{"id":12623,"date":"2021-02-16T15:55:35","date_gmt":"2021-02-16T14:55:35","guid":{"rendered":"https:\/\/www.cyberfero.com\/?page_id=12623"},"modified":"2024-05-08T00:58:19","modified_gmt":"2024-05-07T22:58:19","slug":"cyber-threat-intelligence-servizio","status":"publish","type":"page","link":"https:\/\/www.cyberfero.com\/it\/cyber-threat-intelligence-servizio\/","title":{"rendered":"Cyber Threat Intelligence (CTI) &#8211; maggiore efficacia per la sicurezza IT"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"12623\" class=\"elementor elementor-12623\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-229377d4 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"229377d4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-748e81cf\" data-id=\"748e81cf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c4cb144 elementor-widget elementor-widget-heading\" data-id=\"c4cb144\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Cyber threat intelligence<br \/>\nindividua i pericoli prima che causino danni<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7688607c elementor-widget elementor-widget-spacer\" data-id=\"7688607c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e6d5f6d elementor-widget elementor-widget-text-editor\" data-id=\"6e6d5f6d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Trova le minacce <em>prima<\/em> che diventino dei problemi<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-15732ddb elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"15732ddb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d02345 elementor-widget elementor-widget-image\" data-id=\"3d02345\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"438\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/zombie-phishing-04-1024x438.jpg\" class=\"attachment-large size-large wp-image-12604\" alt=\"\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/zombie-phishing-04-1024x438.jpg 1024w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/zombie-phishing-04-300x128.jpg 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/zombie-phishing-04-768x328.jpg 768w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/zombie-phishing-04.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1df3d242 elementor-widget elementor-widget-text-editor\" data-id=\"1df3d242\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>La <em>Cyber Threat Intelligence<\/em> \u00e8 la conoscenza<\/strong>, basata su prove, <strong>riguardo una minaccia<\/strong> emergente o un rischio per le proprie risorse. Il servizio, svolto da un <em><a href=\"#cyber-threat-hunter\">Cyber Threat Hunter<\/a>,<\/em> <strong>parte dal presupposto che una minaccia sia presente, <i>prima<\/i> di avere le prove<\/strong>. La ricerca sfrutta gli indicatori di compromissione e altre possibili evidenze della presenza di una minaccia.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-278b88d7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"278b88d7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-312dc6d7\" data-id=\"312dc6d7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5f3ab272 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"5f3ab272\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"#contatti\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Scrivici<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-745ea85\" data-id=\"745ea85\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3b4ef491 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"3b4ef491\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"tel:+3905221685330\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Chiamaci<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-55605e5a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"55605e5a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-675a69aa\" data-id=\"675a69aa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cd1d143 elementor-widget elementor-widget-heading\" data-id=\"cd1d143\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vantaggi della Cyber Threat Intelligence<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-68bf5223 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"68bf5223\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2d80b4cf\" data-id=\"2d80b4cf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-61cf4fb2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"61cf4fb2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-7980f57\" data-id=\"7980f57\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1332491 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"1332491\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/employees.png\" class=\"attachment-full size-full wp-image-12633\" alt=\"cyber threat intelligence staff\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/employees.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/employees-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/employees-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/employees-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/employees-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Efficienza del team<\/h3><p class=\"elementor-image-box-description\"><b>34% di tempo in meno<\/b> speso dal team di sicurezza nella stesura di report<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-154b7e9\" data-id=\"154b7e9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d212dd7 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"d212dd7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/security.png\" class=\"attachment-full size-full wp-image-12631\" alt=\"cyber threat intelligence velocit\u00e0 di identificazione\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/security.