div><\/div><\/div>\n<\/div>\n\t\t<\/div><div class=\"widget bitma-widget\"><!-- \/21680074214\/SpecialeSicurezza\/Box300x250_3 -->\r\n<div id='div-gpt-ad-1516648979521-0'>\r\n<script>\r\ngoogletag.cmd.push(function() { googletag.display('div-gpt-ad-1516648979521-0'); });\r\n<\/script>\r\n<\/div><\/div><div id=\"tag_cloud-3\" class=\"widget widget_tag_cloud\"><div class=\"widget-title block-head block-head-ac block-head block-head-ac block-head-c is-left has-style\"><h5 class=\"heading\">Tag Cloud<\/h5><\/div><div class=\"tagcloud\"><a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/acronis\" class=\"tag-cloud-link tag-link-4394 tag-link-position-1\" style=\"font-size: 12.251851851852pt;\" aria-label=\"Acronis (30 elementi)\">Acronis<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/akamai\" class=\"tag-cloud-link tag-link-4062 tag-link-position-2\" style=\"font-size: 10.074074074074pt;\" aria-label=\"Akamai (18 elementi)\">Akamai<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/attacchi-informatici\" class=\"tag-cloud-link tag-link-4036 tag-link-position-3\" style=\"font-size: 11.111111111111pt;\" aria-label=\"attacchi informatici (23 elementi)\">attacchi informatici<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/axitea\" class=\"tag-cloud-link tag-link-4296 tag-link-position-4\" style=\"font-size: 11.62962962963pt;\" aria-label=\"Axitea (26 elementi)\">Axitea<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/barracuda-networks\" class=\"tag-cloud-link tag-link-4077 tag-link-position-5\" style=\"font-size: 9.8666666666667pt;\" aria-label=\"Barracuda Networks (17 elementi)\">Barracuda Networks<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/bitdefender\" class=\"tag-cloud-link tag-link-4385 tag-link-position-6\" style=\"font-size: 8.7259259259259pt;\" aria-label=\"Bitdefender (13 elementi)\">Bitdefender<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/check-point-research\" class=\"tag-cloud-link tag-link-4518 tag-link-position-7\" style=\"font-size: 9.037037037037pt;\" aria-label=\"Check Point Research (14 elementi)\">Check Point Research<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/check-point-software-technologies\" class=\"tag-cloud-link tag-link-4146 tag-link-position-8\" style=\"font-size: 12.148148148148pt;\" aria-label=\"Check Point Software Technologies (29 elementi)\">Check Point Software Technologies<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/ciso\" class=\"tag-cloud-link tag-link-4346 tag-link-position-9\" style=\"font-size: 8.7259259259259pt;\" aria-label=\"CISO (13 elementi)\">CISO<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/cloud\" class=\"tag-cloud-link tag-link-4024 tag-link-position-10\" style=\"font-size: 9.2444444444444pt;\" aria-label=\"cloud (15 elementi)\">cloud<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/commvault\" class=\"tag-cloud-link tag-link-4723 tag-link-position-11\" style=\"font-size: 10.281481481481pt;\" aria-label=\"Commvault (19 elementi)\">Commvault<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/cyberark\" class=\"tag-cloud-link tag-link-4445 tag-link-position-12\" style=\"font-size: 12.977777777778pt;\" aria-label=\"CyberArk (35 elementi)\">CyberArk<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/cybercrime\" class=\"tag-cloud-link tag-link-4125 tag-link-position-13\" style=\"font-size: 8pt;\" aria-label=\"cybercrime (11 elementi)\">cybercrime<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/cybersecurity\" class=\"tag-cloud-link tag-link-4063 tag-link-position-14\" style=\"font-size: 22pt;\" aria-label=\"Cybersecurity (270 elementi)\">Cybersecurity<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/cyber-security\" class=\"tag-cloud-link tag-link-4172 tag-link-position-15\" style=\"font-size: 9.037037037037pt;\" aria-label=\"cyber security (14 elementi)\">cyber security<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/ddos\" class=\"tag-cloud-link tag-link-4089 tag-link-position-16\" style=\"font-size: 8.3111111111111pt;\" aria-label=\"DDoS (12 elementi)\">DDoS<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/eset\" class=\"tag-cloud-link tag-link-4056 tag-link-position-17\" style=\"font-size: 13.807407407407pt;\" aria-label=\"ESET (43 elementi)\">ESET<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/f-secure\" class=\"tag-cloud-link