{"id":12994,"date":"2024-10-14T08:25:13","date_gmt":"2024-10-14T08:25:13","guid":{"rendered":"https:\/\/www.cyber40.it\/2-cents-on-security\/"},"modified":"2025-05-15T18:53:48","modified_gmt":"2025-05-15T18:53:48","slug":"2-cents-on-security","status":"publish","type":"page","link":"https:\/\/www.cyber40.it\/en\/2-cents-on-security\/","title":{"rendered":"2 CENTS ON SECURITY"},"content":{"rendered":"<style>.wp-block-kadence-spacer.kt-block-spacer-10163_728d6b-8d .kt-block-spacer{height:60px;}.wp-block-kadence-spacer.kt-block-spacer-10163_728d6b-8d .kt-divider{border-top-width:1px;height:1px;border-top-color:var(--global-palette9, #ffffff);width:80%;border-top-style:solid;}<\/style>\n<div class=\"wp-block-kadence-spacer aligncenter kt-block-spacer-10163_728d6b-8d\"><div class=\"kt-block-spacer kt-block-spacer-halign-center\"><hr class=\"kt-divider\"\/><\/div><\/div>\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-larger-font-size\"><strong>2Cents on Security<\/strong><\/p>\n\n\n\n<p>2 Cents on Security is a compendium of short tips to help everyone stay safe in the digital world, designed to offer quick, simple and accessible answers to anyone. The pills, written in clear, straightforward language, address problems that can arise in the use of digital technologies.   <\/p>\n\n\n\n<p>Their structure makes it easier to understand topics related to Cyber Security, a subject that is often approached in an overly technical manner, but which we all increasingly encounter on a daily basis.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><style>.kt-post-loop10163_f12723-5b .kadence-post-image{padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.kt-post-loop10163_f12723-5b .kt-post-grid-wrap{gap:30px 30px;}.kt-post-loop10163_f12723-5b .kt-blocks-post-grid-item{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;border-top-color:currentColor;border-top-style:solid;border-right-color:currentColor;border-right-style:solid;border-bottom-color:currentColor;border-bottom-style:solid;border-left-color:currentColor;border-left-style:solid;overflow:hidden;box-shadow:0px 0px 14px 0px rgba(0, 0, 0, 0.2);}.kt-post-loop10163_f12723-5b .kt-blocks-post-grid-item .kt-blocks-post-grid-item-inner{padding-top:0px;padding-right:30px;padding-bottom:0px;padding-left:30px;}.kt-post-loop10163_f12723-5b .kt-blocks-post-grid-item header{padding-top:0px;padding-right:15px;padding-bottom:10px;padding-left:15px;margin-top:-30px;margin-right:0px;margin-bottom:0px;margin-left:0px;background-color:#ffffff;}.kt-post-loop10163_f12723-5b .kt-blocks-post-grid-item .entry-title{padding-top:10px;padding-right:0px;padding-bottom:5px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;font-size:28px;line-height:40px;}.kt-post-loop10163_f12723-5b .entry-content{padding-top:0px;padding-right:15px;padding-bottom:0px;padding-left:15px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;}.kt-post-loop10163_f12723-5b .kt-blocks-post-footer{border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;padding-top:0px;padding-right:15px;padding-bottom:5px;padding-left:15px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;}.kt-post-loop10163_f12723-5b .entry-content:after{height:0px;}.kt-post-loop10163_f12723-5b .entry-content .kt-blocks-post-readmore{background-color:var(--global-palette2, #2B6CB0);border-color:var(--global-palette2, #2B6CB0);color:var(--global-palette9, #ffffff);border-width:1px;padding-top:5px;padding-right:16px;padding-bottom:5px;padding-left:16px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;}.kt-post-loop10163_f12723-5b .entry-content .kt-blocks-post-readmore:hover{color:#ffffff;border-color:#333333;background-color:#333333;}.kt-post-loop10163_f12723-5b .kb-filter-item{border-top-width:0px;border-right-width:0px;border-bottom-width:2px;border-left-width:0px;padding-top:5px;padding-right:8px;padding-bottom:5px;padding-left:8px;margin-top:0px;margin-right:10px;margin-bottom:0px;margin-left:0px;}@media all and (max-width: 1024px){.kt-post-loop10163_f12723-5b .kt-blocks-post-grid-item{border-top-color:currentColor;border-top-style:solid;border-right-color:currentColor;border-right-style:solid;border-bottom-color:currentColor;border-bottom-style:solid;border-left-color:currentColor;border-left-style:solid;}}@media all and (max-width: 767px){.kt-post-loop10163_f12723-5b .kt-blocks-post-grid-item{border-top-color:currentColor;border-top-style:solid;border-right-color:currentColor;border-right-style:solid;border-bottom-color:currentColor;border-bottom-style:solid;border-left-color:currentColor;border-left-style:solid;}}<\/style><div class=\"wp-block-kadence-postgrid kt-blocks-post-loop-block alignnone kt-post-loop10163_f12723-5b kt-post-grid-layout-carousel kadence-splide-wrap \"><div class=\"kt-post-grid-layout-carousel-wrap splide kt-carousel-arrowstyle-whiteondark kt-carousel-dotstyle-dark kb-slider-group-arrow kb-slider-arrow-position-center\" data-columns-xxl=\"1\" data-columns-xl=\"1\" data-columns-md=\"1\" data-columns-sm=\"1\" data-columns-xs=\"1\" data-columns-ss=\"1\" data-slider-anim-speed=\"400\" data-slider-scroll=\"all\" data-slider-dots=\"true\" data-slider-arrows=\"true\" data-slider-hover-pause=\"false\" data-slider-auto=\"true\"  data-slider-auto-scroll=\"false\" data-slider-speed=\"7000\" data-slider-gap=\"30\" data-slider-gap-tablet=\"30\" data-slider-gap-mobile=\"30\" data-slider-gap-unit=\"px\" data-item-selector=\".kt-post-masonry-item\" aria-label=\"Post Carousel\"><div class=\"kadence-splide-slider-init splide__track\"><div class=\"kadence-splide-slider-wrap kt-post-grid-wrap\" data-columns-xxl=\"1\" data-columns-xl=\"1\" data-columns-md=\"1\" data-columns-sm=\"1\" data-columns-xs=\"1\" data-columns-ss=\"1\"><div class=\"kt-post-slider-item post-14650 post type-post status-publish format-standard has-post-thumbnail hentry category-2cents-on-security-en\"><article class=\"kt-blocks-post-grid-item\"><div class=\"kt-blocks-post-grid-item-inner-wrap kt-feat-image-align-top kt-feat-image-mobile-align-top\"><div class=\"kadence-post-image\"><div class=\"kadence-post-image-intrisic kt-image-ratio-66-67\" style=\"padding-bottom:66.67%;\"><div class=\"kadence-post-image-inner-intrisic\"><a href=\"https:\/\/www.cyber40.it\/en\/11-enisa-threat-landscape-2025\/\" aria-label=\"Read More #11 ENISA THREAT LANDSCAPE 2025\" class=\"kadence-post-image-inner-wrap\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"600\" src=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/10\/pill11-2-carousel-1_w-1024x600.