{"id":13104,"date":"2024-04-03T10:31:52","date_gmt":"2024-04-03T10:31:52","guid":{"rendered":"https:\/\/www.cyber40.it\/online-the-results-of-the-call-1-2023\/"},"modified":"2025-05-16T09:33:07","modified_gmt":"2025-05-16T09:33:07","slug":"online-the-results-of-the-call-1-2023","status":"publish","type":"post","link":"https:\/\/www.cyber40.it\/en\/online-the-results-of-the-call-1-2023\/","title":{"rendered":"Online the results of the Call 1-2023"},"content":{"rendered":"\n<p>Published the 10 winners of Call 1-2023 active until last September.  <\/p>\n\n<p>The initiative funds, for a total of <strong>2.6 Million Euros<\/strong> in grants, 3 projects in the <strong>Cybersecurity core<\/strong> area, 3 projects in the <strong>Automotive<\/strong> area, 1 project in the <strong>Aerospace<\/strong> area, and 3 projects in the <strong>Healthcare<\/strong> area with the following objectives:<\/p>\n\n<ul class=\"wp-block-list\">\n<li>Promotion of technological and digital development in the industrial sector, with special emphasis on small and medium-sized enterprises;<\/li>\n\n\n\n<li>Encourage the transfer of technological solutions and innovation in production processes and\/or products and\/or business models resulting from the development, adoption and diffusion of technologies in the 4.0 sphere, consistent with the framework of interventions of the National Enterprise 4.0 Plan;<\/li>\n\n\n\n<li>Encourage collaboration between businesses and Cyber 4.0 to develop projects that meet the needs of innovation and competitiveness;<\/li>\n\n\n\n<li>Facilitate the exchange of knowledge and skills among enterprises and between enterprises and research organizations;<\/li>\n\n\n\n<li>To foster spillovers to the territory in terms of social, economic, environmental, labor and competitiveness impact of the Italian production system by increasing the technical-scientific content of products, processes and\/or services.<\/li>\n<\/ul>\n\n<p>Here is the list of winners:<\/p>\n\n<p>1\ufe0f\u20e3 SATML-B from <strong>DATRIX | AI solutions Group<\/strong><\/p>\n\n<p><em>Security, Reliability and Transparency of Machine Learning and Big Data analytics techniques<\/em> <\/p>\n\n<p>The proposed project builds on CybersecH, a Cyber 4.0-funded initiative that was successfully completed in February 2023 and led to the development of the modular AIA-Guard platform (aiaguard.com). This project aims to expand the functionality of the AIA-Guard platform by bringing the final TRL to 8 through three main initiatives assessed as strategic and with strong commercial potential. First, this will involve the expansion of the modules related to Adversarial attacks, the refinement of the AI Shield module, and the extension of the Data sanitization &amp; anonymization module. It needs to be kept in mind that considering the planned enhancements and extensions over what was developed in the previous CybersecH project, currently the solution at the beginning of the project has TRL 6.   <\/p>\n\n<p>2\ufe0f\u20e3 ARGO by <strong>Sistemi &amp; Automazione S.p.A.<\/strong><\/p>\n\n<p><em>Algorithms for Graph Search for dispersed data discovery on Open sources<\/em> <\/p>\n\n<p>Understanding Cyber Threat Intelligence (CTI) is a key aspect in the work of analysts who must build successful strategies to mitigate (ex-post) cyber attacks and provide decision support in a rapid and more informed way to implement new countermeasures. Thus, the fundamental principle in the development of Graph Search Algorithms for dispersed data discovery on Open cyber sources will be modularity and flexibility: A.R.G.O. will not rely on fixed analysis and visualizations, but will provide the ability to create clusters of interrelated nodes to solve the problem. The structure will ensure that a piece of data that has not been considered in the graph today will still be importable within A.R.G.O. and that analysis sets will always be extendable at will based on future user needs.  <\/p>\n\n<p>3\ufe0f\u20e3 ESII of <strong>Sharelock Ltd.<\/strong><\/p>\n\n<p><em>Early Security Incident Investigation<\/em> <\/p>\n\n<p>The solution proposes the integration of a specifically trained Large Language Model (LLM), which fits synergistically into the Sharelock ITDR and Sharelock CWP products to conduct investigations into the security alerts that the product produces. With the local LLM, it is possible to meet the challenges posed by the complexity of cyber threats, enabling detailed and timely investigations of individual or groups of anomalies. <\/p>\n\n<p>4\ufe0f\u20e3 CyberGuardEV by <strong>TME &#8211; Test and Manufacturing Engineering<\/strong> and <strong>Alfagreen Solutions<\/strong><\/p>\n\n<p><em>Integrated System for Information Security in Electric Vehicle Charging Stations<\/em> <\/p>\n\n<p>The main objective of the project is to develop an innovative electronic device capable of detecting and protecting electric vehicle charging stations from side-channel attacks. In fact, such systems are actually cyber-physical systems connected to communication networks for a variety of reasons, including station management, logging and transmission of electrical operating data related to vehicle charging operations (energy delivered, time profiles, etc.), as well as management of the HMI and economic transactions associated with its operation. Being systems connected to the data network and the power grid, as also highlighted in the industry literature, they lend themselves to various side-channel attachment surfaces.  <\/p>\n\n<p>5\ufe0f\u20e3 Cyborg by <strong>RadioLabs<\/strong> and <strong>DRIVESEC &#8211; We Secure Your Things<\/strong><\/p>\n\n<p><em>CYbersecure Block-chain based in-vehicle cOmmunications towaRd post quantum cryptoGraphy<\/em><\/p>\n\n<p>The CYBORG project, as a continuation and extension of the SHINE-ON (Secured HIgh accuracy localizatioN Equipment for automotive applicatioNs) project, aims to build a passive protection architecture from cyber attacks in the intra-vehicle environment with blockchain-based forensically relevant data authentication functions to robustly and accurately implement the vehicle localization function, which is essential for connected and autonomous driving that needs to be fail-operational and cyber-secure.<\/p>\n\n<p>6\ufe0f\u20e3 <strong>Iptsat<\/strong> Biosat Marketplace<\/p>\n\n<p><em>Satellite information system on-demand services &#8211; Biosat marketplace<\/em><\/p>\n\n<p>Biosat MP (market place) aims to help first the local PA and then the industry to bridge the gap between the potential usefulness of Earth Observation-derived products and the practical and operational information needs expressed by Italian Local Public Administrations. It promotes the use of Earth Observation-derived information products, primarily from ESA\/EU missions and the future IRIDE constellation, to raise awareness among target user communities of the applicability of Earth Observation services in their daily operations. The ultimate goal is the creation of a Marketplace with a set of predefined and operational services. The result will be to generate a secure, clear and rapid process for the provision of value-added services and data to PA.   <\/p>\n\n<p>7\ufe0f\u20e3 Wise Pack by <strong>Radio6sense<\/strong> and <strong>Gunpowder<\/strong><\/p>\n\n<p><em>Wireless In-package Sensors to protect the Pharmaceutical Industry against cyber-physical attacKs<\/em> <\/p>\n\n<p>Pharmaceutical plants and the entire supply chain, in the same way as other critical infrastructures such as data centers, power plants, and ICT networks, have now become potential targets of cyber-physical attacks. In this project, a monitoring and protection infrastructure against the aforementioned threats will be developed, which will be based on the synergistic integration of Internet of Things and Artificial Intelligence systems, overturning traditional monitoring paradigms. In fact, it will be the pharmaceutical product itself with its packaging that will detect the effects of process attacks or counterfeit actions by recording environmental anomalies within the packaging microenvironment, both during the production process and in the subsequent storage and quality control phases.  <\/p>\n\n<p>8\ufe0f\u20e3 HEALTH-e-DATA from <strong>Moveax<\/strong> and <strong>Exprivia<\/strong>.<\/p>\n\n<p><em>Data protection, development and implementation of technologies to preserve the security and confidentiality of sensitive data in advanced digital telemedicine applications, including through artificial intelligence techniques and blockchain technology  <\/em><\/p>\n\n<p>The Health-e-Data project, aims to explore and validate innovative technological elements essential to facilitate the management, exchange, and exploitation of health data-with a focus on data generated in a telemedicine and telemonitoring context. Health-e-Data aims to enable mobility of health data between different actors and with the involvement of citizens and patients, creating new models of trust building that can overcome the structural limitations of existing systems. At the same time, the project aims to validate from a scientific-technical point of view the use of artificial intelligence algorithms to facilitate the use of data through synthesizing processes, so that it can be made more easily available to developers.  <\/p>\n\n<p>9\ufe0f\u20e3 HERE-HomeRehab by <strong>Aenduo Ltd.<\/strong><\/p>\n\n<p><em>Home REhab<\/em> <\/p>\n\n<p>HomeRehab is a home-based respiratory rehabilitation solution based on a medical software device distributed as a mobile APP together with a physiotherapy exercise tool kit, enabling patients to carry out the rehabilitation pathway independently at home, but always supported by the support of a physiotherapist who supervises the sessions.