{"id":29942,"date":"2022-10-10T11:38:13","date_gmt":"2022-10-10T11:38:13","guid":{"rendered":"https:\/\/wegg.it\/?p=29942"},"modified":"2024-02-02T09:37:27","modified_gmt":"2024-02-02T09:37:27","slug":"gestione-vulnerabilita-vantaggi-approccio-risk-based","status":"publish","type":"post","link":"https:\/\/wegg.it\/eng\/gestione-vulnerabilita-vantaggi-approccio-risk-based\/","title":{"rendered":"Vulnerability management: why a risk-based approach is more effective"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"29942\" class=\"elementor elementor-29942\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-53e0c95 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"53e0c95\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-531edbf\" data-id=\"531edbf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8bb2f54 elementor-hidden-mobile elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"8bb2f54\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"Livello_1\" x=\"0px\" y=\"0px\" viewBox=\"0 0 92.25 92.25\" style=\"enable-background:new 0 0 92.25 92.25;\" xml:space=\"preserve\"><polygon points=\"90.25,2.93 90.25,88.84 1.41,0 0,1.41 88.84,90.25 2.93,90.25 2.93,92.25 92.25,92.25 92.25,2.93 \"><\/polygon><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5ee191b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5ee191b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2c6e3a6\" data-id=\"2c6e3a6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-20926b3 elementor-widget elementor-widget-image\" data-id=\"20926b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"500\" src=\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/10\/conny-schneider-s8JOKMUiyo4--e1686910098920-1024x640.jpg\" class=\"attachment-large size-large wp-image-29944\" alt=\"\" srcset=\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/10\/conny-schneider-s8JOKMUiyo4--e1686910098920-1024x640.jpg 1024w, https:\/\/wegg.it\/wp-content\/uploads\/2022\/10\/conny-schneider-s8JOKMUiyo4--e1686910098920-300x188.jpg 300w, https:\/\/wegg.it\/wp-content\/uploads\/2022\/10\/conny-schneider-s8JOKMUiyo4--e1686910098920-768x480.jpg 768w, https:\/\/wegg.it\/wp-content\/uploads\/2022\/10\/conny-schneider-s8JOKMUiyo4--e1686910098920-18x12.jpg 18w, https:\/\/wegg.it\/wp-content\/uploads\/2022\/10\/conny-schneider-s8JOKMUiyo4--e1686910098920.jpg 1033w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-025de72 elementor-widget elementor-widget-post-info\" data-id=\"025de72\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-8dd652e elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t<a href=\"https:\/\/wegg.it\/eng\/2022\/10\/10\/\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>October 10, 2022<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3e7748 elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading\" data-id=\"a3e7748\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Gestione delle vulnerabilit\u00e0: perch\u00e9 un approccio risk-based \u00e8 pi\u00f9 efficace<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71e4747 elementor-widget elementor-widget-text-editor\" data-id=\"71e4747\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>L\u2019importanza di affidarsi a scoring come il Vulnerability Risk Rating<\/strong><\/p><p>Con <strong>214,2K<\/strong> vulnerabilit\u00e0 rilevate dal NDV, il <strong>database di riferimento per la gestione delle vulnerabilit\u00e0, <\/strong>i team IT intervistati dal nostro partner <strong>Ivanti<\/strong> hanno lamentato la <strong>complessit\u00e0<\/strong> (il 71%) e la <strong>mancanza di tempo<\/strong> (il 45%) nel dare seguito agli interventi di bonifica. \u00a0\u00a0<\/p><p>L\u2019<strong>NDV<\/strong>, che a sua volta \u00e8 alimentato dalle <strong>liste CVE (Common Vulnerabilities and Esposure)<\/strong> con informazioni sulle correzioni, i punteggi di gravit\u00e0 e le valutazioni di impatto, insieme alla <strong>CWE (Common Weakness Enumeration) <\/strong>\u00e8 una delle basi comuni utilizzate dalle aziende per la <strong>gestione del rischio<\/strong>.