tag-link-4104 tag-link-position-18\" style=\"font-size: 9.2444444444444pt;\" aria-label=\"F-Secure (15 elementi)\">F-Secure<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/f5-networks\" class=\"tag-cloud-link tag-link-4042 tag-link-position-19\" style=\"font-size: 8pt;\" aria-label=\"F5 Networks (11 elementi)\">F5 Networks<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/fireeye\" class=\"tag-cloud-link tag-link-4141 tag-link-position-20\" style=\"font-size: 9.5555555555556pt;\" aria-label=\"FireEye (16 elementi)\">FireEye<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/fortinet\" class=\"tag-cloud-link tag-link-4079 tag-link-position-21\" style=\"font-size: 11.62962962963pt;\" aria-label=\"Fortinet (26 elementi)\">Fortinet<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/hacker\" class=\"tag-cloud-link tag-link-4092 tag-link-position-22\" style=\"font-size: 10.074074074074pt;\" aria-label=\"Hacker (18 elementi)\">Hacker<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/identity-security\" class=\"tag-cloud-link tag-link-4776 tag-link-position-23\" style=\"font-size: 8.3111111111111pt;\" aria-label=\"Identity Security (12 elementi)\">Identity Security<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/intelligenza-artificiale-ai\" class=\"tag-cloud-link tag-link-5303 tag-link-position-24\" style=\"font-size: 11.318518518519pt;\" aria-label=\"intelligenza artificiale (AI) (24 elementi)\">intelligenza artificiale (AI)<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/iot\" class=\"tag-cloud-link tag-link-4064 tag-link-position-25\" style=\"font-size: 9.5555555555556pt;\" aria-label=\"Iot (16 elementi)\">Iot<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/kaspersky\" class=\"tag-cloud-link tag-link-4158 tag-link-position-26\" style=\"font-size: 17.748148148148pt;\" aria-label=\"Kaspersky (104 elementi)\">Kaspersky<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/malware\" class=\"tag-cloud-link tag-link-4038 tag-link-position-27\" style=\"font-size: 12.77037037037pt;\" aria-label=\"malware (34 elementi)\">malware<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/minacce-informatiche\" class=\"tag-cloud-link tag-link-4612 tag-link-position-28\" style=\"font-size: 9.5555555555556pt;\" aria-label=\"minacce informatiche (16 elementi)\">minacce informatiche<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/nozomi-networks\" class=\"tag-cloud-link tag-link-4954 tag-link-position-29\" style=\"font-size: 8.3111111111111pt;\" aria-label=\"Nozomi Networks (12 elementi)\">Nozomi Networks<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/palo-alto-networks\" class=\"tag-cloud-link tag-link-4343 tag-link-position-30\" style=\"font-size: 12.977777777778pt;\" aria-label=\"palo alto networks (35 elementi)\">palo alto networks<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/phishing\" class=\"tag-cloud-link tag-link-4309 tag-link-position-31\" style=\"font-size: 10.488888888889pt;\" aria-label=\"phishing (20 elementi)\">phishing<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/proofpoint\" class=\"tag-cloud-link tag-link-4310 tag-link-position-32\" style=\"font-size: 13.807407407407pt;\" aria-label=\"Proofpoint (43 elementi)\">Proofpoint<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/ransomware\" class=\"tag-cloud-link tag-link-4054 tag-link-position-33\" style=\"font-size: 14.948148148148pt;\" aria-label=\"ransomware (55 elementi)\">ransomware<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/security\" class=\"tag-cloud-link tag-link-4110 tag-link-position-34\" style=\"font-size: 10.281481481481pt;\" aria-label=\"Security (19 elementi)\">Security<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/sentinelone\" class=\"tag-cloud-link tag-link-4811 tag-link-position-35\" style=\"font-size: 13.496296296296pt;\" aria-label=\"SentinelOne (40 elementi)\">SentinelOne<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/sicurezza\" class=\"tag-cloud-link tag-link-4023 tag-link-position-36\" style=\"font-size: 19.925925925926pt;\" aria-label=\"sicurezza (169 elementi)\">sicurezza<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/sicurezza-informatica\" class=\"tag-cloud-link tag-link-4291 tag-link-position-37\" style=\"font-size: 9.5555555555556pt;\" aria-label=\"sicurezza informatica (16 elementi)\">sicurezza