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/10\/pill11-2-carousel-1_w-1024x600.jpg 1024w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/10\/pill11-2-carousel-1_w-300x176.jpg 300w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/10\/pill11-2-carousel-1_w-768x450.jpg 768w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/10\/pill11-2-carousel-1_w-200x117.jpg 200w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/10\/pill11-2-carousel-1_w.jpg 1281w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/div><\/div><\/div><div class=\"kt-blocks-post-grid-item-inner\"><header><h2 class=\"entry-title\"><a href=\"https:\/\/www.cyber40.it\/en\/11-enisa-threat-landscape-2025\/\">#11 ENISA THREAT LANDSCAPE 2025<\/a><\/h2><div class=\"kt-blocks-post-top-meta\"><\/div><\/header><div class=\"entry-content\">The cyber threat landscape is constantly evolving. The Enisa Threat Landscape 2025 provides an up-to-date snapshot of emerging risks and trends affecting cybersecurity in Europe<div class=\"kt-blocks-post-readmore-wrap\"><a class=\"kt-blocks-post-readmore\" href=\"https:\/\/www.cyber40.it\/en\/11-enisa-threat-landscape-2025\/\">Learn more<span class=\"screen-reader-text\"> #11 ENISA THREAT LANDSCAPE 2025<\/span><\/a><\/div><\/div><footer class=\"kt-blocks-post-footer\"><div class=\"kt-blocks-post-footer-left\"><\/div><div class=\"kt-blocks-post-footer-right\"><\/div><\/footer><\/div><\/div><\/article><\/div><div class=\"kt-post-slider-item post-14637 post type-post status-publish format-standard has-post-thumbnail hentry category-2cents-on-security-en\"><article class=\"kt-blocks-post-grid-item hide-on-js\"><div class=\"kt-blocks-post-grid-item-inner-wrap kt-feat-image-align-top kt-feat-image-mobile-align-top\"><div class=\"kadence-post-image\"><div class=\"kadence-post-image-intrisic kt-image-ratio-66-67\" style=\"padding-bottom:66.67%;\"><div class=\"kadence-post-image-inner-intrisic\"><a href=\"https:\/\/www.cyber40.it\/en\/10-ai-code-of-practice\/\" aria-label=\"Read More #10 AI code of practice\" class=\"kadence-post-image-inner-wrap\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"351\" src=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/10\/10_pillole.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/10\/10_pillole.jpg 600w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/10\/10_pillole-300x176.jpg 300w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/10\/10_pillole-200x117.jpg 200w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/div><\/div><\/div><div class=\"kt-blocks-post-grid-item-inner\"><header><h2 class=\"entry-title\"><a href=\"https:\/\/www.cyber40.it\/en\/10-ai-code-of-practice\/\">#10 AI code of practice<\/a><\/h2><div class=\"kt-blocks-post-top-meta\"><\/div><\/header><div class=\"entry-content\">The Code of Practice on General Purpose AI (GPAI), a tool developed by independent experts to help industry implement the European AI Regulation (AI Act), has been published. The Code is a step forward in ensuring security, transparency and copyright&#8230;<div class=\"kt-blocks-post-readmore-wrap\"><a class=\"kt-blocks-post-readmore\" href=\"https:\/\/www.cyber40.it\/en\/10-ai-code-of-practice\/\">Learn more<span class=\"screen-reader-text\"> #10 AI code of practice<\/span><\/a><\/div><\/div><footer class=\"kt-blocks-post-footer\"><div class=\"kt-blocks-post-footer-left\"><\/div><div class=\"kt-blocks-post-footer-right\"><\/div><\/footer><\/div><\/div><\/article><\/div><div class=\"kt-post-slider-item post-13008 post type-post status-publish format-standard has-post-thumbnail hentry category-2cents-on-security-en\"><article class=\"kt-blocks-post-grid-item hide-on-js\"><div class=\"kt-blocks-post-grid-item-inner-wrap kt-feat-image-align-top kt-feat-image-mobile-align-top\"><div class=\"kadence-post-image\"><div class=\"kadence-post-image-intrisic kt-image-ratio-66-67\" style=\"padding-bottom:66.67%;\"><div class=\"kadence-post-image-inner-intrisic\"><a href=\"https:\/\/www.cyber40.it\/en\/9-digital-operational-resilience-act-dora\/\" aria-label=\"Read More #9 Digital Operational Resilience Act (DORA).\" class=\"kadence-post-image-inner-wrap\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"351\" src=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/03\/2cents-pillole-marzo-_9-carousel-1def.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/03\/2cents-pillole-marzo-_9-carousel-1def.jpg 600w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/03\/2cents-pillole-marzo-_9-carousel-1def-300x176.jpg 300w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/03\/2cents-pillole-marzo-_9-carousel-1def-200x117.jpg 200w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/div><\/div><\/div><div class=\"kt-blocks-post-grid-item-inner\"><header><h2 class=\"entry-title\"><a href=\"https:\/\/www.cyber40.it\/en\/9-digital-operational-resilience-act-dora\/\">#9 Digital Operational Resilience Act (DORA).<\/a><\/h2><div class=\"kt-blocks-post-top-meta\"><\/div><\/header><div class=\"entry-content\">The Digital Operational Resilience Act (DORA) was created as a response to the increasingly complex technological environment in which financial entities operate, which is characterized by fragmented regulation spread across multiple regulations. The purpose of DORA is to simplify and&#8230;<div class=\"kt-blocks-post-readmore-wrap\"><a class=\"kt-blocks-post-readmore\" href=\"https:\/\/www.cyber40.it\/en\/9-digital-operational-resilience-act-dora\/\">Learn more<span class=\"screen-reader-text\"> #9 Digital Operational Resilience Act (DORA).<\/span><\/a><\/div><\/div><footer class=\"kt-blocks-post-footer\"><div class=\"kt-blocks-post-footer-left\"><\/div><div class=\"kt-blocks-post-footer-right\"><\/div><\/footer><\/div><\/div><\/article><\/div><\/div><\/div><\/div><\/div><!-- .wp-block-kadence-postgrid --><\/div>\n<\/div>\n<style>.kb-row-layout-id10163_0adc9b-ca > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id10163_0adc9b-ca > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id10163_0adc9b-ca > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);max-width:var( --global-content-width, 1290px );padding-left:var(--global-content-edge-padding);padding-right:var(--global-content-edge-padding);padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id10163_0adc9b-ca > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id10163_0adc9b-ca > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id10163_0adc9b-ca > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id10163_0adc9b-ca alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top kb-theme-content-width\">\n<style>.kadence-column10163_2f7fda-fd > .kt-inside-inner-col,.kadence-column10163_2f7fda-fd > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column10163_2f7fda-fd > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column10163_2f7fda-fd > .kt-inside-inner-col{flex-direction:column;}.kadence-column10163_2f7fda-fd > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column10163_2f7fda-fd > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column10163_2f7fda-fd{position:relative;}@media all and (max-width: 1024px){.kadence-column10163_2f7fda-fd > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column10163_2f7fda-fd > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column10163_2f7fda-fd\"><div class=\"kt-inside-inner-col\"><\/div><\/div>\n\n<\/div><\/div><style>.kb-row-layout-id10163_fa0cd0-42 > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id10163_fa0cd0-42 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id10163_fa0cd0-42 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);max-width:var( --global-content-width, 1290px );padding-left:var(--global-content-edge-padding);padding-right:var(--global-content-edge-padding);padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id10163_fa0cd0-42 > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id10163_fa0cd0-42 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id10163_fa0cd0-42 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id10163_fa0cd0-42 alignfull has-theme-palette7-background-color kt-row-has-bg wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top kb-theme-content-width\">\n<style>.kadence-column10163_e34269-7a > .kt-inside-inner-col,.kadence-column10163_e34269-7a > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column10163_e34269-7a > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column10163_e34269-7a > .kt-inside-inner-col{flex-direction:column;}.kadence-column10163_e34269-7a > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column10163_e34269-7a > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column10163_e34269-7a{position:relative;}@media all and (max-width: 1024px){.kadence-column10163_e34269-7a > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column10163_e34269-7a > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column10163_e34269-7a\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading10163_279ca1-4c, .wp-block-kadence-advancedheading.kt-adv-heading10163_279ca1-4c[data-kb-block=\"kb-adv-heading10163_279ca1-4c\"]{text-align:center;font-size:48px;line-height:200px;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading10163_279ca1-4c mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading10163_279ca1-4c[data-kb-block=\"kb-adv-heading10163_279ca1-4c\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<h2 class=\"kt-adv-heading10163_279ca1-4c wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading10163_279ca1-4c\">All pills<\/h2>\n\n\n<style>.kt-post-loop10163_fd9307-ed .kadence-post-image{padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.kt-post-loop10163_fd9307-ed .kt-post-grid-wrap{gap:30px 30px;}.kt-post-loop10163_fd9307-ed .kt-blocks-post-grid-item{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;border-top:1px solid #eeeeee;border-right:1px solid #eeeeee;border-bottom:1px solid #eeeeee;border-left:1px solid #eeeeee;background-color:var(--global-palette9, #ffffff);overflow:hidden;box-shadow:0px 0px 14px 0px rgba(0, 0, 0, 0.2);}.kt-post-loop10163_fd9307-ed .kt-blocks-post-grid-item .kt-blocks-post-grid-item-inner{padding-top:15px;padding-right:25px;padding-bottom:25px;padding-left:25px;}.kt-post-loop10163_fd9307-ed .kt-blocks-post-grid-item header{padding-top:0px;padding-right:0px;padding-bottom:10px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;}.kt-post-loop10163_fd9307-ed .kt-blocks-post-grid-item .entry-title{padding-top:10px;padding-right:0px;padding-bottom:5px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;font-size:24px;line-height:30px;}.kt-post-loop10163_fd9307-ed .kt-blocks-post-grid-item .kt-blocks-post-top-meta{color:#777777;}.kt-post-loop10163_fd9307-ed .kt-blocks-post-grid-item .kt-blocks-post-top-meta a{color:#777777;}.kt-post-loop10163_fd9307-ed .kt-blocks-post-grid-item .kt-blocks-post-top-meta a:hover{color:#444444;}.kt-post-loop10163_fd9307-ed .entry-content{padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;}.kt-post-loop10163_fd9307-ed .kt-blocks-post-footer{color:#777777;border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;font-size:12px;line-height:20px;}.kt-post-loop10163_fd9307-ed .entry-content:after{height:0px;}.kt-post-loop10163_fd9307-ed .kt-blocks-post-footer a{color:#777777;}.kt-post-loop10163_fd9307-ed .kt-blocks-post-footer a:hover{color:#444444;}.kt-post-loop10163_fd9307-ed .entry-content .kt-blocks-post-readmore{background-color:var(--global-palette4, #2D3748);border-color:#444444;color:var(--global-palette9, #ffffff);padding-top:4px;padding-right:8px;padding-bottom:4px;padding-left:8px;margin-top:15px;margin-right:0px;margin-bottom:0px;margin-left:0px;}.kt-post-loop10163_fd9307-ed .entry-content .kt-blocks-post-readmore:hover{color:#ffffff;border-color:#555555;background-color:var(--global-palette2, #2B6CB0);}.kt-post-loop10163_fd9307-ed .kb-filter-item{border-top-width:0px;border-right-width:0px;border-bottom-width:2px;border-left-width:0px;padding-top:5px;padding-right:8px;padding-bottom:5px;padding-left:8px;margin-top:0px;margin-right:10px;margin-bottom:0px;margin-left:0px;}@media all and (max-width: 1024px){.kt-post-loop10163_fd9307-ed .kt-blocks-post-grid-item{border-top:1px solid #eeeeee;border-right:1px solid #eeeeee;border-bottom:1px solid #eeeeee;border-left:1px solid #eeeeee;}}@media all and (max-width: 767px){.kt-post-loop10163_fd9307-ed .kt-blocks-post-grid-item{border-top:1px solid #eeeeee;border-right:1px solid #eeeeee;border-bottom:1px solid #eeeeee;border-left:1px solid #eeeeee;}}<\/style><div class=\"wp-block-kadence-postgrid kt-blocks-post-loop-block alignnone kt-post-loop10163_fd9307-ed kt-post-grid-layout-grid \"><div class=\"kt-post-grid-layout-grid-wrap kt-post-grid-wrap\" data-columns-xxl=\"3\" data-columns-xl=\"3\" data-columns-md=\"3\" data-columns-sm=\"2\" data-columns-xs=\"1\" data-columns-ss=\"1\"data-item-selector=\".kt-post-masonry-item\" aria-label=\"Post Carousel\"><article class=\"kt-blocks-post-grid-item post-14650 post type-post status-publish format-standard has-post-thumbnail hentry category-2cents-on-security-en\"><div class=\"kt-blocks-post-grid-item-inner-wrap kt-feat-image-align-top kt-feat-image-mobile-align-top\"><div class=\"kadence-post-image\"><div class=\"kadence-post-image-intrisic kt-image-ratio-56-25\" style=\"padding-bottom:56.25%;\"><div class=\"kadence-post-image-inner-intrisic\"><a href=\"https:\/\/www.cyber40.it\/en\/11-enisa-threat-landscape-2025\/\" aria-label=\"Read More #11 ENISA THREAT LANDSCAPE 2025\" class=\"kadence-post-image-inner-wrap\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"600\" src=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/10\/pill11-2-carousel-1_w-1024x600.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/10\/pill11-2-carousel-1_w-1024x600.jpg 1024w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/10\/pill11-2-carousel-1_w-300x176.jpg 300w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/10\/pill11-2-carousel-1_w-768x450.jpg 768w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/10\/pill11-2-carousel-1_w-200x117.jpg 200w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/10\/pill11-2-carousel-1_w.jpg 1281w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/div><\/div><\/div><div class=\"kt-blocks-post-grid-item-inner\"><header><h2 class=\"entry-title\"><a href=\"https:\/\/www.cyber40.it\/en\/11-enisa-threat-landscape-2025\/\">#11 ENISA THREAT LANDSCAPE 2025<\/a><\/h2><div class=\"kt-blocks-post-top-meta\"><div class=\"kt-blocks-date\"><time datetime=\"2025-10-27T13:52:47+00:00\" class=\"kt-blocks-post-date\">27 October 2025<\/time><\/div><\/div><\/header><div class=\"entry-content\">The cyber threat landscape is constantly evolving. The Enisa Threat Landscape 2025 provides an up-to-date snapshot of emerging risks and trends affecting cybersecurity in Europe<div class=\"kt-blocks-post-readmore-wrap\"><a class=\"kt-blocks-post-readmore\" href=\"https:\/\/www.cyber40.it\/en\/11-enisa-threat-landscape-2025\/\">Learn more<span class=\"screen-reader-text\"> #11 ENISA THREAT LANDSCAPE 2025<\/span><\/a><\/div><\/div><footer class=\"kt-blocks-post-footer\"><div class=\"kt-blocks-post-footer-left\"><\/div><div class=\"kt-blocks-post-footer-right\"><\/div><\/footer><\/div><\/div><\/article><article class=\"kt-blocks-post-grid-item post-14637 post type-post status-publish format-standard has-post-thumbnail hentry category-2cents-on-security-en\"><div class=\"kt-blocks-post-grid-item-inner-wrap kt-feat-image-align-top kt-feat-image-mobile-align-top\"><div class=\"kadence-post-image\"><div class=\"kadence-post-image-intrisic kt-image-ratio-56-25\" style=\"padding-bottom:56.25%;\"><div class=\"kadence-post-image-inner-intrisic\"><a href=\"https:\/\/www.cyber40.it\/en\/10-ai-code-of-practice\/\" aria-label=\"Read More #10 AI code of practice\" class=\"kadence-post-image-inner-wrap\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"351\" src=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/10\/10_pillole.