{"id":7801,"count":9,"description":"La Cyber Threat Intelligence \u00e8 la conoscenza, basata su prove, riguardo una minaccia emergente o un rischio per le proprie risorse. Il servizio, svolto da un Cyber Threat Hunter, parte dal presupposto che una minaccia sia presente, prima di avere le prove. La ricerca sfrutta gli indicatori di compromissione e altre possibili evidenze della presenza di una minaccia.","link":"https:\/\/www.cyberfero.com\/it\/category\/security-it\/cti\/","name":"Cyber Threat Intelligence (CTI)","slug":"cti","taxonomy":"category","parent":79,"meta":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.2 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Threat Intelligence (CTI) Archives - Cyberfero<\/title>\n<meta name=\"description\" content=\"La Cyber Threat Intelligence \u00e8 la conoscenza, basata su prove, riguardo una minaccia emergente o un rischio per le proprie risorse.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberfero.com\/it\/category\/security-it\/cti\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Threat Intelligence (CTI) Archivi\" \/>\n<meta property=\"og:description\" content=\"La Cyber Threat Intelligence \u00e8 la conoscenza, basata su prove, riguardo una minaccia emergente o un rischio per le proprie risorse.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberfero.com\/it\/category\/security-it\/cti\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberfero\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2024\/05\/Color-logo-no-background.png\" \/>\n\t<meta property=\"og:image:width\" content=\"3163\" \/>\n\t<meta property=\"og:image:height\" content=\"922\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@secureod\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"CollectionPage\",\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/category\\\/security-it\\\/cti\\\/\",\"url\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/category\\\/security-it\\\/cti\\\/\",\"name\":\"Cyber Threat Intelligence (CTI) Archives - Cyberfero\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/#website\"},\"description\":\"La Cyber Threat Intelligence \u00e8 la conoscenza, basata su prove, riguardo una minaccia emergente o un rischio per le proprie risorse.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/category\\\/security-it\\\/cti\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/category\\\/security-it\\\/cti\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/category\\\/security-it\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Threat Intelligence (CTI)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/\",\"name\":\"Cyberfero\",\"description\":\"Managed Security Service Provider\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":[\"Organization\",\"Place\",\"ProfessionalService\"],\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/#organization\",\"name\":\"Cyberfero s.r.l.\",\"url\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/\",\"logo\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/category\\\/security-it\\\/cti\\\/#local-main-organization-logo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/category\\\/security-it\\\/cti\\\/#local-main-organization-logo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Cyberfero\",\"https:\\\/\\\/x.com\\\/secureod\",\"https:\\\/\\\/www.instagram.com\\\/cyber_fero\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cyberfero\",\"http:\\\/\\\/www.pinterest.com\\\/cyberfero\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/secureod\"],\"address\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/category\\\/security-it\\\/cti\\\/#local-main-place-address\"},\"telephone\":[\"+39 0522 1685330\"],\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\"],\"opens\":\"09:00\",\"closes\":\"18:30\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Saturday\",\"Sunday\"],\"opens\":\"00:00\",\"closes\":\"00:00\"}],\"email\":\"info@cyberfero.com\",\"faxNumber\":\"+39 0522 015371\",\"areaServed\":\"Italia\",\"vatID\":\"03058120357\",\"taxID\":\"03058120357\",\"priceRange\":\"$$$\",\"currenciesAccepted\":\"\u20ac\",\"paymentAccepted\":\"paypal, bonifico bancario\"},{\"@type\":\"PostalAddress\",\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/category\\\/security-it\\\/cti\\\/#local-main-place-address\",\"streetAddress\":\"Via Statuto, 3\",\"addressLocality\":\"Reggio Emilia\",\"postalCode\":\"42121\",\"addressRegion\":\"Italia\",\"addressCountry\":\"IT\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/category\\\/security-it\\\/cti\\\/#local-main-organization-logo\",\"url\":\"https:\\\/\\\/www.cyberfero.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Color-logo-no-background.png\",\"contentUrl\":\"https:\\\/\\\/www.cyberfero.