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/security-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/security-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/security-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/security-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Localizzazione veloce delle minacce<\/h3><p class=\"elementor-image-box-description\"><b>Fino a 10 volte pi\u00f9 veloci<\/b> nell'identificazione di una minaccia.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-fe7b27b\" data-id=\"fe7b27b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a909918 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"a909918\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/quick-response.png\" class=\"attachment-full size-full wp-image-12635\" alt=\"cyber threat intelligence soluzioni pi\u00f9 veloci\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/quick-response.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/quick-response-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/quick-response-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/quick-response-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/quick-response-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Mitigazione tempestiva<\/h3><p class=\"elementor-image-box-description\">Le minacce individuate vengono <b>soppresse pi\u00f9 velocemente<\/b>.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-c43b7e1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c43b7e1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-28dab64\" data-id=\"28dab64\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-710817c elementor-widget elementor-widget-counter\" data-id=\"710817c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-title\">Minacce individuate prima dell'attacco<\/div>\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\">+ <\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"500\" data-to-value=\"22\" data-from-value=\"0\" data-delimiter=\",\">0<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\">%<\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-4a376a5\" data-id=\"4a376a5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e136f2a elementor-widget elementor-widget-counter\" data-id=\"e136f2a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-title\">Downtime imprevisto<\/div>\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\">- <\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"500\" data-to-value=\"86\" data-from-value=\"0\" data-delimiter=\",\">0<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\">%<\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-324bfbe\" data-id=\"324bfbe\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-60029ff elementor-widget elementor-widget-counter\" data-id=\"60029ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-title\">Potenziali perdite <b>per ogni attacco<\/b> individuato in tempo<\/div>\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\">\u20ac<\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"500\" data-to-value=\"1\" data-from-value=\"0\" data-delimiter=\",\">0<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\">M<\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3211702d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3211702d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-62f28eb1\" data-id=\"62f28eb1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-61709061 elementor-widget-divider--view-line_icon elementor-view-default elementor-widget-divider--element-align-center elementor-widget elementor-widget-divider\" data-id=\"61709061\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon elementor-divider__element\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-question\"><\/i><\/div>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3323f65 elementor-widget elementor-widget-heading\" data-id=\"3323f65\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Il ciclo di vita della <i>Threat Intelligence<\/i><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf2bb08 elementor-widget elementor-widget-text-editor\" data-id=\"bf2bb08\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Come viene prodotta la <em>cyber threat intelligence<\/em>? <strong>I dati grezzi non sono la stessa cosa dell&#8217;<em>intelligence.<\/em><\/strong><\/p><p>La <em>CTI<\/em> \u00e8 il prodotto finito di un ciclo in sei parti che comprende <strong>raccolta, elaborazione e analisi dei dati<\/strong>. Il processo \u00e8 un ciclo perch\u00e9 <em>nuove domande e lacune vengono identificate nel corso dello sviluppo dell&#8217;intelligence<\/em>, portando alla definizione di <em>nuovi requisiti di raccolta<\/em>. <strong>Un programma di intelligence efficace \u00e8 <em>iterativo<\/em><\/strong>, diventando pi\u00f9 raffinato ed efficiente col tempo.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-86b3154 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"86b3154\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7fb30331\" data-id=\"7fb30331\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-04d4ae6 elementor-position-right elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"04d4ae6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/roadmap.png\" class=\"attachment-full size-full wp-image-12648\" alt=\"Cyber Threat Intelligence Pianificazione\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/roadmap.