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/10\/10_pillole.jpg 600w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/10\/10_pillole-300x176.jpg 300w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/10\/10_pillole-200x117.jpg 200w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/div><\/div><\/div><div class=\"kt-blocks-post-grid-item-inner\"><header><h2 class=\"entry-title\"><a href=\"https:\/\/www.cyber40.it\/en\/10-ai-code-of-practice\/\">#10 AI code of practice<\/a><\/h2><div class=\"kt-blocks-post-top-meta\"><div class=\"kt-blocks-date\"><time datetime=\"2025-10-14T16:11:29+00:00\" class=\"kt-blocks-post-date\">14 October 2025<\/time><\/div><\/div><\/header><div class=\"entry-content\">The Code of Practice on General Purpose AI (GPAI), a tool developed by independent experts to help industry implement the European AI Regulation (AI Act), has been published. The Code is a step forward in ensuring security, transparency and copyright&#8230;<div class=\"kt-blocks-post-readmore-wrap\"><a class=\"kt-blocks-post-readmore\" href=\"https:\/\/www.cyber40.it\/en\/10-ai-code-of-practice\/\">Learn more<span class=\"screen-reader-text\"> #10 AI code of practice<\/span><\/a><\/div><\/div><footer class=\"kt-blocks-post-footer\"><div class=\"kt-blocks-post-footer-left\"><\/div><div class=\"kt-blocks-post-footer-right\"><\/div><\/footer><\/div><\/div><\/article><article class=\"kt-blocks-post-grid-item post-13008 post type-post status-publish format-standard has-post-thumbnail hentry category-2cents-on-security-en\"><div class=\"kt-blocks-post-grid-item-inner-wrap kt-feat-image-align-top kt-feat-image-mobile-align-top\"><div class=\"kadence-post-image\"><div class=\"kadence-post-image-intrisic kt-image-ratio-56-25\" style=\"padding-bottom:56.25%;\"><div class=\"kadence-post-image-inner-intrisic\"><a href=\"https:\/\/www.cyber40.it\/en\/9-digital-operational-resilience-act-dora\/\" aria-label=\"Read More #9 Digital Operational Resilience Act (DORA).\" class=\"kadence-post-image-inner-wrap\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"351\" src=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/03\/2cents-pillole-marzo-_9-carousel-1def.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/03\/2cents-pillole-marzo-_9-carousel-1def.jpg 600w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/03\/2cents-pillole-marzo-_9-carousel-1def-300x176.jpg 300w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/03\/2cents-pillole-marzo-_9-carousel-1def-200x117.jpg 200w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/div><\/div><\/div><div class=\"kt-blocks-post-grid-item-inner\"><header><h2 class=\"entry-title\"><a href=\"https:\/\/www.cyber40.it\/en\/9-digital-operational-resilience-act-dora\/\">#9 Digital Operational Resilience Act (DORA).<\/a><\/h2><div class=\"kt-blocks-post-top-meta\"><div class=\"kt-blocks-date\"><time datetime=\"2025-03-25T08:05:18+00:00\" class=\"kt-blocks-post-date\">25 March 2025<\/time><\/div><\/div><\/header><div class=\"entry-content\">The Digital Operational Resilience Act (DORA) was created as a response to the increasingly complex technological environment in which financial entities operate, which is characterized by fragmented regulation spread across multiple regulations. The purpose of DORA is to simplify and&#8230;<div class=\"kt-blocks-post-readmore-wrap\"><a class=\"kt-blocks-post-readmore\" href=\"https:\/\/www.cyber40.it\/en\/9-digital-operational-resilience-act-dora\/\">Learn more<span class=\"screen-reader-text\"> #9 Digital Operational Resilience Act (DORA).<\/span><\/a><\/div><\/div><footer class=\"kt-blocks-post-footer\"><div class=\"kt-blocks-post-footer-left\"><\/div><div class=\"kt-blocks-post-footer-right\"><\/div><\/footer><\/div><\/div><\/article><article class=\"kt-blocks-post-grid-item post-13010 post type-post status-publish format-standard has-post-thumbnail hentry category-2cents-on-security-en\"><div class=\"kt-blocks-post-grid-item-inner-wrap kt-feat-image-align-top kt-feat-image-mobile-align-top\"><div class=\"kadence-post-image\"><div class=\"kadence-post-image-intrisic kt-image-ratio-56-25\" style=\"padding-bottom:56.25%;\"><div class=\"kadence-post-image-inner-intrisic\"><a href=\"https:\/\/www.cyber40.it\/en\/9-digital-operational-resilience-act-regulation\/\" aria-label=\"Read More #9 Digital Operational Resilience Act (Regulation).\" class=\"kadence-post-image-inner-wrap\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"351\" src=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/03\/2cents-pillole-marzo-_9-carousel-2def.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/03\/2cents-pillole-marzo-_9-carousel-2def.jpg 600w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/03\/2cents-pillole-marzo-_9-carousel-2def-300x176.jpg 300w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/03\/2cents-pillole-marzo-_9-carousel-2def-200x117.jpg 200w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/div><\/div><\/div><div class=\"kt-blocks-post-grid-item-inner\"><header><h2 class=\"entry-title\"><a href=\"https:\/\/www.cyber40.it\/en\/9-digital-operational-resilience-act-regulation\/\">#9 Digital Operational Resilience Act (Regulation).<\/a><\/h2><div class=\"kt-blocks-post-top-meta\"><div class=\"kt-blocks-date\"><time datetime=\"2025-03-24T08:10:10+00:00\" class=\"kt-blocks-post-date\">24 March 2025<\/time><\/div><\/div><\/header><div class=\"entry-content\">The DORA regulation establishes technical requirements for financial entities and ICT providers in four main areas.<div class=\"kt-blocks-post-readmore-wrap\"><a class=\"kt-blocks-post-readmore\" href=\"https:\/\/www.cyber40.it\/en\/9-digital-operational-resilience-act-regulation\/\">Learn more<span class=\"screen-reader-text\"> #9 Digital Operational Resilience Act (Regulation).<\/span><\/a><\/div><\/div><footer class=\"kt-blocks-post-footer\"><div class=\"kt-blocks-post-footer-left\"><\/div><div class=\"kt-blocks-post-footer-right\"><\/div><\/footer><\/div><\/div><\/article><article class=\"kt-blocks-post-grid-item post-13022 post type-post status-publish format-standard has-post-thumbnail hentry category-2cents-on-security-en\"><div class=\"kt-blocks-post-grid-item-inner-wrap kt-feat-image-align-top kt-feat-image-mobile-align-top\"><div class=\"kadence-post-image\"><div class=\"kadence-post-image-intrisic kt-image-ratio-56-25\" style=\"padding-bottom:56.25%;\"><div class=\"kadence-post-image-inner-intrisic\"><a href=\"https:\/\/www.cyber40.it\/en\/8-the-cyber-solidarity-act\/\" aria-label=\"Read More #8 The Cyber Solidarity Act\" class=\"kadence-post-image-inner-wrap\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"352\" src=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/01\/pill8-1-carousel-1d.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/01\/pill8-1-carousel-1d.jpg 600w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/01\/pill8-1-carousel-1d-300x176.jpg 300w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/01\/pill8-1-carousel-1d-200x117.jpg 200w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/div><\/div><\/div><div class=\"kt-blocks-post-grid-item-inner\"><header><h2 class=\"entry-title\"><a href=\"https:\/\/www.cyber40.it\/en\/8-the-cyber-solidarity-act\/\">#8 The Cyber Solidarity Act<\/a><\/h2><div class=\"kt-blocks-post-top-meta\"><div class=\"kt-blocks-date\"><time datetime=\"2025-01-29T10:23:30+00:00\" class=\"kt-blocks-post-date\">29 January 2025<\/time><\/div><\/div><\/header><div class=\"entry-content\">On January 15, 2025, the regulation on the Cyber Solidarity Act was officially published in the Official Journal of the European Union. This legislation aims to enhance EU member states&#8217; coordinated cooperation and response to cybersecurity.