<\/p><p>Ma la maggior parte dei casi delle <strong>vulnerabilit\u00e0 rilevate<\/strong> non ha <strong>una minaccia associata alla scoperta. <\/strong>Se andiamo a vedere <strong>un<\/strong> <strong>report RiskSense del 2021<\/strong>, vediamo che di queste 214mila vulnerabilit\u00e0, circa 25mila di esse sono armate, 6mila presentano la possibilit\u00e0 di esecuzione remota di codici o escalation di privilegio, 243 sono legate a un ransomware ma solo 158 di esse sono legate a <strong>un trend di sfruttamento attivo. <\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a4c1281 elementor-widget elementor-widget-image\" data-id=\"a4c1281\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"298\" data-src=\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/10\/RiskSense-1-1024x382.png\" class=\"attachment-large size-large wp-image-29947 lazyload\" alt=\"\" data-srcset=\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/10\/RiskSense-1-1024x382.png 1024w, https:\/\/wegg.it\/wp-content\/uploads\/2022\/10\/RiskSense-1-300x112.png 300w, https:\/\/wegg.it\/wp-content\/uploads\/2022\/10\/RiskSense-1-768x287.png 768w, https:\/\/wegg.it\/wp-content\/uploads\/2022\/10\/RiskSense-1.png 1355w\" data-sizes=\"(max-width: 800px) 100vw, 800px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 800px; --smush-placeholder-aspect-ratio: 800\/298;\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aa7d08c elementor-widget elementor-widget-text-editor\" data-id=\"aa7d08c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2><strong>Perch\u00e9 \u00e8 importante conoscere il contesto<\/strong><\/h2><p>Per migliorare <strong>le strategie di correzione delle vulnerabilit\u00e0<\/strong>, non \u00e8 sufficiente conoscere l\u2019impatto di una vulnerabilit\u00e0 sui sistemi aziendali, ma bisogna anche <strong>determinare la probabilit\u00e0 che venga sfruttata<\/strong>.<\/p><p>Solo cos\u00ec \u00e8 possibile dare priorit\u00e0 alla gestione delle vulnerabilit\u00e0 <strong>in modo coerente<\/strong>: l\u2019approccio tradizionale, che opera in <strong>modo massivo<\/strong>, rischierebbe di dare precedenza a vulnerabilit\u00e0 esistenti che non rappresentano un pericolo immediato per l\u2019ambiente, a discapito di altre, <strong>ben pi\u00f9 pericolose<\/strong>. \u00a0<\/p><p>Il contesto di evoluzione delle minacce, infatti, \u00e8 <strong>in rapido mutamento<\/strong>: quante vulnerabilit\u00e0 meno note sono diventate improvvisamente <strong>oggetto di exploit<\/strong>, anche in conseguenza dell\u2019armamento di gruppi di hacker animati da interessi politici?<\/p><p>Prendiamo ad esempio <strong>CVE-2017-0144<\/strong>. Questa vulnerabilit\u00e0 \u00e8 associata al ransomware <strong>WannaCry <\/strong>che nel 2017 ha infettato oltre 200mila dispositivi in 100 paesi nel mondo. Rientra nella Top 40 CWE e nella Top10 di OWASP (Open Web Application Security Project) con un punteggio base di <strong>High 8.1.<\/strong> Il suo alto profilo e la sua minaccia di exploit avrebbero richiesto una riclassificazione in <strong>Critical 10 per poter intervenire immediatamente. <\/strong>\u00a0<\/p><p>Un <strong>approccio risk-based<\/strong> permetterebbe di aumentare la precisione degli interventi di rimediazione: la <strong>raccolta di informazioni<\/strong> e la <strong>valutazione del rischio attivo<\/strong> associato alla vulnerabilit\u00e0 consentirebbe di definire correttamente <strong>le priorit\u00e0<\/strong>.<\/p><h2><strong>Il Vulnerability Risk Rating<\/strong><\/h2><p>Abbiamo detto che<strong> intelligence e assegnazione di priorit\u00e0<\/strong> sono la chiave per essere sempre un passo avanti e mantenere il rischio a <strong>un livello gestibile per l\u2019organizzazione<\/strong>.<\/p><p>Servono per\u00f2 indicatori di valutazione efficaci, in grado di colmare le lacune dei database \u201cufficiali\u201d e misurare il rischio <strong>proattivamente e dinamicamente<\/strong> in tempo reale.<\/p><p>Per fornire un contesto aggiuntivo nel calcolo del rischio, noi ci affidiamo al <strong>VRR (Vulnerability Risk Rating),<\/strong> un algoritmo proprietario del nostro partner Ivanti che determina con precisione la <strong>probabilit\u00e0 di rischio<\/strong>.