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/roadmap-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/roadmap-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/roadmap-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/roadmap-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">1. Pianificazione e direzione<\/h3><p class=\"elementor-image-box-description\">Il primo passo \u00e8 porre la domanda giusta per guidare la creazione delle informazioni attuabili sulle potenziali minacce.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ad7ce75 elementor-position-right elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"ad7ce75\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/hosting.png\" class=\"attachment-full size-full wp-image-12650\" alt=\"Cyber Threat Intelligence Raccolta\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/hosting.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/hosting-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/hosting-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/hosting-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/hosting-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">2. Raccolta<\/h3><p class=\"elementor-image-box-description\">Il passo successivo \u00e8 quello di raccogliere dati grezzi che soddisfino i requisiti stabiliti nella prima fase. <\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-927e93d elementor-position-right elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"927e93d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/organize.png\" class=\"attachment-full size-full wp-image-12646\" alt=\"Cyber Threat Intelligence Analisi\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/organize.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/organize-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/organize-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/organize-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/organize-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">3. Elaborazione<\/h3><p class=\"elementor-image-box-description\">Una volta che tutti i dati grezzi sono stati raccolti, \u00e8 necessario organizzarli con metadati, filtrando le informazioni ridondanti o i falsi positivi e negativi.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-13352b3\" data-id=\"13352b3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-26ce98d elementor-position-left elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"26ce98d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/report.png\" class=\"attachment-full size-full wp-image-12644\" alt=\"\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/report.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/report-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/report-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/report-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/report-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">4. Analisi<\/h3><p class=\"elementor-image-box-description\">L'obiettivo dell'analisi \u00e8 la ricerca di potenziali problemi di sicurezza e la notifica ai team pertinenti nel modo definito nella prima fase di pianificazione.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-145d01b elementor-position-left elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"145d01b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/distributed.png\" class=\"attachment-full size-full wp-image-12642\" alt=\"Cyber Threat Intelligence Distribuzione\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/distributed.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/distributed-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/distributed-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/distributed-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/distributed-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">5. Distribuzione<\/h3><p class=\"elementor-image-box-description\">Affinch\u00e9 l'<i>intelligence<\/i> sulle minacce siano utilizzabili, devono arrivare alle persone giuste.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-072d5bc elementor-position-left elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"072d5bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/feedback.png\" class=\"attachment-full size-full wp-image-12640\" alt=\"Cyber threat intelligence feedback\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/feedback.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/feedback-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/feedback-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/feedback-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/feedback-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">6. Feedback<\/h3><p class=\"elementor-image-box-description\">Dopo aver ricevuto il prodotto di <i>intelligence<\/i> finito, chi ha fatto la richiesta iniziale lo rivede e determina se le sue domande hanno trovato risposta.