informatica<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/sicurezza-it\" class=\"tag-cloud-link tag-link-4149 tag-link-position-38\" style=\"font-size: 8.7259259259259pt;\" aria-label=\"Sicurezza It (13 elementi)\">Sicurezza It<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/soc\" class=\"tag-cloud-link tag-link-4293 tag-link-position-39\" style=\"font-size: 8pt;\" aria-label=\"SOC (11 elementi)\">SOC<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/stormshield\" class=\"tag-cloud-link tag-link-4240 tag-link-position-40\" style=\"font-size: 11.111111111111pt;\" aria-label=\"Stormshield (23 elementi)\">Stormshield<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/trend-micro\" class=\"tag-cloud-link tag-link-4049 tag-link-position-41\" style=\"font-size: 15.466666666667pt;\" aria-label=\"Trend Micro (62 elementi)\">Trend Micro<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/vectra-ai\" class=\"tag-cloud-link tag-link-4836 tag-link-position-42\" style=\"font-size: 11.940740740741pt;\" aria-label=\"Vectra AI (28 elementi)\">Vectra AI<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/watchguard-technologies\" class=\"tag-cloud-link tag-link-4035 tag-link-position-43\" style=\"font-size: 10.488888888889pt;\" aria-label=\"WatchGuard Technologies (20 elementi)\">WatchGuard Technologies<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/zero-trust\" class=\"tag-cloud-link tag-link-4475 tag-link-position-44\" style=\"font-size: 8.7259259259259pt;\" aria-label=\"Zero Trust (13 elementi)\">Zero Trust<\/a>\n<a href=\"https:\/\/www.bitmat.it\/specialesicurezza\/news\/tag\/zscaler\" class=\"tag-cloud-link tag-link-4348 tag-link-position-45\" style=\"font-size: 8.7259259259259pt;\" aria-label=\"Zscaler (13 elementi)\">Zscaler<\/a><\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>31 Marzo 2021 Ransomware: la top ten del 2020 31 Marzo 2021 Attacchi malware fileless +900% Updated:30 Marzo 2021 22 Marzo 2021 WISE: WatchGuard punta sulle competenze per formare i giovani sulla cybersecurity 15 Marzo 2021 Switch multigigabit: Zyxel pensa a chi lavora da casa Updated:14 Marzo 2021 1 Marzo 2021 FortiGuard Labs Global Threat<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/no-wrapper.php","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-5465","page","type-page","status-publish"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Home - BitMAT | Speciale Sicurezza 360x365<\/title>\n<meta name=\"description\" content=\"Lo speciale di BitMAT Edizioni sulla sicurezza informatica.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bitmat.it\/specialesicurezza\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Home\" \/>\n<meta property=\"og:description\" content=\"Lo speciale di BitMAT Edizioni sulla sicurezza informatica.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bitmat.it\/specialesicurezza\/\" \/>\n<meta property=\"og:site_name\" content=\"BitMAT | Speciale Sicurezza 360x365\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-21T11:39:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2020\/07\/ransomware.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.bitmat.it\\\/specialesicurezza\\\/\",\"url\":\"https:\\\/\\\/www.bitmat.it\\\/specialesicurezza\\\/\",\"name\":\"Home - BitMAT | Speciale Sicurezza 360x365\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.bitmat.it\\\/specialesicurezza\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.bitmat.it\\\/specialesicurezza\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.bitmat.it\\\/specialesicurezza\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.bitmat.it\\\/specialesicurezza\\\/files\\\/2020\\\/07\\\/ransomware.jpg\",\"datePublished\":\"2021-07-21T10:50:35+00:00\",\"dateModified\":\"2021-07-21T11:39:17+00:00\",\"description\":\"Lo speciale di BitMAT Edizioni sulla sicurezza informatica.