<\/p><p>Nell\u2019immagine sottostante presa da Ivanti, si vede la differenza nel rilevamento di vulnerabilit\u00e0 tra CVSS v3 e VRR: ci sono incongruenze evidenti nei numeri di <strong>vulnerabilit\u00e0 critiche ed elevate<\/strong> che potrebbero portare a tralasciare minacce reali nella protezione dei propri ambienti.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-717d7e9 elementor-widget elementor-widget-image\" data-id=\"717d7e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"451\" height=\"280\" data-src=\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/10\/Grafico.jpg\" class=\"attachment-large size-large wp-image-29951 lazyload\" alt=\"\" data-srcset=\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/10\/Grafico.jpg 451w, https:\/\/wegg.it\/wp-content\/uploads\/2022\/10\/Grafico-300x186.jpg 300w\" data-sizes=\"(max-width: 451px) 100vw, 451px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 451px; --smush-placeholder-aspect-ratio: 451\/280;\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6da3d72 elementor-widget elementor-widget-text-editor\" data-id=\"6da3d72\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Approfondiremo l\u2019importanza di un approccio risk-based nella gestione delle vulnerabilit\u00e0 e il funzionamento del VRR nel webinar \u201c<strong>Diamo priorit\u00e0 al rischio<\/strong>\u201d in programma per il 27 ottobre.<\/p><p>Vedremo in particolare <strong>come creare una<\/strong> <a href=\"https:\/\/wegg.it\/edge-intelligence-alleato-gestione-rischio\/\"><strong>base informativa dinamica<\/strong><\/a><em>\u00a0<\/em>e associarla correttamente alla <strong>gestione del rischio<\/strong> per poter intervenire rapidamente, anche con il supporto dell\u2019automazione.<\/p><p><strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0<a href=\"https:\/\/wegg.it\/priorita-rischio-strategie-strumenti-di-gestione-vulnerabilita\/\">ISCRIVITI AL WEBINAR<\/a><\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-d4c0349\" data-id=\"d4c0349\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-54a6278 elementor-widget elementor-widget-text-editor\" data-id=\"54a6278\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Approfondimenti<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6dceb23 elementor-grid-1 elementor-posts--thumbnail-none elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-widget elementor-widget-posts\" data-id=\"6dceb23\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;classic_columns&quot;:&quot;1&quot;,&quot;classic_columns_tablet&quot;:&quot;2&quot;,&quot;classic_columns_mobile&quot;:&quot;1&quot;,&quot;classic_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;classic_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;classic_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.classic\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-classic elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-37214 post type-post status-publish format-standard has-post-thumbnail hentry category-digital-service-experience category-live-event tag-aggiornamento-it tag-galleria-campari tag-ivanti-live\" role=\"listitem\">\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wegg.it\/eng\/wegg-sponsor-ivanti-live-per-futuro-it\/\" >\n\t\t\t\tPartecipa con WEGG all&#8217;Ivanti Live!\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-32106 post type-post status-publish format-standard has-post-thumbnail hentry category-approfondimenti category-asset-management category-gestione-budget-it category-riduzione-spesa-it\" role=\"listitem\">\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wegg.it\/eng\/licensing-java-2023-impatto-budget\/\" >\n\t\t\t\tPerch\u00e9 Java nel 2023 potrebbe distruggere il vostro budget software\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-36320 post type-post status-publish format-standard has-post-thumbnail hentry category-asset-intelligence category-asset-management category-monitoraggio-asset-it category-process-automation category-riduzione-attivita-manuali category-webinar tag-aitam tag-asset-it tag-automazione tag-excel tag-intelligenza-artificiale tag-it-asset-management tag-reportistica tag-sam\" role=\"listitem\">\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wegg.it\/eng\/excel-aitam-evoluzioni-ai-nella-gestione-asset-it\/\" >\n\t\t\t\tDa