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-9dd6e85 elementor-widget-divider--view-line_icon elementor-view-default elementor-widget-divider--element-align-center elementor-widget elementor-widget-divider\" data-id=\"9dd6e85\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon elementor-divider__element\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-street-view\"><\/i><\/div>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2c59fc9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2c59fc9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-2eae297\" data-id=\"2eae297\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-aaf7089 extended-height elementor-widget elementor-widget-image\" data-id=\"aaf7089\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"499\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/cyber-threat-intelligence-hunter.jpg\" class=\"attachment-large size-large wp-image-12660\" alt=\"Cyber Threat Intelligence Hunter\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/cyber-threat-intelligence-hunter.jpg 800w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/cyber-threat-intelligence-hunter-300x187.jpg 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/cyber-threat-intelligence-hunter-768x479.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-900c1bc\" data-id=\"900c1bc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1b2979f elementor-widget elementor-widget-heading\" data-id=\"1b2979f\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"cyber-threat-hunter\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Cyber Threat Hunter (cercasi)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c8de3e3 elementor-widget elementor-widget-text-editor\" data-id=\"c8de3e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Colui che si occupa attivamente di svolgere le operazioni per la <em>Cyber Threat Intelligence<\/em> \u00e8 detto <em>Hunter, <\/em>un cacciatore di minacce informatiche, dunque.<\/p><p><em>Essi sono professionisti della sicurezza che rilevano, isolano e neutralizzano in <strong>modo proattivo<\/strong> e <strong>iterativo<\/strong> le minacce avanzate che eludono le soluzioni di sicurezza automatizzate.<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2866559 elementor-widget elementor-widget-heading\" data-id=\"2866559\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Sei uno Cyber Threat Hunter? Clicca qui sotto!<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c375027 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"c375027\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"https:\/\/www.cyberfero.com\/it\/job\/itasoc08-analista-soc-ict-security-analyst\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Lavora con noi<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-11d3754d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"11d3754d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-328c6f67\" data-id=\"328c6f67\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-74205800 elementor-widget-divider--view-line_icon elementor-view-default elementor-widget-divider--element-align-center elementor-widget elementor-widget-divider\" data-id=\"74205800\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon elementor-divider__element\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-clipboard-list\"><\/i><\/div>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12a5794 elementor-widget elementor-widget-heading\" data-id=\"12a5794\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber Threat Intelligence in pratica<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e1d4eb5 elementor-widget elementor-widget-text-editor\" data-id=\"e1d4eb5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Grazie a tecniche <a href=\"https:\/\/it.wikipedia.org\/wiki\/Open_Source_Intelligence\">OSINT<\/a> (Open Source Intelligence), siamo in grado di setacciare tutto il web in cerca di informazioni e dati che potrebbero essere stati trafugati. <strong>Le fonti consultabili OSINT sono incredibilmente caotiche e destrutturate, ma ricche di informazioni.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-cbae70d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cbae70d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d4166ac\" data-id=\"d4166ac\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dc8e9e9 elementor-widget elementor-widget-text-editor\" data-id=\"dc8e9e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Non \u00e8 raro che i dati aziendali vengano trafugati e utilizzati per pianificare un <em>colpo, <\/em>per esempio un <a href=\"https:\/\/www.cyberfero.com\/it\/ransomware-a-doppia-estorsione-cosa-sono-e-come-difendersi\/\">ransomware<\/a>. <strong>Questi dati sono spesso condivisi in quelle aree del web chiamate Deep Web e Dark Web.\u00a0<\/strong><\/p><p>Qui sotto aggiungiamo una lista, non esaustiva, delle informazioni che <em>potrebbero gi\u00e0 essere nelle mani sbagliate<\/em>. <strong>Grazie a un <em>Cyber Threat Hunter <\/em>siamo in grado di cercare e recuperare quelle informazioni.\u00a0<\/strong>Allo stesso tempo, sapendo cos&#8217;\u00e8 stato trafugato, \u00e8 molto pi\u00f9 semplice organizzare una difesa pi\u00f9 solida.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7f2392d\" data-id=\"7f2392d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b8091d2 elementor-widget elementor-widget-image\" data-id=\"b8091d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"500\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/cyber-threat-intelligence-deepweb.jpg\" class=\"attachment-large size-large wp-image-12686\" alt=\"CTI Deep Web\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/cyber-threat-intelligence-deepweb.jpg 800w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/cyber-threat-intelligence-deepweb-300x188.jpg 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/cyber-threat-intelligence-deepweb-768x480.