<div class=\"kt-blocks-post-readmore-wrap\"><a class=\"kt-blocks-post-readmore\" href=\"https:\/\/www.cyber40.it\/en\/8-the-cyber-solidarity-act\/\">Learn more<span class=\"screen-reader-text\"> #8 The Cyber Solidarity Act<\/span><\/a><\/div><\/div><footer class=\"kt-blocks-post-footer\"><div class=\"kt-blocks-post-footer-left\"><\/div><div class=\"kt-blocks-post-footer-right\"><\/div><\/footer><\/div><\/div><\/article><article class=\"kt-blocks-post-grid-item post-13028 post type-post status-publish format-standard has-post-thumbnail hentry category-2cents-on-security-en\"><div class=\"kt-blocks-post-grid-item-inner-wrap kt-feat-image-align-top kt-feat-image-mobile-align-top\"><div class=\"kadence-post-image\"><div class=\"kadence-post-image-intrisic kt-image-ratio-56-25\" style=\"padding-bottom:56.25%;\"><div class=\"kadence-post-image-inner-intrisic\"><a href=\"https:\/\/www.cyber40.it\/en\/8-the-cyber-solidarity-act-2\/\" aria-label=\"Read More #8 The Cyber Solidarity Act\" class=\"kadence-post-image-inner-wrap\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"352\" src=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/01\/pill8-2-carousel-1d.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/01\/pill8-2-carousel-1d.jpg 600w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/01\/pill8-2-carousel-1d-300x176.jpg 300w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2025\/01\/pill8-2-carousel-1d-200x117.jpg 200w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/div><\/div><\/div><div class=\"kt-blocks-post-grid-item-inner\"><header><h2 class=\"entry-title\"><a href=\"https:\/\/www.cyber40.it\/en\/8-the-cyber-solidarity-act-2\/\">#8 The Cyber Solidarity Act<\/a><\/h2><div class=\"kt-blocks-post-top-meta\"><div class=\"kt-blocks-date\"><time datetime=\"2025-01-29T09:26:14+00:00\" class=\"kt-blocks-post-date\">29 January 2025<\/time><\/div><\/div><\/header><div class=\"entry-content\">Cybersecurity is a priority for the EU.ENISA, the European Union Cybersecurity Agency, will play a crucial role in strengthening our continent&#8217;s digital resilience.<div class=\"kt-blocks-post-readmore-wrap\"><a class=\"kt-blocks-post-readmore\" href=\"https:\/\/www.cyber40.it\/en\/8-the-cyber-solidarity-act-2\/\">Learn more<span class=\"screen-reader-text\"> #8 The Cyber Solidarity Act<\/span><\/a><\/div><\/div><footer class=\"kt-blocks-post-footer\"><div class=\"kt-blocks-post-footer-left\"><\/div><div class=\"kt-blocks-post-footer-right\"><\/div><\/footer><\/div><\/div><\/article><article class=\"kt-blocks-post-grid-item post-13038 post type-post status-publish format-standard has-post-thumbnail hentry category-2cents-on-security-en\"><div class=\"kt-blocks-post-grid-item-inner-wrap kt-feat-image-align-top kt-feat-image-mobile-align-top\"><div class=\"kadence-post-image\"><div class=\"kadence-post-image-intrisic kt-image-ratio-56-25\" style=\"padding-bottom:56.25%;\"><div class=\"kadence-post-image-inner-intrisic\"><a href=\"https:\/\/www.cyber40.it\/en\/7-the-next-steps-on-nis-2-2\/\" aria-label=\"Read More #7 The next steps on NIS 2.\" class=\"kadence-post-image-inner-wrap\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"351\" src=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/12\/2cents-pillole-dicembre-_7_1parte.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/12\/2cents-pillole-dicembre-_7_1parte.jpg 600w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/12\/2cents-pillole-dicembre-_7_1parte-300x176.jpg 300w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/12\/2cents-pillole-dicembre-_7_1parte-200x117.jpg 200w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/div><\/div><\/div><div class=\"kt-blocks-post-grid-item-inner\"><header><h2 class=\"entry-title\"><a href=\"https:\/\/www.cyber40.it\/en\/7-the-next-steps-on-nis-2-2\/\">#7 The next steps on NIS 2.<\/a><\/h2><div class=\"kt-blocks-post-top-meta\"><div class=\"kt-blocks-date\"><time datetime=\"2024-12-20T06:52:50+00:00\" class=\"kt-blocks-post-date\">20 December 2024<\/time><\/div><\/div><\/header><div class=\"entry-content\">NIS 2 is a key step in information security management for organizations. It is essential to adopt security policies and procedures for incident management, with a focus on the supply chain. As of Dec. 1, 2024, all organizations affected by&#8230;<div class=\"kt-blocks-post-readmore-wrap\"><a class=\"kt-blocks-post-readmore\" href=\"https:\/\/www.cyber40.it\/en\/7-the-next-steps-on-nis-2-2\/\">Learn more<span class=\"screen-reader-text\"> #7 The next steps on NIS 2.<\/span><\/a><\/div><\/div><footer class=\"kt-blocks-post-footer\"><div class=\"kt-blocks-post-footer-left\"><\/div><div class=\"kt-blocks-post-footer-right\"><\/div><\/footer><\/div><\/div><\/article><article class=\"kt-blocks-post-grid-item post-13036 post type-post status-publish format-standard has-post-thumbnail hentry category-2cents-on-security-en\"><div class=\"kt-blocks-post-grid-item-inner-wrap kt-feat-image-align-top kt-feat-image-mobile-align-top\"><div class=\"kadence-post-image\"><div class=\"kadence-post-image-intrisic kt-image-ratio-56-25\" style=\"padding-bottom:56.25%;\"><div class=\"kadence-post-image-inner-intrisic\"><a href=\"https:\/\/www.cyber40.it\/en\/7-the-next-steps-on-nis-2\/\" aria-label=\"Read More #7 The next steps on NIS 2.\" class=\"kadence-post-image-inner-wrap\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"351\" src=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/12\/2cents-pillole-dicembre-_7.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/12\/2cents-pillole-dicembre-_7.jpg 600w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/12\/2cents-pillole-dicembre-_7-300x176.jpg 300w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/12\/2cents-pillole-dicembre-_7-200x117.jpg 200w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/div><\/div><\/div><div class=\"kt-blocks-post-grid-item-inner\"><header><h2 class=\"entry-title\"><a href=\"https:\/\/www.cyber40.it\/en\/7-the-next-steps-on-nis-2\/\">#7 The next steps on NIS 2.<\/a><\/h2><div class=\"kt-blocks-post-top-meta\"><div class=\"kt-blocks-date\"><time datetime=\"2024-12-20T06:05:12+00:00\" class=\"kt-blocks-post-date\">20 December 2024<\/time><\/div><\/div><\/header><div class=\"entry-content\">Risk management requires that significant incidents be reported to CSIRT Italy within specific deadlines, ensuring a prompt and appropriate response. Penalties for failure to notify can be severe, with penalties reaching up to 10 million euros or significant percentages of&#8230;<div class=\"kt-blocks-post-readmore-wrap\"><a class=\"kt-blocks-post-readmore\" href=\"https:\/\/www.cyber40.it\/en\/7-the-next-steps-on-nis-2\/\">Learn more<span class=\"screen-reader-text\"> #7 The next steps on NIS 2.<\/span><\/a><\/div><\/div><footer class=\"kt-blocks-post-footer\"><div class=\"kt-blocks-post-footer-left\"><\/div><div class=\"kt-blocks-post-footer-right\"><\/div><\/footer><\/div><\/div><\/article><article class=\"kt-blocks-post-grid-item post-13042 post type-post status-publish format-standard has-post-thumbnail hentry category-2cents-on-security-en\"><div class=\"kt-blocks-post-grid-item-inner-wrap kt-feat-image-align-top kt-feat-image-mobile-align-top\"><div class=\"kadence-post-image\"><div class=\"kadence-post-image-intrisic kt-image-ratio-56-25\" style=\"padding-bottom:56.25%;\"><div class=\"kadence-post-image-inner-intrisic\"><a href=\"https:\/\/www.cyber40.it\/en\/6-the-cyber-resilience-act-cra-timelines-and-obligations\/\" aria-label=\"Read More #6 The Cyber Resilience ACT ( CRA) &#8211; Timelines and Obligations.