{"id":1506,"date":"2017-01-06T12:09:20","date_gmt":"2017-01-06T12:09:20","guid":{"rendered":"https:\/\/wpthemes.themehunk.com\/oneline-lite\/?p=33"},"modified":"2024-01-06T18:53:39","modified_gmt":"2024-01-06T18:53:39","slug":"vulnerability-assessment-avanzata-di-redflar","status":"publish","type":"post","link":"https:\/\/www.redflare-cyber.com\/en\/vulnerability-assessment-avanzata-di-redflar\/","title":{"rendered":"Vulnerability Assessment avanzata di Redflare"},"content":{"rendered":"<h2 class=\"wp-block-heading\">Un nuovo paradigma nella sicurezza informatica<\/h2>\n\n\n\n<p>In un&#8217;epoca in cui le minacce alla sicurezza informatica si evolvono con una velocit\u00e0 allarmante, <strong>Redflare<\/strong> \u00e8 all&#8217;avanguardia nella<strong> vulnerability assessment<\/strong>, sfidando lo status quo delle valutazioni di sicurezza tradizionali. Il nostro approccio \u00e8 meticolosamente realizzato non solo per identificare le vulnerabilit\u00e0, ma anche per comprenderle a fondo, assicurando che la vostra organizzazione sia sempre un passo avanti rispetto ai potenziali aggressori.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">L&#8217;arte del test manuale e la sinergia OSINT<\/h3>\n\n\n\n<p>In Redflare non ci affidiamo alle scansioni automatiche, che spesso sfiorano la superficie dei potenziali problemi di sicurezza. Le nostre valutazioni sono condotte prevalentemente attraverso <strong>test manuali intensivi<\/strong>, sfruttando la comprensione delle sfumature e il pensiero adattivo dei nostri analisti esperti. Questo approccio umano-centrico ci permette di scoprire ed esplorare le vulnerabilit\u00e0 che gli strumenti automatici potrebbero trascurare.<\/p>\n\n\n\n<p>A questo si aggiunge l&#8217;uso strategico dell&#8217;<strong>Open Source Intelligence<\/strong> (OSINT). Scaviamo nelle profondit\u00e0 dei dati pubblicamente disponibili, estraendo e correlando le informazioni che potrebbero esporre i vostri sistemi alle minacce informatiche. Questa ricognizione proattiva imita le tattiche degli avversari del mondo reale, offrendo un quadro realistico dei potenziali vettori di attacco.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"478\" src=\"https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2024\/01\/vulnerability-assessment-1024x478.png\" alt=\"Persona che seleziona la scritta Assessment per la vulnerability assessment\" class=\"wp-image-1791\" srcset=\"https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2024\/01\/vulnerability-assessment-1024x478.png 1024w, https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2024\/01\/vulnerability-assessment-300x140.png 300w, https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2024\/01\/vulnerability-assessment-768x358.png 768w, https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2024\/01\/vulnerability-assessment.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Enumerazione: Il cuore della nostra strategia<\/h3>\n\n\n\n<p>Riteniamo che la fase di enumerazione sia fondamentale. Qui cataloghiamo meticolosamente ogni asset, identificando non solo le vulnerabilit\u00e0 note ma anche i potenziali punti deboli che potrebbero essere sfruttati in futuro. Questa mappatura esaustiva del vostro panorama digitale costituisce la base della nostra valutazione, consentendo una <strong>strategia di sicurezza mirata ed efficace<\/strong>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Tecniche di analisi avanzate<\/h3>\n\n\n\n<p>Il nostro team impiega una serie di tecniche avanzate, spesso assenti nelle<strong> vulnerability assessment<\/strong> standard.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Reporting su misura e approfondimenti pratici<\/h3>\n\n\n\n<p>Dopo la valutazione, forniamo <strong>rapporti dettagliati <\/strong>che non si limitano a elencare le vulnerabilit\u00e0, ma offrono anche approfondimenti e strategie di rimedio. I nostri report sono personalizzati per i vari <em>stakeholder<\/em>, assicurando che i team tecnici, il management e il personale non tecnico abbiano tutti la comprensione necessaria per prendere decisioni informate.<\/p>\n\n\n\n<p>La <strong>vulnerability assessment<\/strong> di Redflare \u00e8 pi\u00f9 di un servizio: \u00e8 una partnership per rafforzare le vostre difese informatiche. Fondendo l&#8217;esperienza manuale con tecniche all&#8217;avanguardia e profonde intuizioni analitiche, offriamo una valutazione senza precedenti che vi prepara non solo alle minacce di oggi, ma anche alle sfide in evoluzione di domani.