<\/p>\n\n<p> <\/p>\n\n<p>Consulta tutti i dettagli dei progetti  nella sezione <a href=\"\/cyber40?page_id=3834\"><strong>Progetti Finanziati<\/strong>\u00a0<\/a><\/p>\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Published the 10 winners of Call 1-2023 active until last September. The initiative funds, for a total of 2.6 Million Euros in grants, 3 projects in the Cybersecurity core area, 3 projects in the Automotive area, 1 project in the&#8230;<\/p>\n","protected":false},"author":17,"featured_media":11515,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"iawp_total_views":15,"footnotes":""},"categories":[611],"tags":[],"class_list":["post-13104","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Online the results of the Call 1-2023 - Cyber 4.0<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyber40.it\/en\/online-the-results-of-the-call-1-2023\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Online the results of the Call 1-2023 - Cyber 4.0\" \/>\n<meta property=\"og:description\" content=\"Published the 10 winners of Call 1-2023 active until last September. The initiative funds, for a total of 2.6 Million Euros in grants, 3 projects in the Cybersecurity core area, 3 projects in the Automotive area, 1 project in the...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyber40.it\/en\/online-the-results-of-the-call-1-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber 4.0\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-03T10:31:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-16T09:33:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/04\/Bandi-mobile.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1527\" \/>\n\t<meta property=\"og:image:height\" content=\"747\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"giovanna buono\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"giovanna buono\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cyber40.it\/en\/online-the-results-of-the-call-1-2023\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/online-the-results-of-the-call-1-2023\/\"},\"author\":{\"name\":\"giovanna buono\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/d1cfb3a0a515988e98011798f5449a8f\"},\"headline\":\"Online the results of the Call 1-2023\",\"datePublished\":\"2024-04-03T10:31:52+00:00\",\"dateModified\":\"2025-05-16T09:33:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/online-the-results-of-the-call-1-2023\/\"},\"wordCount\":1216,\"publisher\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/online-the-results-of-the-call-1-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/04\/Bandi-mobile.png\",\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyber40.it\/en\/online-the-results-of-the-call-1-2023\/\",\"url\":\"https:\/\/www.cyber40.it\/en\/online-the-results-of-the-call-1-2023\/\",\"name\":\"Online the results of the Call 1-2023 - Cyber 4.0\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/online-the-results-of-the-call-1-2023\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/online-the-results-of-the-call-1-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/04\/Bandi-mobile.png\",\"datePublished\":\"2024-04-03T10:31:52+00:00\",\"dateModified\":\"2025-05-16T09:33:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/online-the-results-of-the-call-1-2023\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyber40.it\/en\/online-the-results-of-the-call-1-2023\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/online-the-results-of-the-call-1-2023\/#primaryimage\",\"url\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/04\/Bandi-mobile.png\",\"contentUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/04\/Bandi-mobile.png\",\"width\":1527,\"height\":747,\"caption\":\"Bandi mobile\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyber40.it\/en\/online-the-results-of-the-call-1-2023\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyber40.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Online the results of the Call 1-2023\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#website\",\"url\":\"https:\/\/www.cyber40.it\/en\/\",\"name\":\"Cyber 4.0\",\"description\":\"Strategie e Competenze per la Cyber Sicurezza\",\"publisher\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyber40.it\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\",\"name\":\"Cyber 4.0\",\"url\":\"https:\/\/www.cyber40.it\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png\",\"contentUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png\",\"width\":395,\"height\":122,\"caption\":\"Cyber 4.0\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/cyber40\/?originalSubdomain=it\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/d1cfb3a0a515988e98011798f5449a8f\",\"name\":\"giovanna buono\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d758a31e93ab06d8ab3b5b41bdff4da5d5780d654149caef42d4b264d3855724?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d758a31e93ab06d8ab3b5b41bdff4da5d5780d654149caef42d4b264d3855724?s=96&d=mm&r=g\",\"caption\":\"giovanna buono\"},\"sameAs\":[\"https:\/\/www.cyber40.it\/\"],\"url\":\"https:\/\/www.cyber40.it\/en\/author\/cyber40\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Online the results of the Call 1-2023 - Cyber 4.0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyber40.it\/en\/online-the-results-of-the-call-1-2023\/","og_locale":"en_US","og_type":"article","og_title":"Online the results of the Call 1-2023 - Cyber 4.0","og_description":"Published the 10 winners of Call 1-2023 active until last September. The initiative funds, for a total of 2.6 Million Euros in grants, 3 projects in the Cybersecurity core area, 3 projects