Excel all&#8217;AITAM: metodi innovativi per gestire i tuoi asset IT\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-42152 post type-post status-publish format-standard has-post-thumbnail hentry category-approfondimenti tag-assistenza-tecnica tag-customer-care tag-service-manager\" role=\"listitem\">\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wegg.it\/eng\/misurare-per-migliorare-il-nostro-approccio-alla-soddisfazione-del-cliente\/\" >\n\t\t\t\tMisurare per migliorare: il nostro approccio alla soddisfazione del cliente\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-39105 post type-post status-publish format-standard has-post-thumbnail hentry category-approfondimenti category-business-process-management category-cloud-management category-digitalizzazione-processi category-gestione-servizi-aziendali category-process-automation category-risk-avoidance category-spend-optimization tag-automazione-processi-aziendali tag-innovazione-aziendale-it tag-integrazione-tecnologie-moderne tag-iso-iec-15288 tag-iso-iec-15288-e-12207 tag-mendix\" role=\"listitem\">\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wegg.it\/eng\/low-code-e-gli-standard-iso-15288-e-12207-dal-foglio-bianco-a-soluzioni-digitali-di-qualita\/\" >\n\t\t\t\tLow-Code e gli standard ISO 15288\u202fe 12207: dal foglio bianco a soluzioni digitali di qualit\u00e0\u00a0\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-42053 post type-post status-publish format-standard has-post-thumbnail hentry category-digital-service-experience category-live-event tag-low-code tag-mendix\" role=\"listitem\">\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wegg.it\/eng\/partecipa-con-wegg-al-mendix-low-code-day-italy-2\/\" >\n\t\t\t\tPartecipa con WEGG al Mendix Low-Code Day Italy!\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bc87895 elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bc87895\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7e6f41e\" data-id=\"7e6f41e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-01244f8 elementor-widget elementor-widget-image\" data-id=\"01244f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" data-src=\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/04\/02-s-pattern02.png\" title=\"02-s pattern02\" alt=\"02-s pattern02\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 1655px; --smush-placeholder-aspect-ratio: 1655\/388;\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cb98fd6 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"cb98fd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"Livello_1\" x=\"0px\" y=\"0px\" viewBox=\"0 0 92.25 92.25\" style=\"enable-background:new 0 0 92.25 92.25;\" xml:space=\"preserve\"><polygon points=\"90.25,2.93 90.25,88.84 1.41,0 0,1.41 88.84,90.25 2.93,90.25 2.93,92.25 92.25,92.25 92.25,2.93 \"><\/polygon><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f32d69c elementor-widget elementor-widget-heading\" data-id=\"f32d69c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vorresti dare priorit\u00e0 al rischio con un approccio risk-based?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a20b313 elementor-widget elementor-widget-heading\" data-id=\"a20b313\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CONTATTACI PER APPROFONDIRE!<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe88395 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"fe88395\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-372754d elementor-button-align-center elementor-widget elementor-widget-form\" data-id=\"372754d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" name=\"Contattaci per una consulenza\" aria-label=\"Contattaci per una consulenza\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"29942\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"372754d\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"WEGG\" \/>\n\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-above\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-name\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tNome:\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-email elementor-col-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tCognome:\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-field_298f6a1 