{"id":393,"date":"2015-05-18T10:49:15","date_gmt":"2015-05-18T08:49:15","guid":{"rendered":"https:\/\/dev.sicherheitsforum.ch\/?p=393"},"modified":"2023-03-14T08:57:40","modified_gmt":"2023-03-14T07:57:40","slug":"cyberangriffe-haeufiger-und-folgenschwerer","status":null,"type":"post","link":"https:\/\/news.save.ch\/it\/cyberangriffe-haeufiger-und-folgenschwerer\/","title":{"rendered":"Attacchi informatici: pi\u00f9 frequenti e pi\u00f9 gravi"},"content":{"rendered":"<figure id=\"attachment_394\" aria-describedby=\"caption-attachment-394\" style=\"width: 680px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-394\" src=\"https:\/\/sicherheitsforum.ch\/wp-content\/uploads\/2016\/12\/Cyberangriffe-h\u00e4ufiger-und-folgenschwerer-it-security.jpg\" alt=\"Gli attacchi informatici possono essere costosi.\" width=\"680\" height=\"553\" \/><figcaption id=\"caption-attachment-394\" class=\"wp-caption-text\">Gli attacchi informatici possono essere costosi.<\/figcaption><\/figure>\n<p>In futuro, la frequenza e la portata degli attacchi informatici continueranno ad aumentare, come scrive la societ\u00e0 di consulenza. Per ridurre al minimo i rischi, \u00e8 consigliabile adottare un approccio olistico alla sicurezza delle informazioni. <a href=\"https:\/\/www.atkearney.ch\/strategic-it\/featured-article\/-\/asset_publisher\/BqWAk3NLsZIU\/content\/information-security-its-all-about-trust\/10192\" target=\"_blank\" data-cke-saved-href=\"https:\/\/www.atkearney.ch\/strategic-it\/featured-article\/-\/asset_publisher\/BqWAk3NLsZIU\/content\/information-security-its-all-about-trust\/10192\" rel=\"noopener\">in cinque dimensioni<\/a> per indirizzare: Strategia, organizzazione, processi, tecnologia e cultura.<\/p>\n<p>\"Prima di tutto, le aziende devono capire che i rischi per la sicurezza delle informazioni sono rischi aziendali. La responsabilit\u00e0 della gestione di questi rischi spetta al management dell'azienda, non al reparto IT o al CIO\", spiega Michael R\u00f6mer, Partner di A.T. Kearney e responsabile del Digital Business Consulting in Europa.<\/p>\n<p>I metodi di attacco alla sicurezza delle informazioni cambierebbero rapidamente, mentre il rischio e i costi conseguenti a misure di sicurezza inadeguate continuerebbero a crescere. \"Il prossimo attacco informatico \u00e8 difficile da prevedere come il prossimo terremoto, ma stanno emergendo alcune tendenze. Il costo stimato degli attacchi riusciti \u00e8 compreso tra i 400 e i 2.200 miliardi di dollari USA all'anno in tutto il mondo. Ci\u00f2 equivale all'incirca al prodotto interno lordo dell'Austria e del Brasile rispettivamente, e le conseguenze a lungo termine, come il danno d'immagine dovuto alla perdita di fiducia, difficilmente possono essere prese in considerazione in modo adeguato\", afferma Boris Piwinger, senior manager e responsabile della divisione di consulenza sulla sicurezza informatica di A.T. Kearney.<\/p>\n<p>Con la crescente digitalizzazione e le inevitabili violazioni della sicurezza che ne derivano, aumenteranno anche la portata e la frequenza degli attacchi. Piwinger vede in particolare le seguenti tendenze:<\/p>\n<ul>\n<li>monitoraggio globale<\/li>\n<li>Indebolimento mirato della tecnologia di sicurezza informatica<\/li>\n<li>Offerte di attacco come servizio (AaaS)<\/li>\n<li>attacchi massicci alle infrastrutture<\/li>\n<li>sistemi di controllo industriale<\/li>\n<\/ul>\n<p>Anche il ricatto \u00e8 un possibile modello di business degli aggressori. Hanno minacciato di gonfiare in modo massiccio un danno precedentemente credibile fino al pagamento del \"riscatto\", come sottolineato.<\/p>\n<p><strong>Come ridurre al minimo i rischi per la sicurezza?<\/strong><\/p>\n<p>Lo studio dimostra che le aziende esemplari in materia di sicurezza delle informazioni affrontano costantemente cinque aree per ridurre al minimo i rischi:<\/p>\n<ul>\n<li>Strategia<\/li>\n<li>Organizzazione<\/li>\n<li>Processi<\/li>\n<li>Tecnologia<\/li>\n<li>La cultura<\/li>\n<\/ul>\n<p>\"I problemi di sicurezza sono raramente dovuti a difetti in una sola di queste aree. Gli hacker di successo in genere utilizzano una combinazione di diverse vulnerabilit\u00e0\", spiega Piwinger.<\/p>\n<p>\"Le aziende che vogliono ridurre al minimo i rischi per la sicurezza hanno bisogno di una strategia di sicurezza strettamente legata alla strategia aziendale, di un assetto organizzativo equilibrato in cui sia possibile gestire decisioni difficili, di processi ben ponderati e praticati per la valutazione e la gestione dei rischi, di un uso efficiente della tecnologia e, soprattutto, di una forte cultura aziendale che percepisca la sicurezza delle informazioni come una proposta di valore e un compito condiviso dall'intera organizzazione\", conclude Michael R\u00f6mer.