<\/p>","protected":false},"excerpt":{"rendered":"<p>Un nuovo paradigma nella sicurezza informatica In un&#8217;epoca in cui le minacce alla sicurezza informatica si evolvono con una velocit\u00e0 allarmante, Redflare \u00e8 all&#8217;avanguardia nella vulnerability assessment, sfidando lo status quo delle valutazioni di sicurezza tradizionali. Il nostro approccio \u00e8 meticolosamente realizzato non solo per identificare le vulnerabilit\u00e0, ma anche per comprenderle a fondo, assicurando&hellip;&nbsp;<a href=\"https:\/\/www.redflare-cyber.com\/en\/vulnerability-assessment-avanzata-di-redflar\/\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Vulnerability Assessment avanzata di Redflare<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":1792,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[43],"tags":[44,46,45],"class_list":["post-1506","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cybersecurity","tag-redflare","tag-vulnerability-assessment"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vulnerability Assessment avanzata di Redflare &#8226; Redflare<\/title>\n<meta name=\"description\" content=\"Mentre le minacce alla cybersecurity si evolvono con una velocit\u00e0 allarmante, Redflare \u00e8 all&#039;avanguardia nella vulnerability assessment.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.redflare-cyber.com\/en\/vulnerability-assessment-avanzata-di-redflar\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerability Assessment avanzata di Redflare &#8226; Redflare\" \/>\n<meta property=\"og:description\" content=\"Mentre le minacce alla cybersecurity si evolvono con una velocit\u00e0 allarmante, Redflare \u00e8 all&#039;avanguardia nella vulnerability assessment.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.redflare-cyber.com\/en\/vulnerability-assessment-avanzata-di-redflar\/\" \/>\n<meta property=\"og:site_name\" content=\"Redflare\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-06T12:09:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-06T18:53:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2017\/01\/vulnerability-assessment-lucchetti-computer.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Alessandro Targa\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alessandro Targa\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/vulnerability-assessment-avanzata-di-redflar\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/vulnerability-assessment-avanzata-di-redflar\\\/\"},\"author\":{\"name\":\"Alessandro Targa\",\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/#\\\/schema\\\/person\\\/4e308dfb8c13b67d37a14b5cffe8d1b8\"},\"headline\":\"Vulnerability Assessment avanzata di Redflare\",\"datePublished\":\"2017-01-06T12:09:20+00:00\",\"dateModified\":\"2024-01-06T18:53:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/vulnerability-assessment-avanzata-di-redflar\\\/\"},\"wordCount\":379,\"publisher\":{\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/vulnerability-assessment-avanzata-di-redflar\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.redflare-cyber.com\\\/wp-content\\\/uploads\\\/2017\\\/01\\\/vulnerability-assessment-lucchetti-computer.png\",\"keywords\":[\"cybersecurity\",\"redflare\",\"vulnerability assessment\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/vulnerability-assessment-avanzata-di-redflar\\\/\",\"url\":\"https:\\\/\\\/www.redflare-cyber.com\\\/vulnerability-assessment-avanzata-di-redflar\\\/\",\"name\":\"Vulnerability Assessment avanzata di Redflare &#8226; Redflare\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/vulnerability-assessment-avanzata-di-redflar\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/vulnerability-assessment-avanzata-di-redflar\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.redflare-cyber.com\\\/wp-content\\\/uploads\\\/2017\\\/01\\\/vulnerability-assessment-lucchetti-computer.png\",\"datePublished\":\"2017-01-06T12:09:20+00:00\",\"dateModified\":\"2024-01-06T18:53:39+00:00\",\"description\":\"Mentre le minacce alla cybersecurity si evolvono con una velocit\u00e0 allarmante, Redflare \u00e8 all'avanguardia nella vulnerability assessment.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/vulnerability-assessment-avanzata-di-redflar\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.redflare-cyber.com\\\/vulnerability-assessment-avanzata-di-redflar\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/vulnerability-assessment-avanzata-di-redflar\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.redflare-cyber.com\\\/wp-content\\\/uploads\\\/2017\\\/01\\\/vulnerability-assessment-lucchetti-computer.png\",\"contentUrl\":\"https:\\\/\\\/www.redflare-cyber.com\\\/wp-content\\\/uploads\\\/2017\\\/01\\\/vulnerability-assessment-lucchetti-computer.png\",\"width\":1200,\"height\":800,\"caption\":\"Lucchetti aperti su laptop per indicare la vulnerability assessment\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/vulnerability-assessment-avanzata-di-redflar\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.redflare-cyber.