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.bitmat.it\\\/specialesicurezza\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.bitmat.it\\\/specialesicurezza\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.bitmat.it\\\/specialesicurezza\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.bitmat.it\\\/specialesicurezza\\\/files\\\/2020\\\/07\\\/ransomware.jpg\",\"contentUrl\":\"https:\\\/\\\/www.bitmat.it\\\/specialesicurezza\\\/files\\\/2020\\\/07\\\/ransomware.jpg\",\"width\":400,\"height\":288,\"caption\":\"ransomware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.bitmat.it\\\/specialesicurezza\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.bitmat.it\\\/specialesicurezza\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Home\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.bitmat.it\\\/specialesicurezza\\\/#website\",\"url\":\"https:\\\/\\\/www.bitmat.it\\\/specialesicurezza\\\/\",\"name\":\"BitMAT | Speciale Sicurezza 360x365\",\"description\":\"Un intero speciale dedicato esclusivamente alla sicurezza, in tutte le sue accezioni: dalla protezione dei singoli device a quella delle infrastrutture critiche, senza trascurare gli attacchi terroristici e la violazione alla privacy.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.bitmat.it\\\/specialesicurezza\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Home - BitMAT | Speciale Sicurezza 360x365","description":"Lo speciale di BitMAT Edizioni sulla sicurezza informatica.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bitmat.it\/specialesicurezza\/","og_locale":"it_IT","og_type":"article","og_title":"Home","og_description":"Lo speciale di BitMAT Edizioni sulla sicurezza informatica.","og_url":"https:\/\/www.bitmat.it\/specialesicurezza\/","og_site_name":"BitMAT | Speciale Sicurezza 360x365","article_modified_time":"2021-07-21T11:39:17+00:00","og_image":[{"url":"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2020\/07\/ransomware.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Tempo di lettura stimato":"8 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.bitmat.it\/specialesicurezza\/","url":"https:\/\/www.bitmat.it\/specialesicurezza\/","name":"Home - BitMAT | Speciale Sicurezza 360x365","isPartOf":{"@id":"https:\/\/www.bitmat.it\/specialesicurezza\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.bitmat.it\/specialesicurezza\/#primaryimage"},"image":{"@id":"https:\/\/www.bitmat.it\/specialesicurezza\/#primaryimage"},"thumbnailUrl":"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2020\/07\/ransomware.jpg","datePublished":"2021-07-21T10:50:35+00:00","dateModified":"2021-07-21T11:39:17+00:00","description":"Lo speciale di BitMAT Edizioni sulla sicurezza informatica.","breadcrumb":{"@id":"https:\/\/www.bitmat.it\/specialesicurezza\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bitmat.it\/specialesicurezza\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.bitmat.it\/specialesicurezza\/#primaryimage","url":"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2020\/07\/ransomware.jpg","contentUrl":"https:\/\/www.bitmat.it\/specialesicurezza\/files\/2020\/07\/ransomware.jpg","width":400,"height":288,"caption":"ransomware"},{"@type":"BreadcrumbList","@id":"https:\/\/www.bitmat.it\/specialesicurezza\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.bitmat.it\/specialesicurezza\/"},{"@type":"ListItem","position":2,"name":"Home"}]},{"@type":"WebSite","@id":"https:\/\/www.bitmat.it\/specialesicurezza\/#website","url":"https:\/\/www.bitmat.it\/specialesicurezza\/","name":"BitMAT | Speciale Sicurezza 360x365","description":"Un intero speciale dedicato esclusivamente alla sicurezza, in tutte le sue accezioni: dalla protezione dei singoli device a quella delle infrastrutture critiche, senza trascurare gli attacchi terroristici e la violazione alla privacy.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bitmat.it\/specialesicurezza\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"}]}},"_links":{"self":[{"href":"https:\/\/www.bitmat.it\/specialesicurezza\/wp-json\/wp\/v2\/pages\/5465","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bitmat.it\/specialesicurezza\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bitmat.it\/specialesicurezza\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bitmat.it\/specialesicurezza\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bitmat.it\/specialesicurezza\/wp-json\/wp\/v2\/comments?post=5465"}],"version-history":[{"count":17,"href":"https:\/\/www.bitmat.it\/specialesicurezza\/wp-json\/wp\/v2\/pages\/5465\/revisions"}],"predecessor-version":[{"id":5484,"href":"https:\/\/www.bitmat.it\/specialesicurezza\/wp-json\/wp\/v2\/pages\/5465\/revisions\/5484"}],"wp:attachment":[{"href":"https:\/\/www.bitmat.it\/specialesicurezza\/wp-json\/wp\/v2\/media?parent=5465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}