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-917ac14 elementor-widget elementor-widget-heading\" data-id=\"917ac14\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Cosa si potrebbe trovare grazie all'OSINT <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-22dc8db elementor-widget elementor-widget-text-editor\" data-id=\"22dc8db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong>Credenziali rubate<\/strong><\/li><li><strong>Documenti esposti<\/strong><\/li><li><strong>Leak di codice sorgente<\/strong><\/li><li><strong>Sistemi che hanno subito Data Breach<\/strong><\/li><li><strong><a href=\"https:\/\/www.cyberfero.com\/it\/cos-e-il-phishing\/\">Siti di phishing<\/a> collegati al nome dell&#8217;azienda<\/strong><\/li><li><strong>Account falsi nei Social Networks<\/strong><\/li><li><strong>Rapporti sulle vulnerabilit\u00e0 non richiesti<\/strong><\/li><li><strong>Violazioni del marchio<\/strong><\/li><li><strong>Nomi di dominio occupati<\/strong><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fdcd826 elementor-widget elementor-widget-text-editor\" data-id=\"fdcd826\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Gli attacchi sono solo la fase finale di un processo molto complicato di continua ricerca e miglioramento delle tecniche di attacco, mistificazione e <a href=\"https:\/\/www.cyberfero.com\/it\/ingegneria-sociale-come-hacker-truffano-vittime\/\">truffa<\/a>.<\/p><p><strong>La Cyber Threat Intelligence ci protegge <em>prima<\/em> che gli attacchi vengano sferrati.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2c1f14a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2c1f14a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-452bef5\" data-id=\"452bef5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fd1d292 elementor-widget-divider--view-line_icon elementor-view-default elementor-widget-divider--element-align-center elementor-widget elementor-widget-divider\" data-id=\"fd1d292\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon elementor-divider__element\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-users\"><\/i><\/div>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-32122b1 elementor-widget elementor-widget-heading\" data-id=\"32122b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Gestione delle vulnerabilit\u00e0<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-cc181a0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cc181a0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-bb9c0a8\" data-id=\"bb9c0a8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dee2095 extended-height elementor-widget elementor-widget-image\" data-id=\"dee2095\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"600\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/cyber-threat-intelligence-priority.jpg\" class=\"attachment-large size-large wp-image-12655\" alt=\"\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/cyber-threat-intelligence-priority.jpg 900w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/cyber-threat-intelligence-priority-300x200.jpg 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/cyber-threat-intelligence-priority-768x512.jpg 768w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3ec502b\" data-id=\"3ec502b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ebddb41 elementor-widget elementor-widget-text-editor\" data-id=\"ebddb41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Gestire efficacemente le vulnerabilit\u00e0 significa applicare un approccio che dia <strong>priorit\u00e0 alle vulnerabilit\u00e0 in base al rischio effettivo<\/strong>. La <em>Cyber Threat Intelligence<\/em> aiuta a identificare le vulnerabilit\u00e0 che rappresentano un reale rischio per la vostra azienda, combinando dati di scansione e dati esterni con il contesto aggiuntivo sulle TTP degli attori delle minacce.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5803d31 elementor-widget elementor-widget-text-editor\" data-id=\"5803d31\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In aggiunta ad altri\u00a0 servizi come il <a href=\"https:\/\/www.cyberfero.com\/it\/vulnerability-assessment-e-penetration-test\/\">Vulnerability Assessment e\u00a0 Penetration Test<\/a> (che si concentrano nel testare il sistema in uso), la <strong>Cyber Threat Intelligence fornisce l&#8217;azione preventiva ottimale per ridurre moltissimo il pericolo.