https://www.kinetikon.com/wp-content/uploads/2026/01/prompt-injection-evidenza.webp285340adminhttps://www.kinetikon.com/wp-content/uploads/2023/05/knk_logo_x156.pngadmin2026-01-22 10:25:452026-01-26 10:24:33Attacchi di Prompt Injection: sicurezza per LLM e AI generativa
https://www.kinetikon.com/wp-content/uploads/2025/12/compliance-as-code-img-1.webp285340adminhttps://www.kinetikon.com/wp-content/uploads/2023/05/knk_logo_x156.pngadmin2025-12-10 15:58:332025-12-10 16:40:43Compliance as Code: l’automazione di governance e sicurezza
https://www.kinetikon.com/wp-content/uploads/2025/12/cyber-security-chiusura-evidenza.webp285340adminhttps://www.kinetikon.com/wp-content/uploads/2023/05/knk_logo_x156.pngadmin2025-12-01 14:16:272025-12-01 16:43:02Pianificare la sicurezza informatica nei periodi di chiusura aziendale
https://www.kinetikon.com/wp-content/uploads/2025/07/red-blue-purple-team-evidenza.webp285340adminhttps://www.kinetikon.com/wp-content/uploads/2023/05/knk_logo_x156.pngadmin2025-07-22 09:03:532025-07-31 14:05:24Ruoli e strategie di Red Team, Blue Team e Purple Team
https://www.kinetikon.com/wp-content/uploads/2025/05/ai-threat-det-evidenza.webp285340adminhttps://www.kinetikon.com/wp-content/uploads/2023/05/knk_logo_x156.pngadmin2025-05-20 11:35:532025-05-20 11:36:46Threat Detection e AI: Machine Learning e Deep Learning rivoluzionano la Cybersecurity
https://www.kinetikon.com/wp-content/uploads/2025/03/cybercrime-italia-evidenza.webp285340adminhttps://www.kinetikon.com/wp-content/uploads/2023/05/knk_logo_x156.pngadmin2025-03-17 16:29:282025-10-16 13:30:06Analisi del cyber crime in Italia: caratteristiche, attori e tecniche di attacco
https://www.kinetikon.com/wp-content/uploads/2025/02/post-quantum-cyrpto-evidenza.webp285340adminhttps://www.kinetikon.com/wp-content/uploads/2023/05/knk_logo_x156.pngadmin2025-02-04 08:45:592025-04-24 11:25:38Post Quantum Cryptography e gli algoritmi standard del NIST