in the Automotive area, 1 project in the...","og_url":"https:\/\/www.cyber40.it\/en\/online-the-results-of-the-call-1-2023\/","og_site_name":"Cyber 4.0","article_published_time":"2024-04-03T10:31:52+00:00","article_modified_time":"2025-05-16T09:33:07+00:00","og_image":[{"width":1527,"height":747,"url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/04\/Bandi-mobile.png","type":"image\/png"}],"author":"giovanna buono","twitter_card":"summary_large_image","twitter_misc":{"Written by":"giovanna buono","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyber40.it\/en\/online-the-results-of-the-call-1-2023\/#article","isPartOf":{"@id":"https:\/\/www.cyber40.it\/en\/online-the-results-of-the-call-1-2023\/"},"author":{"name":"giovanna buono","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/d1cfb3a0a515988e98011798f5449a8f"},"headline":"Online the results of the Call 1-2023","datePublished":"2024-04-03T10:31:52+00:00","dateModified":"2025-05-16T09:33:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyber40.it\/en\/online-the-results-of-the-call-1-2023\/"},"wordCount":1216,"publisher":{"@id":"https:\/\/www.cyber40.it\/en\/#organization"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/online-the-results-of-the-call-1-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/04\/Bandi-mobile.png","articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cyber40.it\/en\/online-the-results-of-the-call-1-2023\/","url":"https:\/\/www.cyber40.it\/en\/online-the-results-of-the-call-1-2023\/","name":"Online the results of the Call 1-2023 - Cyber 4.0","isPartOf":{"@id":"https:\/\/www.cyber40.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyber40.it\/en\/online-the-results-of-the-call-1-2023\/#primaryimage"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/online-the-results-of-the-call-1-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/04\/Bandi-mobile.png","datePublished":"2024-04-03T10:31:52+00:00","dateModified":"2025-05-16T09:33:07+00:00","breadcrumb":{"@id":"https:\/\/www.cyber40.it\/en\/online-the-results-of-the-call-1-2023\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyber40.it\/en\/online-the-results-of-the-call-1-2023\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/online-the-results-of-the-call-1-2023\/#primaryimage","url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/04\/Bandi-mobile.png","contentUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/04\/Bandi-mobile.png","width":1527,"height":747,"caption":"Bandi mobile"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyber40.it\/en\/online-the-results-of-the-call-1-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyber40.it\/en\/"},{"@type":"ListItem","position":2,"name":"Online the results of the Call 1-2023"}]},{"@type":"WebSite","@id":"https:\/\/www.cyber40.it\/en\/#website","url":"https:\/\/www.cyber40.it\/en\/","name":"Cyber 4.0","description":"Strategie e Competenze per la Cyber Sicurezza","publisher":{"@id":"https:\/\/www.cyber40.it\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyber40.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cyber40.it\/en\/#organization","name":"Cyber 4.0","url":"https:\/\/www.cyber40.it\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png","contentUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png","width":395,"height":122,"caption":"Cyber 4.0"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cyber40\/?originalSubdomain=it"]},{"@type":"Person","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/d1cfb3a0a515988e98011798f5449a8f","name":"giovanna buono","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d758a31e93ab06d8ab3b5b41bdff4da5d5780d654149caef42d4b264d3855724?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d758a31e93ab06d8ab3b5b41bdff4da5d5780d654149caef42d4b264d3855724?s=96&d=mm&r=g","caption":"giovanna buono"},"sameAs":["https:\/\/www.cyber40.it\/"],"url":"https:\/\/www.cyber40.it\/en\/author\/cyber40\/"}]}},"taxonomy_info":{"category":[{"value":611,"label":"News"}]},"featured_image_src_large":["https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/04\/Bandi-mobile-1024x501.png",1024,501,true],"author_info":{"display_name":"giovanna buono","author_link":"https:\/\/www.cyber40.it\/en\/author\/cyber40\/"},"comment_info":"","category_info":[{"term_id":611,"name":"News","slug":"news-en","term_group":0,"term_taxonomy_id":611,"taxonomy":"category","description":"","parent":0,"count":121,"filter":"raw","term_order":"0","cat_ID":611,"category_count":121,"category_description":"","cat_name":"News","category_nicename":"news-en","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts\/13104","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/comments?post=13104"}],"version-history":[{"count":0,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts\/13104\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/media\/11515"}],"wp:attachment":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/media?parent=13104"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/categories?post=13104"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/tags?post=13104"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}