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-48732a56 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"48732a56\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-61b0b7b\" data-id=\"61b0b7b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-12e41336 elementor-widget-divider--view-line_icon elementor-view-default elementor-widget-divider--element-align-center elementor-widget elementor-widget-divider\" data-id=\"12e41336\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon elementor-divider__element\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-user-shield\"><\/i><\/div>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-425faaa6 elementor-widget elementor-widget-text-editor\" data-id=\"425faaa6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\">Supporta la <a href=\"https:\/\/www.cyberfero.com\/it\/soc-as-a-service\/\">sicurezza dell&#8217;azienda<\/a><br \/>con un servizio proattivo sorprendentemente utile<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e62389a elementor-widget elementor-widget-menu-anchor\" data-id=\"2e62389a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"contatti\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-665f81ee elementor-widget elementor-widget-heading\" data-id=\"665f81ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Contattaci per maggiori informazioni<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4537d6dd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4537d6dd\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-66275d47\" data-id=\"66275d47\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-322f3802\" data-id=\"322f3802\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-201c2c2d elementor-widget elementor-widget-text-editor\" data-id=\"201c2c2d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Siamo a disposizione per rispondere alle tue domande e valutare insieme la tua situazione per offrirti i servizi migliori.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18b0bdc7 elementor-button-align-center elementor-widget elementor-widget-form\" data-id=\"18b0bdc7\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Successivo&quot;,&quot;step_previous_label&quot;:&quot;Precedente&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" name=\"Modulo Ethical Phishing\" aria-label=\"Modulo Ethical Phishing\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"12623\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"18b0bdc7\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"Cyber Threat Intelligence (CTI) - maggiore efficacia per la sicurezza IT\" \/>\n\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"queried_id\" value=\"12623\"\/>\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-above\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-100 elementor-field-required elementor-mark-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-name\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tNome\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-100 elementor-field-required elementor-mark-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tEmail\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-tel elementor-field-group elementor-column elementor-field-group-field_59dadd9 elementor-col-100 elementor-field-required elementor-mark-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_59dadd9\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tTelefono\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<input size=\"1\" type=\"tel\" name=\"form_fields[field_59dadd9]\" id=\"form-field-field_59dadd9\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" required=\"required\" pattern=\"[0-9()#&amp;+*-=.]+\" title=\"Sono accettati solo numeri e caratteri telefonici (#, -, *, ecc.).\">\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-textarea elementor-field-group elementor-column elementor-field-group-message elementor-col-100 elementor-field-required elementor-mark-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-message\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tMessaggio\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t<textarea class=\"elementor-field-textual elementor-field  elementor-size-sm\" name=\"form_fields[message]\" id=\"form-field-message\" rows=\"4\" required=\"required\"><\/textarea>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-acceptance elementor-field-group elementor-column elementor-field-group-field_5dab288 elementor-col-100 elementor-field-required elementor-mark-required\">\n\t\t\t\t\t\t\t<div class=\"elementor-field-subgroup\">\n\t\t\t<span class=\"elementor-field-option\">\n\t\t\t\t<input type=\"checkbox\" name=\"form_fields[field_5dab288]\" id=\"form-field-field_5dab288\" class=\"elementor-field elementor-size-sm  elementor-acceptance-field\" required=\"required\">\n\t\t\t\t<label for=\"form-field-field_5dab288\">Con il presente modulo accetto i termini della <a href=\"https:\/\/www.cyberfero.com\/privacy-policy\/\" target=\"_blank\">privacy policy<\/a><\/label>\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-recaptcha_v3 elementor-field-group elementor-column elementor-field-group-field_47852dc elementor-col-100 recaptcha_v3-bottomleft\">\n\t\t\t\t\t<div class=\"elementor-field\" id=\"form-field-field_47852dc\"><div class=\"elementor-g-recaptcha\" data-sitekey=\"6Lc76NApAAAAAPlpHmqDBJPueP6IEqBWw3m9wdyl\" data-type=\"v3\" data-action=\"Form\" data-badge=\"bottomleft\" data-size=\"invisible\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-md elementor-animation-grow\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contattaci<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-75d7272\" data-id=\"75d7272\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cyber threat intelligence individua i pericoli prima che causino danni Trova le minacce prima che diventino dei problemi La Cyber Threat Intelligence \u00e8 la conoscenza, basata su prove, riguardo una minaccia emergente o un rischio per le proprie risorse. Il servizio, svolto da un Cyber Threat Hunter, parte dal presupposto che una minaccia sia presente, prima di avere le prove&#8230;.