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerability Assessment avanzata di Redflare\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/#website\",\"url\":\"https:\\\/\\\/www.redflare-cyber.com\\\/\",\"name\":\"Redflare\",\"description\":\"L&#039;invincibilit\u00e0 sta nel conoscere il tuo nemico!\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/#organization\"},\"alternateName\":\"RF\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.redflare-cyber.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/#organization\",\"name\":\"Redflare\",\"alternateName\":\"RF\",\"url\":\"https:\\\/\\\/www.redflare-cyber.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.redflare-cyber.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Redflare_brand-by-tg.png\",\"contentUrl\":\"https:\\\/\\\/www.redflare-cyber.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Redflare_brand-by-tg.png\",\"width\":1080,\"height\":354,\"caption\":\"Redflare\"},\"image\":{\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/artemis-redflare\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/#\\\/schema\\\/person\\\/4e308dfb8c13b67d37a14b5cffe8d1b8\",\"name\":\"Alessandro Targa\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/409edf075bca556083167001f3703da841b862ab2352f5479028e032a90db4fe?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/409edf075bca556083167001f3703da841b862ab2352f5479028e032a90db4fe?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/409edf075bca556083167001f3703da841b862ab2352f5479028e032a90db4fe?s=96&d=blank&r=g\",\"caption\":\"Alessandro Targa\"},\"description\":\"Esperto di cybersecurity con oltre 10 anni di esperienza in protezione digitale e analisi delle minacce informatiche.\",\"sameAs\":[\"https:\\\/\\\/www.redflare-cyber.com\",\"https:\\\/\\\/youtube.com\\\/@artemis-sec?si=euCSc-IqjvJXpZug\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerability Assessment avanzata di Redflare &#8226; Redflare","description":"Mentre le minacce alla cybersecurity si evolvono con una velocit\u00e0 allarmante, Redflare \u00e8 all'avanguardia nella vulnerability assessment.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.redflare-cyber.com\/en\/vulnerability-assessment-avanzata-di-redflar\/","og_locale":"en_GB","og_type":"article","og_title":"Vulnerability Assessment avanzata di Redflare &#8226; Redflare","og_description":"Mentre le minacce alla cybersecurity si evolvono con una velocit\u00e0 allarmante, Redflare \u00e8 all'avanguardia nella vulnerability assessment.","og_url":"https:\/\/www.redflare-cyber.com\/en\/vulnerability-assessment-avanzata-di-redflar\/","og_site_name":"Redflare","article_published_time":"2017-01-06T12:09:20+00:00","article_modified_time":"2024-01-06T18:53:39+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2017\/01\/vulnerability-assessment-lucchetti-computer.png","type":"image\/png"}],"author":"Alessandro Targa","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alessandro Targa","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.redflare-cyber.com\/vulnerability-assessment-avanzata-di-redflar\/#article","isPartOf":{"@id":"https:\/\/www.redflare-cyber.com\/vulnerability-assessment-avanzata-di-redflar\/"},"author":{"name":"Alessandro Targa","@id":"https:\/\/www.redflare-cyber.com\/#\/schema\/person\/4e308dfb8c13b67d37a14b5cffe8d1b8"},"headline":"Vulnerability Assessment avanzata di Redflare","datePublished":"2017-01-06T12:09:20+00:00","dateModified":"2024-01-06T18:53:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.redflare-cyber.com\/vulnerability-assessment-avanzata-di-redflar\/"},"wordCount":379,"publisher":{"@id":"https:\/\/www.redflare-cyber.com\/#organization"},"image":{"@id":"https:\/\/www.redflare-cyber.com\/vulnerability-assessment-avanzata-di-redflar\/#primaryimage"},"thumbnailUrl":"https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2017\/01\/vulnerability-assessment-lucchetti-computer.png","keywords":["cybersecurity","redflare","vulnerability assessment"],"articleSection":["Cybersecurity"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.redflare-cyber.com\/vulnerability-assessment-avanzata-di-redflar\/","url":"https:\/\/www.redflare-cyber.com\/vulnerability-assessment-avanzata-di-redflar\/","name":"Vulnerability Assessment avanzata di Redflare &#8226; Redflare","isPartOf":{"@id":"https:\/\/www.redflare-cyber.