https://www.kinetikon.com/wp-content/uploads/2025/01/cyber-solidarity-act-evidenza.webp285340adminhttps://www.kinetikon.com/wp-content/uploads/2023/05/knk_logo_x156.pngadmin2025-01-27 15:12:572025-04-24 11:26:40Cyber Solidarity Act: il cambio di paradigma per la sicurezza informatica in UE
https://www.kinetikon.com/wp-content/uploads/2024/10/ransomware-aas-evidenza.webp285340adminhttps://www.kinetikon.com/wp-content/uploads/2023/05/knk_logo_x156.pngadmin2024-10-23 10:18:352026-01-27 09:46:31Ransomware as a Service: nascita e sviluppo di un mercato criminale
https://www.kinetikon.com/wp-content/uploads/2024/10/comunicazione-incident-news.webp8001200adminhttps://www.kinetikon.com/wp-content/uploads/2023/05/knk_logo_x156.pngadmin2024-10-14 15:46:452025-10-14 14:54:27Attacco informatico: gestire la comunicazione prima, dopo e durante un
https://www.kinetikon.com/wp-content/uploads/2024/10/firewall-ngfw-news-evidenza.webp285340adminhttps://www.kinetikon.com/wp-content/uploads/2023/05/knk_logo_x156.pngadmin2024-10-08 09:06:302025-08-07 14:21:00Firewall di nuova generazione: che cosa sono e quali sono le caratteristiche
https://www.kinetikon.com/wp-content/uploads/2024/09/adversarial-machine-learning-news-evidenza.webp285340adminhttps://www.kinetikon.com/wp-content/uploads/2023/05/knk_logo_x156.pngadmin2024-09-30 15:24:162025-08-07 14:15:11Sistemi di IA sotto attacco: riconoscere e contrastare l’Adversarial Machine Learning
https://www.kinetikon.com/wp-content/uploads/2024/07/self-sovereign-identity-evidenza.webp285340adminhttps://www.kinetikon.com/wp-content/uploads/2023/05/knk_logo_x156.pngadmin2024-07-24 13:54:242025-08-07 13:45:04Self Sovereign Identity, Identità Digitale, GDPR e EU Digital Identity Wallet
https://www.kinetikon.com/wp-content/uploads/2024/07/nis2-panoramica-evidenza.webp285340adminhttps://www.kinetikon.com/wp-content/uploads/2023/05/knk_logo_x156.pngadmin2024-07-01 13:45:022025-12-01 12:04:30NIS 2: per chi è obbligatoria e quali sono i requisiti per le aziende
https://www.kinetikon.com/wp-content/uploads/2024/06/threat-modeling-evidenza.webp285340adminhttps://www.kinetikon.com/wp-content/uploads/2023/05/knk_logo_x156.pngadmin2024-06-10 14:25:352025-04-28 14:05:42Identificare e mitigare le minacce informatiche con il Threat Modeling