<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"class_list":["post-12623","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.2 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Threat Intelligence (CTI) - maggiore efficacia per la sicurezza IT<\/title>\n<meta name=\"description\" content=\"Tramite il servizio di Cyber Threat Intelligence, SOD offre un modo per individuare una minaccia prima che diventi un problema.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberfero.com\/it\/cyber-threat-intelligence-servizio\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Threat Intelligence (CTI) - maggiore efficacia per la sicurezza IT\" \/>\n<meta property=\"og:description\" content=\"Tramite il servizio di Cyber Threat Intelligence, SOD offre un modo per individuare una minaccia prima che diventi un problema.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberfero.com\/it\/cyber-threat-intelligence-servizio\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberfero\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyberfero\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-07T22:58:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/zombie-phishing-04-1024x438.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@secureod\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/cyber-threat-intelligence-servizio\\\/\",\"url\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/cyber-threat-intelligence-servizio\\\/\",\"name\":\"Cyber Threat Intelligence (CTI) - maggiore efficacia per la sicurezza IT\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/cyber-threat-intelligence-servizio\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/cyber-threat-intelligence-servizio\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberfero.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/zombie-phishing-04-1024x438.jpg\",\"datePublished\":\"2021-02-16T14:55:35+00:00\",\"dateModified\":\"2024-05-07T22:58:19+00:00\",\"description\":\"Tramite il servizio di Cyber Threat Intelligence, SOD offre un modo per individuare una minaccia prima che diventi un problema.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/cyber-threat-intelligence-servizio\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/cyber-threat-intelligence-servizio\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/cyber-threat-intelligence-servizio\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberfero.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/zombie-phishing-04-1024x438.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cyberfero.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/zombie-phishing-04-1024x438.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/cyber-threat-intelligence-servizio\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Threat Intelligence (CTI) &#8211; maggiore efficacia per la sicurezza IT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/\",\"name\":\"Cyberfero\",\"description\":\"Managed Security Service Provider\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":[\"Organization\",\"Place\",\"ProfessionalService\"],\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/#organization\",\"name\":\"Cyberfero s.r.l.\",\"url\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/\",\"logo\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/cyber-threat-intelligence-servizio\\\/#local-main-organization-logo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/cyber-threat-intelligence-servizio\\\/#local-main-organization-logo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Cyberfero\",\"https:\\\/\\\/x.com\\\/secureod\",\"https:\\\/\\\/www.instagram.com\\\/cyber_fero\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cyberfero\",\"http:\\\/\\\/www.pinterest.com\\\/cyberfero\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/secureod\"],\"address\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/cyber-threat-intelligence-servizio\\\/#local-main-place-address\"},\"telephone\":[\"+39 0522 1685330\"],\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\"],\"opens\":\"09:00\",\"closes\":\"18:30\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Saturday\",\"Sunday\"],\"opens\":\"00:00\",\"closes\":\"00:00\"}],\"email\":\"info@cyberfero.com\",\"faxNumber\":\"+39 0522 015371\",\"areaServed\":\"Italia\",\"vatID\":\"03058120357\",\"taxID\":\"03058120357\",\"priceRange\":\"$$$\",\"currenciesAccepted\":\"\u20ac\",\"paymentAccepted\":\"paypal, bonifico bancario\"},{\"@type\":\"PostalAddress\",\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/cyber-threat-intelligence-servizio\\\/#local-main-place-address\",\"streetAddress\":\"Via Statuto, 3\",\"addressLocality\":\"Reggio Emilia\",\"postalCode\":\"42121\",\"addressRegion\":\"Italia\",\"addressCountry\":\"IT\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/cyber-threat-intelligence-servizio\\\/#local-main-organization-logo\",\"url\":\"https:\\\/\\\/www.cyberfero.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Color-logo-no-background.png\",\"contentUrl\":\"https:\\\/\\\/www.cyberfero.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Color-logo-no-background.png\",\"width\":3163,\"height\":922,\"caption\":\"Cyberfero s.r.l.\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"Reggio Emilia\" \/>\n<meta name=\"geo.region\" content=\"Italia\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Threat Intelligence (CTI) - maggiore efficacia per la sicurezza IT","description":"Tramite il servizio di Cyber Threat Intelligence, SOD offre un modo per individuare una minaccia prima che diventi un problema.