\" class=\"kadence-post-image-inner-wrap\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"351\" src=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/11\/2cents-pillole-novembre-6-2_def.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/11\/2cents-pillole-novembre-6-2_def.jpg 600w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/11\/2cents-pillole-novembre-6-2_def-300x176.jpg 300w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/11\/2cents-pillole-novembre-6-2_def-200x117.jpg 200w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/div><\/div><\/div><div class=\"kt-blocks-post-grid-item-inner\"><header><h2 class=\"entry-title\"><a href=\"https:\/\/www.cyber40.it\/en\/6-the-cyber-resilience-act-cra-timelines-and-obligations\/\">#6 The Cyber Resilience ACT ( CRA) &#8211; Timelines and Obligations.<\/a><\/h2><div class=\"kt-blocks-post-top-meta\"><div class=\"kt-blocks-date\"><time datetime=\"2024-11-27T10:06:12+00:00\" class=\"kt-blocks-post-date\">27 November 2024<\/time><\/div><\/div><\/header><div class=\"entry-content\">After publication in the Official Journal of the European Union on November 20, the regulation will enter into force on the 20th day after publication. The provisions will be applicable from 36 months after that date. However, Article 14, on&#8230;<div class=\"kt-blocks-post-readmore-wrap\"><a class=\"kt-blocks-post-readmore\" href=\"https:\/\/www.cyber40.it\/en\/6-the-cyber-resilience-act-cra-timelines-and-obligations\/\">Learn more<span class=\"screen-reader-text\"> #6 The Cyber Resilience ACT ( CRA) &#8211; Timelines and Obligations.<\/span><\/a><\/div><\/div><footer class=\"kt-blocks-post-footer\"><div class=\"kt-blocks-post-footer-left\"><\/div><div class=\"kt-blocks-post-footer-right\"><\/div><\/footer><\/div><\/div><\/article><article class=\"kt-blocks-post-grid-item post-13040 post type-post status-publish format-standard has-post-thumbnail hentry category-2cents-on-security-en\"><div class=\"kt-blocks-post-grid-item-inner-wrap kt-feat-image-align-top kt-feat-image-mobile-align-top\"><div class=\"kadence-post-image\"><div class=\"kadence-post-image-intrisic kt-image-ratio-56-25\" style=\"padding-bottom:56.25%;\"><div class=\"kadence-post-image-inner-intrisic\"><a href=\"https:\/\/www.cyber40.it\/en\/6-the-cyber-resilience-act-cra-future-impacts-in-italian-industry\/\" aria-label=\"Read More #6 The Cyber Resilience ACT ( CRA) &#8211; Future Impacts in Italian Industry.\" class=\"kadence-post-image-inner-wrap\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"351\" src=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/11\/2cents-pillole-novembre-6-1_def.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/11\/2cents-pillole-novembre-6-1_def.jpg 600w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/11\/2cents-pillole-novembre-6-1_def-300x176.jpg 300w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/11\/2cents-pillole-novembre-6-1_def-200x117.jpg 200w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/div><\/div><\/div><div class=\"kt-blocks-post-grid-item-inner\"><header><h2 class=\"entry-title\"><a href=\"https:\/\/www.cyber40.it\/en\/6-the-cyber-resilience-act-cra-future-impacts-in-italian-industry\/\">#6 The Cyber Resilience ACT ( CRA) &#8211; Future Impacts in Italian Industry.<\/a><\/h2><div class=\"kt-blocks-post-top-meta\"><div class=\"kt-blocks-date\"><time datetime=\"2024-11-27T09:59:53+00:00\" class=\"kt-blocks-post-date\">27 November 2024<\/time><\/div><\/div><\/header><div class=\"entry-content\">The Cyber Resilience Act (CRA) is a European Union Regulation aimed at addressing growing cyber threats by improving the security of products with digital elements. The exponential increase in connected devices has made cybersecurity a critical priority, as cyber attacks&#8230;<div class=\"kt-blocks-post-readmore-wrap\"><a class=\"kt-blocks-post-readmore\" href=\"https:\/\/www.cyber40.it\/en\/6-the-cyber-resilience-act-cra-future-impacts-in-italian-industry\/\">Learn more<span class=\"screen-reader-text\"> #6 The Cyber Resilience ACT ( CRA) &#8211; Future Impacts in Italian Industry.<\/span><\/a><\/div><\/div><footer class=\"kt-blocks-post-footer\"><div class=\"kt-blocks-post-footer-left\"><\/div><div class=\"kt-blocks-post-footer-right\"><\/div><\/footer><\/div><\/div><\/article><article class=\"kt-blocks-post-grid-item post-13052 post type-post status-publish format-standard has-post-thumbnail hentry category-2cents-on-security-en\"><div class=\"kt-blocks-post-grid-item-inner-wrap kt-feat-image-align-top kt-feat-image-mobile-align-top\"><div class=\"kadence-post-image\"><div class=\"kadence-post-image-intrisic kt-image-ratio-56-25\" style=\"padding-bottom:56.25%;\"><div class=\"kadence-post-image-inner-intrisic\"><a href=\"https:\/\/www.cyber40.it\/en\/5-who-to-turn-to\/\" aria-label=\"Read More #5 Who to turn to\" class=\"kadence-post-image-inner-wrap\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"351\" src=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/2cents-visual-carousel-_5_ok.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/2cents-visual-carousel-_5_ok.jpg 600w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/2cents-visual-carousel-_5_ok-300x176.jpg 300w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/2cents-visual-carousel-_5_ok-200x117.jpg 200w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/div><\/div><\/div><div class=\"kt-blocks-post-grid-item-inner\"><header><h2 class=\"entry-title\"><a href=\"https:\/\/www.cyber40.it\/en\/5-who-to-turn-to\/\">#5 Who to turn to<\/a><\/h2><div class=\"kt-blocks-post-top-meta\"><div class=\"kt-blocks-date\"><time datetime=\"2024-10-31T11:35:12+00:00\" class=\"kt-blocks-post-date\">31 October 2024<\/time><\/div><\/div><\/header><div class=\"entry-content\">Surfing the Web can be a complex experience, and sometimes one may come across disturbing or unpleasant content. It is crucial not to face these situations alone. Talking about it with friends, teachers or family members can make a difference&#8230;<div class=\"kt-blocks-post-readmore-wrap\"><a class=\"kt-blocks-post-readmore\" href=\"https:\/\/www.cyber40.it\/en\/5-who-to-turn-to\/\">Learn more<span class=\"screen-reader-text\"> #5 Who to turn to<\/span><\/a><\/div><\/div><footer class=\"kt-blocks-post-footer\"><div class=\"kt-blocks-post-footer-left\"><\/div><div class=\"kt-blocks-post-footer-right\"><\/div><\/footer><\/div><\/div><\/article><article class=\"kt-blocks-post-grid-item post-13056 post type-post status-publish format-standard has-post-thumbnail hentry category-2cents-on-security-en\"><div class=\"kt-blocks-post-grid-item-inner-wrap kt-feat-image-align-top kt-feat-image-mobile-align-top\"><div class=\"kadence-post-image\"><div class=\"kadence-post-image-intrisic kt-image-ratio-56-25\" style=\"padding-bottom:56.25%;\"><div class=\"kadence-post-image-inner-intrisic\"><a href=\"https:\/\/www.cyber40.it\/en\/4-health-impacts\/\" aria-label=\"Read More #4 Health Impacts\" class=\"kadence-post-image-inner-wrap\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"351\" src=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/4.