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Color-logo-no-background.png\",\"width\":3163,\"height\":922,\"caption\":\"Cyberfero s.r.l.\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"Reggio Emilia\" \/>\n<meta name=\"geo.region\" content=\"Italia\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Threat Intelligence (CTI) Archives - Cyberfero","description":"La Cyber Threat Intelligence \u00e8 la conoscenza, basata su prove, riguardo una minaccia emergente o un rischio per le proprie risorse.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberfero.com\/it\/category\/security-it\/cti\/","og_locale":"it_IT","og_type":"article","og_title":"Cyber Threat Intelligence (CTI) Archivi","og_description":"La Cyber Threat Intelligence \u00e8 la conoscenza, basata su prove, riguardo una minaccia emergente o un rischio per le proprie risorse.","og_url":"https:\/\/www.cyberfero.com\/it\/category\/security-it\/cti\/","og_site_name":"Cyberfero","og_image":[{"width":3163,"height":922,"url":"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2024\/05\/Color-logo-no-background.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@secureod","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"CollectionPage","@id":"https:\/\/www.cyberfero.com\/it\/category\/security-it\/cti\/","url":"https:\/\/www.cyberfero.com\/it\/category\/security-it\/cti\/","name":"Cyber Threat Intelligence (CTI) Archives - Cyberfero","isPartOf":{"@id":"https:\/\/www.cyberfero.com\/it\/#website"},"description":"La Cyber Threat Intelligence \u00e8 la conoscenza, basata su prove, riguardo una minaccia emergente o un rischio per le proprie risorse.","breadcrumb":{"@id":"https:\/\/www.cyberfero.com\/it\/category\/security-it\/cti\/#breadcrumb"},"inLanguage":"it-IT"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberfero.com\/it\/category\/security-it\/cti\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberfero.com\/it\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.cyberfero.com\/it\/category\/security-it\/"},{"@type":"ListItem","position":3,"name":"Cyber Threat Intelligence (CTI)"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberfero.com\/it\/#website","url":"https:\/\/www.cyberfero.com\/it\/","name":"Cyberfero","description":"Managed Security Service Provider","publisher":{"@id":"https:\/\/www.cyberfero.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberfero.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":["Organization","Place","ProfessionalService"],"@id":"https:\/\/www.cyberfero.com\/it\/#organization","name":"Cyberfero s.r.l.","url":"https:\/\/www.cyberfero.com\/it\/","logo":{"@id":"https:\/\/www.cyberfero.com\/it\/category\/security-it\/cti\/#local-main-organization-logo"},"image":{"@id":"https:\/\/www.cyberfero.com\/it\/category\/security-it\/cti\/#local-main-organization-logo"},"sameAs":["https:\/\/www.facebook.com\/Cyberfero","https:\/\/x.com\/secureod","https:\/\/www.instagram.com\/cyber_fero\/","https:\/\/www.linkedin.com\/company\/cyberfero","http:\/\/www.pinterest.com\/cyberfero","https:\/\/www.youtube.com\/user\/secureod"],"address":{"@id":"https:\/\/www.cyberfero.com\/it\/category\/security-it\/cti\/#local-main-place-address"},"telephone":["+39 0522 1685330"],"openingHoursSpecification":[{"@type":"OpeningHoursSpecification","dayOfWeek":["Monday","Tuesday","Wednesday","Thursday","Friday"],"opens":"09:00","closes":"18:30"},{"@type":"OpeningHoursSpecification","dayOfWeek":["Saturday","Sunday"],"opens":"00:00","closes":"00:00"}],"email":"info@cyberfero.com","faxNumber":"+39 0522 015371","areaServed":"Italia","vatID":"03058120357","taxID":"03058120357","priceRange":"$$$","currenciesAccepted":"\u20ac","paymentAccepted":"paypal, bonifico bancario"},{"@type":"PostalAddress","@id":"https:\/\/www.cyberfero.com\/it\/category\/security-it\/cti\/#local-main-place-address","streetAddress":"Via Statuto, 3","addressLocality":"Reggio Emilia","postalCode":"42121","addressRegion":"Italia","addressCountry":"IT"},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberfero.com\/it\/category\/security-it\/cti\/#local-main-organization-logo","url":"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2024\/05\/Color-logo-no-background.png","contentUrl":"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2024\/05\/Color-logo-no-background.png","width":3163,"height":922,"caption":"Cyberfero s.r.l."}]},"geo.placename":"Reggio Emilia","geo.region":"Italia"},"_links":{"self":[{"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/categories\/7801","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/categories"}],"about":[{"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/taxonomies\/category"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/categories\/79"}],"wp:post_type":[{"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/posts?categories=7801"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}