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberfero.com\/it\/cyber-threat-intelligence-servizio\/","og_locale":"it_IT","og_type":"article","og_title":"Cyber Threat Intelligence (CTI) - maggiore efficacia per la sicurezza IT","og_description":"Tramite il servizio di Cyber Threat Intelligence, SOD offre un modo per individuare una minaccia prima che diventi un problema.","og_url":"https:\/\/www.cyberfero.com\/it\/cyber-threat-intelligence-servizio\/","og_site_name":"Cyberfero","article_publisher":"https:\/\/www.facebook.com\/Cyberfero","article_modified_time":"2024-05-07T22:58:19+00:00","og_image":[{"url":"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/zombie-phishing-04-1024x438.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@secureod","twitter_misc":{"Tempo di lettura stimato":"7 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberfero.com\/it\/cyber-threat-intelligence-servizio\/","url":"https:\/\/www.cyberfero.com\/it\/cyber-threat-intelligence-servizio\/","name":"Cyber Threat Intelligence (CTI) - maggiore efficacia per la sicurezza IT","isPartOf":{"@id":"https:\/\/www.cyberfero.com\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberfero.com\/it\/cyber-threat-intelligence-servizio\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberfero.com\/it\/cyber-threat-intelligence-servizio\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/zombie-phishing-04-1024x438.jpg","datePublished":"2021-02-16T14:55:35+00:00","dateModified":"2024-05-07T22:58:19+00:00","description":"Tramite il servizio di Cyber Threat Intelligence, SOD offre un modo per individuare una minaccia prima che diventi un problema.","breadcrumb":{"@id":"https:\/\/www.cyberfero.com\/it\/cyber-threat-intelligence-servizio\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberfero.com\/it\/cyber-threat-intelligence-servizio\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberfero.com\/it\/cyber-threat-intelligence-servizio\/#primaryimage","url":"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/zombie-phishing-04-1024x438.jpg","contentUrl":"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/zombie-phishing-04-1024x438.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberfero.com\/it\/cyber-threat-intelligence-servizio\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberfero.com\/it\/"},{"@type":"ListItem","position":2,"name":"Cyber Threat Intelligence (CTI) &#8211; maggiore efficacia per la sicurezza IT"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberfero.com\/it\/#website","url":"https:\/\/www.cyberfero.com\/it\/","name":"Cyberfero","description":"Managed Security Service Provider","publisher":{"@id":"https:\/\/www.cyberfero.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberfero.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":["Organization","Place","ProfessionalService"],"@id":"https:\/\/www.cyberfero.com\/it\/#organization","name":"Cyberfero s.r.l.","url":"https:\/\/www.cyberfero.com\/it\/","logo":{"@id":"https:\/\/www.cyberfero.com\/it\/cyber-threat-intelligence-servizio\/#local-main-organization-logo"},"image":{"@id":"https:\/\/www.cyberfero.com\/it\/cyber-threat-intelligence-servizio\/#local-main-organization-logo"},"sameAs":["https:\/\/www.facebook.com\/Cyberfero","https:\/\/x.com\/secureod","https:\/\/www.instagram.com\/cyber_fero\/","https:\/\/www.linkedin.com\/company\/cyberfero","http:\/\/www.pinterest.com\/cyberfero","https:\/\/www.youtube.com\/user\/secureod"],"address":{"@id":"https:\/\/www.cyberfero.com\/it\/cyber-threat-intelligence-servizio\/#local-main-place-address"},"telephone":["+39 0522 1685330"],"openingHoursSpecification":[{"@type":"OpeningHoursSpecification","dayOfWeek":["Monday","Tuesday","Wednesday","Thursday","Friday"],"opens":"09:00","closes":"18:30"},{"@type":"OpeningHoursSpecification","dayOfWeek":["Saturday","Sunday"],"opens":"00:00","closes":"00:00"}],"email":"info@cyberfero.com","faxNumber":"+39 0522 015371","areaServed":"Italia","vatID":"03058120357","taxID":"03058120357","priceRange":"$$$","currenciesAccepted":"\u20ac","paymentAccepted":"paypal, bonifico bancario"},{"@type":"PostalAddress","@id":"https:\/\/www.cyberfero.com\/it\/cyber-threat-intelligence-servizio\/#local-main-place-address","streetAddress":"Via Statuto, 3","addressLocality":"Reggio Emilia","postalCode":"42121","addressRegion":"Italia","addressCountry":"IT"},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberfero.com\/it\/cyber-threat-intelligence-servizio\/#local-main-organization-logo","url":"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2024\/05\/Color-logo-no-background.png","contentUrl":"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2024\/05\/Color-logo-no-background.png","width":3163,"height":922,"caption":"Cyberfero s.r.l."}]},"geo.placename":"Reggio Emilia","geo.region":"Italia"},"_links":{"self":[{"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/pages\/12623","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/comments?post=12623"}],"version-history":[{"count":4,"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/pages\/12623\/revisions"}],"predecessor-version":[{"id":19349,"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/pages\/12623\/revisions\/19349"}],"wp:attachment":[{"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/media?parent=12623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}