elementor-col-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_298f6a1\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tEmail aziendale:\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[field_298f6a1]\" id=\"form-field-field_298f6a1\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-tel elementor-field-group elementor-column elementor-field-group-field_fa5f1b6 elementor-col-50\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_fa5f1b6\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tNumero di Telefono:\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<input size=\"1\" type=\"tel\" name=\"form_fields[field_fa5f1b6]\" id=\"form-field-field_fa5f1b6\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" pattern=\"[0-9()#&amp;+*-=.]+\" title=\"Only numbers and phone characters (#, -, *, etc) are accepted.\">\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-field_c83c665 elementor-col-50\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_c83c665\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tRuolo aziendale:\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[field_c83c665]\" id=\"form-field-field_c83c665\" class=\"elementor-field elementor-size-sm  elementor-field-textual\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-textarea elementor-field-group elementor-column elementor-field-group-message elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-message\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tSpiegaci meglio la tua situazione:\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t<textarea class=\"elementor-field-textual elementor-field  elementor-size-sm\" name=\"form_fields[message]\" id=\"form-field-message\" rows=\"4\"><\/textarea>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-acceptance elementor-field-group elementor-column elementor-field-group-field_687c4cc elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t<div class=\"elementor-field-subgroup\">\n\t\t\t<span class=\"elementor-field-option\">\n\t\t\t\t<input type=\"checkbox\" name=\"form_fields[field_687c4cc]\" id=\"form-field-field_687c4cc\" class=\"elementor-field elementor-size-sm  elementor-acceptance-field\" required=\"required\" checked=\"checked\">\n\t\t\t\t<label for=\"form-field-field_687c4cc\">Ho preso visione dell'<a href=\"https:\/\/wegg.it\/privacy-policy\">informativa privacy<\/a> di WEGG e acconsento il trattamento dei miei dati.<\/label>\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-acceptance elementor-field-group elementor-column elementor-field-group-field_ea8ed71 elementor-col-100\">\n\t\t\t\t\t\t\t<div class=\"elementor-field-subgroup\">\n\t\t\t<span class=\"elementor-field-option\">\n\t\t\t\t<input type=\"checkbox\" name=\"form_fields[field_ea8ed71]\" id=\"form-field-field_ea8ed71\" class=\"elementor-field elementor-size-sm  elementor-acceptance-field\">\n\t\t\t\t<label for=\"form-field-field_ea8ed71\">Voglio rimanere in contatto con WEGG e ricevere contenuti gratuiti.<\/label>\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text\">\n\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[field_d2bf274]\" id=\"form-field-field_d2bf274\" class=\"elementor-field elementor-size-sm \" style=\"display:none !important;\">\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-sm\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Invia<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Quali sono i vantaggi di un approccio risk-based nella gestione delle vulnerabilit\u00e0 dei dispositivi aziendali?<\/p>","protected":false},"author":8828,"featured_media":29944,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[14,71,73,72],"tags":[78,184,183,127],"class_list":["post-29942","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-approfondimenti","category-work-from-anywhere","category-workplace-intelligence","category-workplace-security","tag-everywhere-workplace","tag-gestione-del-rischio","tag-risk-based-management","tag-workplace-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Gestione delle vulnerabilit\u00e0: perch\u00e9 un approccio risk-based \u00e8 pi\u00f9 efficace - WEGG<\/title>\n<meta name=\"description\" content=\"Quali sono i vantaggi di un approccio risk-based nella gestione delle vulnerabilit\u00e0 dei dispositivi aziendali?