<\/p>","protected":false},"excerpt":{"rendered":"<p>In Zukunft werden die Frequenz und das Ausmass an Cyberattacken weiter ansteigen, wie die Unternehmensberatung schreibt. Um Risiken zu minimieren, empfiehlt es sich, Informationssicherheit ganzheitlich in f\u00fcnf Dimensionen zu adressieren: Strategie, Organisation, Prozesse, Technologie und Kultur. \u201eZun\u00e4chst einmal m\u00fcssen Unternehmen verstehen, dass Informationssicherheitsrisiken Gesch\u00e4ftsrisiken sind. Die Verantwortung f\u00fcr das Management dieser Risiken liegt bei der [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":394,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[3313],"tags":[96,62,63],"class_list":["post-393","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisierung","tag-cyber-crime","tag-ict-sicherheit","tag-it-security"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":{"widget_title":"","widget_tags":""},"_at_widget":"1","_yoast_wpseo_primary_category":"2","_yoast_wpseo_focuskw_text_input":"Cyberangriffe","_yoast_wpseo_opengraph-image":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Cyberangriffe-h\u00e4ufiger-und-folgenschwerer-it-security.jpg","_yoast_wpseo_opengraph-description":"Unternehmen untersch\u00e4tzen die Gefahr durch Cyberattacken laut einer Studie der Unternehmensberatung A.T. Kearney. Das kann teuer werden: Die Sch\u00e4tzungen einschl\u00e4giger Institutionen zum weltweiten Schaden liegen zwischen 400 Milliarden und 2,2 Billionen US-Dollar. Hinzu kommen Imagesch\u00e4den und Vertrauensverluste.","_yoast_wpseo_opengraph-title":"Cyberangriffe","enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyberangriffe: h\u00e4ufiger und folgenschwerer - Save<\/title>\n<meta name=\"description\" content=\"Cyberangriffe: Unternehmen untersch\u00e4tzen die Gefahr durch Cyberattacken laut einer Studie der Unternehmensberatung A.T. Kearney.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/it\/cyberangriffe-haeufiger-und-folgenschwerer\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberangriffe\" \/>\n<meta property=\"og:description\" content=\"Unternehmen untersch\u00e4tzen die Gefahr durch Cyberattacken laut einer Studie der Unternehmensberatung A.T. Kearney. Das kann teuer werden: Die Sch\u00e4tzungen einschl\u00e4giger Institutionen zum weltweiten Schaden liegen zwischen 400 Milliarden und 2,2 Billionen US-Dollar. Hinzu kommen Imagesch\u00e4den und Vertrauensverluste.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/it\/cyberangriffe-haeufiger-und-folgenschwerer\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2015-05-18T08:49:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-14T07:57:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Cyberangriffe-h\u00e4ufiger-und-folgenschwerer-it-security.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/cyberangriffe-haeufiger-und-folgenschwerer\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/cyberangriffe-haeufiger-und-folgenschwerer\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d49e199490bad7c70d64b9ab51142f2b\"},\"headline\":\"Cyberangriffe: h\u00e4ufiger und folgenschwerer\",\"datePublished\":\"2015-05-18T08:49:15+00:00\",\"dateModified\":\"2023-03-14T07:57:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/cyberangriffe-haeufiger-und-folgenschwerer\\\/\"},\"wordCount\":396,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/cyberangriffe-haeufiger-und-folgenschwerer\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Cyberangriffe-haeufiger-und-folgenschwerer-it-security-scaled.jpg\",\"keywords\":[\"Cyber-Crime\",\"ICT-Sicherheit\",\"IT-SECURITY\"],\"articleSection\":[\"DIGITALISIERUNG\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/cyberangriffe-haeufiger-und-folgenschwerer\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/cyberangriffe-haeufiger-und-folgenschwerer\\\/\",\"name\":\"Cyberangriffe: h\u00e4ufiger und folgenschwerer - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/cyberangriffe-haeufiger-und-folgenschwerer\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/cyberangriffe-haeufiger-und-folgenschwerer\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Cyberangriffe-haeufiger-und-folgenschwerer-it-security-scaled.jpg\",\"datePublished\":\"2015-05-18T08:49:15+00:00\",\"dateModified\":\"2023-03-14T07:57:40+00:00\",\"description\":\"Cyberangriffe: Unternehmen untersch\u00e4tzen die Gefahr durch Cyberattacken laut einer Studie der Unternehmensberatung A.T. Kearney.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/cyberangriffe-haeufiger-und-folgenschwerer\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/cyberangriffe-haeufiger-und-folgenschwerer\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/cyberangriffe-haeufiger-und-folgenschwerer\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Cyberangriffe-haeufiger-und-folgenschwerer-it-security-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Cyberangriffe-haeufiger-und-folgenschwerer-it-security-scaled.jpg\",\"width\":1400,\"height\":1139,\"caption\":\"Cyberattacken k\u00f6nnen teuer ausfallen.