Redhotcyber<p>Perché un Data Breach fa bene! Riflessioni e provocazioni per una Italia che deve ripartire</p><p>Oggi esiste una <a href="https://mastodon.bida.im/tags/letteratura" class="mention hashtag" rel="tag">#<span>letteratura</span></a> sterminata su quelle che sono le buone <a href="https://mastodon.bida.im/tags/pratiche" class="mention hashtag" rel="tag">#<span>pratiche</span></a> di <a href="https://mastodon.bida.im/tags/sicurezza" class="mention hashtag" rel="tag">#<span>sicurezza</span></a> <a href="https://mastodon.bida.im/tags/informatica" class="mention hashtag" rel="tag">#<span>informatica</span></a>. Oltre a molte <a href="https://mastodon.bida.im/tags/normative" class="mention hashtag" rel="tag">#<span>normative</span></a> e <a href="https://mastodon.bida.im/tags/direttive" class="mention hashtag" rel="tag">#<span>direttive</span></a> che ci hanno insegnato importanti lezioni su come implementare e controllare una buona <a href="https://mastodon.bida.im/tags/postura" class="mention hashtag" rel="tag">#<span>postura</span></a> <a href="https://mastodon.bida.im/tags/cyber" class="mention hashtag" rel="tag">#<span>cyber</span></a>.</p><p>Scopriamo tutte queste considerazioni nell'articolo di Massimiliano Brolli. Perché tanto la cybersecurity la si paga sempre. E se non la paghi prima, la paghi dopo e il conto molto spesso e tanto, ma tanto più salato.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/perche-un-data-breach-fa-bene-riflessioni-e-provocazioni-per-una-italia-che-deve-ripartire/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/perche-un</span><span class="invisible">-data-breach-fa-bene-riflessioni-e-provocazioni-per-una-italia-che-deve-ripartire/</span></a></p>