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wegg.it\/eng\/gestione-vulnerabilita-vantaggi-approccio-risk-based\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gestione delle vulnerabilit\u00e0: perch\u00e9 un approccio risk-based \u00e8 pi\u00f9 efficace - WEGG\" \/>\n<meta property=\"og:description\" content=\"Quali sono i vantaggi di un approccio risk-based nella gestione delle vulnerabilit\u00e0 dei dispositivi aziendali?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wegg.it\/eng\/gestione-vulnerabilita-vantaggi-approccio-risk-based\/\" \/>\n<meta property=\"og:site_name\" content=\"WEGG\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-10T11:38:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-02T09:37:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/10\/conny-schneider-s8JOKMUiyo4--e1686910098920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1033\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Camilla Bottin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Camilla Bottin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/wegg.it\/gestione-vulnerabilita-vantaggi-approccio-risk-based\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/wegg.it\/gestione-vulnerabilita-vantaggi-approccio-risk-based\/\"},\"author\":{\"name\":\"Camilla Bottin\",\"@id\":\"https:\/\/www.wegg.it\/#\/schema\/person\/24198ae076770466cc8f909ad75bea89\"},\"headline\":\"Gestione delle vulnerabilit\u00e0: perch\u00e9 un approccio risk-based \u00e8 pi\u00f9 efficace\",\"datePublished\":\"2022-10-10T11:38:13+00:00\",\"dateModified\":\"2024-02-02T09:37:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/wegg.it\/gestione-vulnerabilita-vantaggi-approccio-risk-based\/\"},\"wordCount\":574,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.wegg.it\/#organization\"},\"image\":{\"@id\":\"https:\/\/wegg.it\/gestione-vulnerabilita-vantaggi-approccio-risk-based\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/10\/conny-schneider-s8JOKMUiyo4--e1686910098920.jpg\",\"keywords\":[\"everywhere workplace\",\"gestione del rischio\",\"risk-based management\",\"workplace security\"],\"articleSection\":[\"Approfondimenti\",\"Work From Anywhere\",\"Workplace Intelligence\",\"Workplace Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/wegg.it\/gestione-vulnerabilita-vantaggi-approccio-risk-based\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/wegg.it\/gestione-vulnerabilita-vantaggi-approccio-risk-based\/\",\"url\":\"https:\/\/wegg.it\/gestione-vulnerabilita-vantaggi-approccio-risk-based\/\",\"name\":\"Gestione delle vulnerabilit\u00e0: perch\u00e9 un approccio risk-based \u00e8 pi\u00f9 efficace - WEGG\",\"isPartOf\":{\"@id\":\"https:\/\/www.wegg.it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/wegg.it\/gestione-vulnerabilita-vantaggi-approccio-risk-based\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/wegg.it\/gestione-vulnerabilita-vantaggi-approccio-risk-based\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/10\/conny-schneider-s8JOKMUiyo4--e1686910098920.jpg\",\"datePublished\":\"2022-10-10T11:38:13+00:00\",\"dateModified\":\"2024-02-02T09:37:27+00:00\",\"description\":\"Quali sono i vantaggi di un approccio risk-based nella gestione delle vulnerabilit\u00e0 dei dispositivi aziendali?\",\"breadcrumb\":{\"@id\":\"https:\/\/wegg.it\/gestione-vulnerabilita-vantaggi-approccio-risk-based\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/wegg.it\/gestione-vulnerabilita-vantaggi-approccio-risk-based\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/wegg.it\/gestione-vulnerabilita-vantaggi-approccio-risk-based\/#primaryimage\",\"url\":\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/10\/conny-schneider-s8JOKMUiyo4--e1686910098920.jpg\",\"contentUrl\":\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/10\/conny-schneider-s8JOKMUiyo4--e1686910098920.jpg\",\"width\":1033,\"height\":646},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/wegg.it\/gestione-vulnerabilita-vantaggi-approccio-risk-based\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/wegg.it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gestione