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/4.jpg 600w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/4-300x176.jpg 300w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/4-200x117.jpg 200w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/div><\/div><\/div><div class=\"kt-blocks-post-grid-item-inner\"><header><h2 class=\"entry-title\"><a href=\"https:\/\/www.cyber40.it\/en\/4-health-impacts\/\">#4 Health Impacts<\/a><\/h2><div class=\"kt-blocks-post-top-meta\"><div class=\"kt-blocks-date\"><time datetime=\"2024-10-24T10:34:36+00:00\" class=\"kt-blocks-post-date\">24 October 2024<\/time><\/div><\/div><\/header><div class=\"entry-content\">Prolonged use of electronic devices and continuous exposure to the web can have significant effects on physical and mental health, such as exposure to electromagnetic fields, psychological addictions, and being exposed to online violence and Cyberbullying. While the risks associated&#8230;<div class=\"kt-blocks-post-readmore-wrap\"><a class=\"kt-blocks-post-readmore\" href=\"https:\/\/www.cyber40.it\/en\/4-health-impacts\/\">Learn more<span class=\"screen-reader-text\"> #4 Health Impacts<\/span><\/a><\/div><\/div><footer class=\"kt-blocks-post-footer\"><div class=\"kt-blocks-post-footer-left\"><\/div><div class=\"kt-blocks-post-footer-right\"><\/div><\/footer><\/div><\/div><\/article><article class=\"kt-blocks-post-grid-item post-13054 post type-post status-publish format-standard has-post-thumbnail hentry category-2cents-on-security-en\"><div class=\"kt-blocks-post-grid-item-inner-wrap kt-feat-image-align-top kt-feat-image-mobile-align-top\"><div class=\"kadence-post-image\"><div class=\"kadence-post-image-intrisic kt-image-ratio-56-25\" style=\"padding-bottom:56.25%;\"><div class=\"kadence-post-image-inner-intrisic\"><a href=\"https:\/\/www.cyber40.it\/en\/3-conscious-use-of-tools-and-technology\/\" aria-label=\"Read More #3 Conscious Use of Tools and Technology.\" class=\"kadence-post-image-inner-wrap\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"351\" src=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/2cents-visual-carousel-3ok.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/2cents-visual-carousel-3ok.jpg 600w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/2cents-visual-carousel-3ok-300x176.jpg 300w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/2cents-visual-carousel-3ok-200x117.jpg 200w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/div><\/div><\/div><div class=\"kt-blocks-post-grid-item-inner\"><header><h2 class=\"entry-title\"><a href=\"https:\/\/www.cyber40.it\/en\/3-conscious-use-of-tools-and-technology\/\">#3 Conscious Use of Tools and Technology.<\/a><\/h2><div class=\"kt-blocks-post-top-meta\"><div class=\"kt-blocks-date\"><time datetime=\"2024-10-21T10:21:49+00:00\" class=\"kt-blocks-post-date\">21 October 2024<\/time><\/div><\/div><\/header><div class=\"entry-content\">We live in a time when technology is an integral part of our lives. But how aware are we really of its daily use? Here are some pointers for safer and more responsible management<div class=\"kt-blocks-post-readmore-wrap\"><a class=\"kt-blocks-post-readmore\" href=\"https:\/\/www.cyber40.it\/en\/3-conscious-use-of-tools-and-technology\/\">Learn more<span class=\"screen-reader-text\"> #3 Conscious Use of Tools and Technology.<\/span><\/a><\/div><\/div><footer class=\"kt-blocks-post-footer\"><div class=\"kt-blocks-post-footer-left\"><\/div><div class=\"kt-blocks-post-footer-right\"><\/div><\/footer><\/div><\/div><\/article><article class=\"kt-blocks-post-grid-item post-13062 post type-post status-publish format-standard has-post-thumbnail hentry category-2cents-on-security-en\"><div class=\"kt-blocks-post-grid-item-inner-wrap kt-feat-image-align-top kt-feat-image-mobile-align-top\"><div class=\"kadence-post-image\"><div class=\"kadence-post-image-intrisic kt-image-ratio-56-25\" style=\"padding-bottom:56.25%;\"><div class=\"kadence-post-image-inner-intrisic\"><a href=\"https:\/\/www.cyber40.it\/en\/2-digital-aware-citizenship\/\" aria-label=\"Read More #2 Digital Aware Citizenship\" class=\"kadence-post-image-inner-wrap\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"375\" src=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/2cents-visual-carousel-2.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/2cents-visual-carousel-2.jpg 640w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/2cents-visual-carousel-2-300x176.jpg 300w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/2cents-visual-carousel-2-200x117.jpg 200w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/div><\/div><\/div><div class=\"kt-blocks-post-grid-item-inner\"><header><h2 class=\"entry-title\"><a href=\"https:\/\/www.cyber40.it\/en\/2-digital-aware-citizenship\/\">#2 Digital Aware Citizenship<\/a><\/h2><div class=\"kt-blocks-post-top-meta\"><div class=\"kt-blocks-date\"><time datetime=\"2024-10-14T15:05:55+00:00\" class=\"kt-blocks-post-date\">14 October 2024<\/time><\/div><\/div><\/header><div class=\"entry-content\">The information and content about ourselves that we use or publish by surfing the Web make us true &#8220;digital citizens,&#8221; in a virtual world where the same principles of coexistence that govern real society apply. The digital world offers so&#8230;<div class=\"kt-blocks-post-readmore-wrap\"><a class=\"kt-blocks-post-readmore\" href=\"https:\/\/www.cyber40.it\/en\/2-digital-aware-citizenship\/\">Learn more<span class=\"screen-reader-text\"> #2 Digital Aware Citizenship<\/span><\/a><\/div><\/div><footer class=\"kt-blocks-post-footer\"><div class=\"kt-blocks-post-footer-left\"><\/div><div class=\"kt-blocks-post-footer-right\"><\/div><\/footer><\/div><\/div><\/article><article class=\"kt-blocks-post-grid-item post-13074 post type-post status-publish format-standard has-post-thumbnail hentry category-2cents-on-security-en\"><div class=\"kt-blocks-post-grid-item-inner-wrap kt-feat-image-align-top kt-feat-image-mobile-align-top\"><div class=\"kadence-post-image\"><div class=\"kadence-post-image-intrisic kt-image-ratio-56-25\" style=\"padding-bottom:56.25%;\"><div class=\"kadence-post-image-inner-intrisic\"><a href=\"https:\/\/www.cyber40.it\/en\/1-digital-identity-protection\/\" aria-label=\"Read More #1 Digital Identity Protection\" class=\"kadence-post-image-inner-wrap\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"375\" src=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/card_1.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/card_1.jpg 640w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/card_1-300x176.jpg 300w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/card_1-200x117.jpg 200w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/div><\/div><\/div><div class=\"kt-blocks-post-grid-item-inner\"><header><h2 class=\"entry-title\"><a href=\"https:\/\/www.cyber40.it\/en\/1-digital-identity-protection\/\">#1 Digital Identity Protection<\/a><\/h2><div class=\"kt-blocks-post-top-meta\"><div class=\"kt-blocks-date\"><time datetime=\"2024-10-14T08:35:01+00:00\" class=\"kt-blocks-post-date\">14 October 2024<\/time><\/div><\/div><\/header><div class=\"entry-content\">&#8220;We are&#8221; in the real world as well as &#8220;we are&#8221; in the digital world-the online world directly affects our real lives and vice versa. Our identity and actions in the real world have their counterparts in the digital world&#8230;.<div class=\"kt-blocks-post-readmore-wrap\"><a class=\"kt-blocks-post-readmore\" href=\"https:\/\/www.cyber40.it\/en\/1-digital-identity-protection\/\">Learn more<span class=\"screen-reader-text\"> #1 Digital Identity Protection<\/span><\/a><\/div><\/div><footer class=\"kt-blocks-post-footer\"><div class=\"kt-blocks-post-footer-left\"><\/div><div class=\"kt-blocks-post-footer-right\"><\/div><\/footer><\/div><\/div><\/article><\/div><\/div><!