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/cyberangriffe-haeufiger-und-folgenschwerer\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyberangriffe: h\u00e4ufiger und folgenschwerer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d49e199490bad7c70d64b9ab51142f2b\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/develop.organisator.galledia.ch\"],\"url\":\"https:\\\/\\\/news.save.ch\\\/it\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Attacchi informatici: pi\u00f9 frequenti e pi\u00f9 gravi - Save","description":"Attacchi informatici: le aziende sottovalutano il pericolo rappresentato dagli attacchi informatici, secondo uno studio della societ\u00e0 di consulenza manageriale A.T. Kearney.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/it\/cyberangriffe-haeufiger-und-folgenschwerer\/","og_locale":"it_IT","og_type":"article","og_title":"Cyberangriffe","og_description":"Unternehmen untersch\u00e4tzen die Gefahr durch Cyberattacken laut einer Studie der Unternehmensberatung A.T. Kearney. Das kann teuer werden: Die Sch\u00e4tzungen einschl\u00e4giger Institutionen zum weltweiten Schaden liegen zwischen 400 Milliarden und 2,2 Billionen US-Dollar. Hinzu kommen Imagesch\u00e4den und Vertrauensverluste.","og_url":"https:\/\/news.save.ch\/it\/cyberangriffe-haeufiger-und-folgenschwerer\/","og_site_name":"Save","article_published_time":"2015-05-18T08:49:15+00:00","article_modified_time":"2023-03-14T07:57:40+00:00","og_image":[{"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Cyberangriffe-h\u00e4ufiger-und-folgenschwerer-it-security.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"admin","Tempo di lettura stimato":"2 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/cyberangriffe-haeufiger-und-folgenschwerer\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/cyberangriffe-haeufiger-und-folgenschwerer\/"},"author":{"name":"admin","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d49e199490bad7c70d64b9ab51142f2b"},"headline":"Cyberangriffe: h\u00e4ufiger und folgenschwerer","datePublished":"2015-05-18T08:49:15+00:00","dateModified":"2023-03-14T07:57:40+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/cyberangriffe-haeufiger-und-folgenschwerer\/"},"wordCount":396,"commentCount":0,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/cyberangriffe-haeufiger-und-folgenschwerer\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Cyberangriffe-haeufiger-und-folgenschwerer-it-security-scaled.jpg","keywords":["Cyber-Crime","ICT-Sicherheit","IT-SECURITY"],"articleSection":["DIGITALISIERUNG"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/cyberangriffe-haeufiger-und-folgenschwerer\/","url":"https:\/\/news.save.ch\/cyberangriffe-haeufiger-und-folgenschwerer\/","name":"Attacchi informatici: pi\u00f9 frequenti e pi\u00f9 gravi - Save","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/cyberangriffe-haeufiger-und-folgenschwerer\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/cyberangriffe-haeufiger-und-folgenschwerer\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Cyberangriffe-haeufiger-und-folgenschwerer-it-security-scaled.jpg","datePublished":"2015-05-18T08:49:15+00:00","dateModified":"2023-03-14T07:57:40+00:00","description":"Attacchi informatici: le aziende sottovalutano il pericolo rappresentato dagli attacchi informatici, secondo uno studio della societ\u00e0 di consulenza manageriale A.T. Kearney.","breadcrumb":{"@id":"https:\/\/news.save.ch\/cyberangriffe-haeufiger-und-folgenschwerer\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/cyberangriffe-haeufiger-und-folgenschwerer\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/news.save.ch\/cyberangriffe-haeufiger-und-folgenschwerer\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Cyberangriffe-haeufiger-und-folgenschwerer-it-security-scaled.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Cyberangriffe-haeufiger-und-folgenschwerer-it-security-scaled.jpg","width":1400,"height":1139,"caption":"Cyberattacken k\u00f6nnen teuer ausfallen."},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/cyberangriffe-haeufiger-und-folgenschwerer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"Cyberangriffe: h\u00e4ufiger und folgenschwerer"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Risparmiare","description":"Rivista svizzera specializzata in sicurezza","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Forum sulla sicurezza","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d49e199490bad7c70d64b9ab51142f2b","name":"amministratore","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/develop.organisator.galledia.ch"],"url":"https:\/\/news.save.ch\/it\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/posts\/393","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/comments?post=393"}],"version-history":[{"count":1,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/posts\/393\/revisions"}],"predecessor-version":[{"id":17790,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/posts\/393\/revisions\/17790"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/media\/394"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/media?parent=393"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/categories?post=393"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/tags?post=393"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}