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.redflare-cyber.com\/vulnerability-assessment-avanzata-di-redflar\/#primaryimage"},"image":{"@id":"https:\/\/www.redflare-cyber.com\/vulnerability-assessment-avanzata-di-redflar\/#primaryimage"},"thumbnailUrl":"https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2017\/01\/vulnerability-assessment-lucchetti-computer.png","datePublished":"2017-01-06T12:09:20+00:00","dateModified":"2024-01-06T18:53:39+00:00","description":"Mentre le minacce alla cybersecurity si evolvono con una velocit\u00e0 allarmante, Redflare \u00e8 all'avanguardia nella vulnerability assessment.","breadcrumb":{"@id":"https:\/\/www.redflare-cyber.com\/vulnerability-assessment-avanzata-di-redflar\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.redflare-cyber.com\/vulnerability-assessment-avanzata-di-redflar\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.redflare-cyber.com\/vulnerability-assessment-avanzata-di-redflar\/#primaryimage","url":"https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2017\/01\/vulnerability-assessment-lucchetti-computer.png","contentUrl":"https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2017\/01\/vulnerability-assessment-lucchetti-computer.png","width":1200,"height":800,"caption":"Lucchetti aperti su laptop per indicare la vulnerability assessment"},{"@type":"BreadcrumbList","@id":"https:\/\/www.redflare-cyber.com\/vulnerability-assessment-avanzata-di-redflar\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.redflare-cyber.com\/"},{"@type":"ListItem","position":2,"name":"Vulnerability Assessment avanzata di Redflare"}]},{"@type":"WebSite","@id":"https:\/\/www.redflare-cyber.com\/#website","url":"https:\/\/www.redflare-cyber.com\/","name":"Redflare","description":"L&#039;invincibilit\u00e0 sta nel conoscere il tuo nemico!","publisher":{"@id":"https:\/\/www.redflare-cyber.com\/#organization"},"alternateName":"RF","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.redflare-cyber.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.redflare-cyber.com\/#organization","name":"Redflare","alternateName":"RF","url":"https:\/\/www.redflare-cyber.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.redflare-cyber.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2024\/02\/Redflare_brand-by-tg.png","contentUrl":"https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2024\/02\/Redflare_brand-by-tg.png","width":1080,"height":354,"caption":"Redflare"},"image":{"@id":"https:\/\/www.redflare-cyber.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/showcase\/artemis-redflare\/"]},{"@type":"Person","@id":"https:\/\/www.redflare-cyber.com\/#\/schema\/person\/4e308dfb8c13b67d37a14b5cffe8d1b8","name":"Alessandro Targa","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/409edf075bca556083167001f3703da841b862ab2352f5479028e032a90db4fe?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/409edf075bca556083167001f3703da841b862ab2352f5479028e032a90db4fe?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/409edf075bca556083167001f3703da841b862ab2352f5479028e032a90db4fe?s=96&d=blank&r=g","caption":"Alessandro Targa"},"description":"Esperto di cybersecurity con oltre 10 anni di esperienza in protezione digitale e analisi delle minacce informatiche.","sameAs":["https:\/\/www.redflare-cyber.com","https:\/\/youtube.com\/@artemis-sec?si=euCSc-IqjvJXpZug"]}]}},"_links":{"self":[{"href":"https:\/\/www.redflare-cyber.com\/en\/wp-json\/wp\/v2\/posts\/1506","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.redflare-cyber.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.redflare-cyber.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.redflare-cyber.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.redflare-cyber.com\/en\/wp-json\/wp\/v2\/comments?post=1506"}],"version-history":[{"count":1,"href":"https:\/\/www.redflare-cyber.com\/en\/wp-json\/wp\/v2\/posts\/1506\/revisions"}],"predecessor-version":[{"id":1793,"href":"https:\/\/www.redflare-cyber.com\/en\/wp-json\/wp\/v2\/posts\/1506\/revisions\/1793"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.redflare-cyber.com\/en\/wp-json\/wp\/v2\/media\/1792"}],"wp:attachment":[{"href":"https:\/\/www.redflare-cyber.com\/en\/wp-json\/wp\/v2\/media?parent=1506"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.redflare-cyber.com\/en\/wp-json\/wp\/v2\/categories?post=1506"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.redflare-cyber.com\/en\/wp-json\/wp\/v2\/tags?post=1506"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}