-- .wp-block-kadence-postgrid --><\/div><\/div>\n\n\n<style>.kadence-column10163_9d0873-0a > .kt-inside-inner-col,.kadence-column10163_9d0873-0a > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column10163_9d0873-0a > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column10163_9d0873-0a > .kt-inside-inner-col{flex-direction:column;}.kadence-column10163_9d0873-0a > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column10163_9d0873-0a > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column10163_9d0873-0a{position:relative;}@media all and (max-width: 1024px){.kadence-column10163_9d0873-0a > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column10163_9d0873-0a > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column10163_9d0873-0a\"><div class=\"kt-inside-inner-col\"><\/div><\/div>\n\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>2Cents on Security 2 Cents on Security is a compendium of short tips to help everyone stay safe in the digital world, designed to offer quick, simple and accessible answers to anyone. The pills, written in clear, straightforward language, address problems that can arise in the use of digital technologies. Their structure makes it easier&#8230;<\/p>\n","protected":false},"author":9,"featured_media":12851,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"iawp_total_views":21,"footnotes":""},"class_list":["post-12994","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>2 CENTS ON SECURITY - Cyber 4.0<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyber40.it\/en\/2-cents-on-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2 CENTS ON SECURITY - Cyber 4.0\" \/>\n<meta property=\"og:description\" content=\"2Cents on Security 2 Cents on Security is a compendium of short tips to help everyone stay safe in the digital world, designed to offer quick, simple and accessible answers to anyone. The pills, written in clear, straightforward language, address problems that can arise in the use of digital technologies. Their structure makes it easier...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyber40.it\/en\/2-cents-on-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber 4.0\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-15T18:53:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/2cents-visual.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"361\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyber40.it\/en\/2-cents-on-security\/\",\"url\":\"https:\/\/www.cyber40.it\/en\/2-cents-on-security\/\",\"name\":\"2 CENTS ON SECURITY - Cyber 4.0\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/2-cents-on-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/2-cents-on-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/2cents-visual.jpg\",\"datePublished\":\"2024-10-14T08:25:13+00:00\",\"dateModified\":\"2025-05-15T18:53:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/2-cents-on-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyber40.it\/en\/2-cents-on-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/2-cents-on-security\/#primaryimage\",\"url\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/2cents-visual.jpg\",\"contentUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/2cents-visual.jpg\",\"width\":600,\"height\":361,\"caption\":\"2cents visual\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyber40.it\/en\/2-cents-on-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyber40.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"2 CENTS ON SECURITY\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#website\",\"url\":\"https:\/\/www.cyber40.it\/en\/\",\"name\":\"Cyber 4.0\",\"description\":\"Strategie e Competenze per la Cyber Sicurezza\",\"publisher\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyber40.it\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\",\"name\":\"Cyber 4.0\",\"url\":\"https:\/\/www.cyber40.it\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png\",\"contentUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png\",\"width\":395,\"height\":122,\"caption\":\"Cyber 4.0\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/cyber40\/?originalSubdomain=it\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2 CENTS ON SECURITY - Cyber 4.0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyber40.it\/en\/2-cents-on-security\/","og_locale":"en_US","og_type":"article","og_title":"2 CENTS ON SECURITY - Cyber 4.0","og_description":"2Cents on Security 2 Cents on Security is a compendium of short tips to help everyone stay safe in the digital world, designed to offer quick, simple and accessible answers to anyone. The pills, written in clear, straightforward language, address problems that can arise in the use of digital technologies. Their structure makes it easier...","og_url":"https:\/\/www.cyber40.it\/en\/2-cents-on-security\/","og_site_name":"Cyber 4.0","article_modified_time":"2025-05-15T18:53:48+00:00","og_image":[{"width":600,"height":361,"url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/2cents-visual.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyber40.it\/en\/2-cents-on-security\/","url":"https:\/\/www.cyber40.it\/en\/2-cents-on-security\/","name":"2 CENTS ON SECURITY - Cyber 4.0","isPartOf":{"@id":"https:\/\/www.cyber40.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyber40.it\/en\/2-cents-on-security\/#primaryimage"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/2-cents-on-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/2cents-visual.jpg","datePublished":"2024-10-14T08:25:13+00:00","dateModified":"2025-05-15T18:53:48+00:00","breadcrumb":{"@id":"https:\/\/www.cyber40.it\/en\/2-cents-on-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyber40.it\/en\/2-cents-on-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/2-cents-on-security\/#primaryimage","url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/2cents-visual.jpg","contentUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/2cents-visual.jpg","width":600,"height":361,"caption":"2cents visual"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyber40.it\/en\/2-cents-on-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyber40.it\/en\/"},{"@type":"ListItem","position":2,"name":"2 CENTS ON SECURITY"}]},{"@type":"WebSite","@id":"https:\/\/www.cyber40.it\/en\/#website","url":"https:\/\/www.cyber40.it\/en\/","name":"Cyber 4.0","description":"Strategie e Competenze per la Cyber Sicurezza","publisher":{"@id":"https:\/\/www.cyber40.it\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyber40.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cyber40.it\/en\/#organization","name":"Cyber 4.0","url":"https:\/\/www.cyber40.it\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png","contentUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png","width":395,"height":122,"caption":"Cyber 4.0"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cyber40\/?originalSubdomain=it"]}]}},"taxonomy_info":[],"featured_image_src_large":["https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/2cents-visual.jpg",600,361,false],"author_info":{"display_name":"Davide Baraldi","author_link":"https:\/\/www.cyber40.it\/en\/author\/davide-baraldi\/"},"comment_info":"","_links":{"self":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/pages\/12994","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/comments?post=12994"}],"version-history":[{"count":0,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/pages\/12994\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/media\/12851"}],"wp:attachment":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/media?parent=12994"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}