delle vulnerabilit\u00e0: perch\u00e9 un approccio risk-based \u00e8 pi\u00f9 efficace\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.wegg.it\/#website\",\"url\":\"https:\/\/www.wegg.it\/\",\"name\":\"WEGG\",\"description\":\"The Impact factory\",\"publisher\":{\"@id\":\"https:\/\/www.wegg.it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.wegg.it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.wegg.it\/#organization\",\"name\":\"WEGG\",\"url\":\"https:\/\/www.wegg.it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.wegg.it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/03\/cropped-WEGG-marchio-RGB.png\",\"contentUrl\":\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/03\/cropped-WEGG-marchio-RGB.png\",\"width\":968,\"height\":236,\"caption\":\"WEGG\"},\"image\":{\"@id\":\"https:\/\/www.wegg.it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/it.linkedin.com\/company\/wegg-theimpactfactory\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.wegg.it\/#\/schema\/person\/24198ae076770466cc8f909ad75bea89\",\"name\":\"Camilla Bottin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.wegg.it\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4dfdf1e48dfe6958209ecc04d673e37c0e6743fb4c85ab6199ed40cd200097de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4dfdf1e48dfe6958209ecc04d673e37c0e6743fb4c85ab6199ed40cd200097de?s=96&d=mm&r=g\",\"caption\":\"Camilla Bottin\"},\"url\":\"https:\/\/wegg.it\/eng\/author\/cbottin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Gestione delle vulnerabilit\u00e0: perch\u00e9 un approccio risk-based \u00e8 pi\u00f9 efficace - WEGG","description":"Quali sono i vantaggi di un approccio risk-based nella gestione delle vulnerabilit\u00e0 dei dispositivi aziendali?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wegg.it\/eng\/gestione-vulnerabilita-vantaggi-approccio-risk-based\/","og_locale":"en_US","og_type":"article","og_title":"Gestione delle vulnerabilit\u00e0: perch\u00e9 un approccio risk-based \u00e8 pi\u00f9 efficace - WEGG","og_description":"Quali sono i vantaggi di un approccio risk-based nella gestione delle vulnerabilit\u00e0 dei dispositivi aziendali?","og_url":"https:\/\/wegg.it\/eng\/gestione-vulnerabilita-vantaggi-approccio-risk-based\/","og_site_name":"WEGG","article_published_time":"2022-10-10T11:38:13+00:00","article_modified_time":"2024-02-02T09:37:27+00:00","og_image":[{"width":1033,"height":646,"url":"https:\/\/wegg.it\/wp-content\/uploads\/2022\/10\/conny-schneider-s8JOKMUiyo4--e1686910098920.jpg","type":"image\/jpeg"}],"author":"Camilla Bottin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Camilla Bottin","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/wegg.it\/gestione-vulnerabilita-vantaggi-approccio-risk-based\/#article","isPartOf":{"@id":"https:\/\/wegg.it\/gestione-vulnerabilita-vantaggi-approccio-risk-based\/"},"author":{"name":"Camilla Bottin","@id":"https:\/\/www.wegg.it\/#\/schema\/person\/24198ae076770466cc8f909ad75bea89"},"headline":"Gestione delle vulnerabilit\u00e0: perch\u00e9 un approccio risk-based \u00e8 pi\u00f9 efficace","datePublished":"2022-10-10T11:38:13+00:00","dateModified":"2024-02-02T09:37:27+00:00","mainEntityOfPage":{"@id":"https:\/\/wegg.it\/gestione-vulnerabilita-vantaggi-approccio-risk-based\/"},"wordCount":574,"commentCount":0,"publisher":{"@id":"https:\/\/www.wegg.it\/#organization"},"image":{"@id":"https:\/\/wegg.it\/gestione-vulnerabilita-vantaggi-approccio-risk-based\/#primaryimage"},"thumbnailUrl":"https:\/\/wegg.it\/wp-content\/uploads\/2022\/10\/conny-schneider-s8JOKMUiyo4--e1686910098920.jpg","keywords":["everywhere workplace","gestione del rischio","risk-based management","workplace security"],"articleSection":["Approfondimenti","Work From Anywhere","Workplace Intelligence","Workplace Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/wegg.it\/gestione-vulnerabilita-vantaggi-approccio-risk-based\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/wegg.it\/gestione-vulnerabilita-vantaggi-approccio-risk-based\/","url":"https:\/\/wegg.it\/gestione-vulnerabilita-vantaggi-approccio-risk-based\/","name":"Gestione delle vulnerabilit\u00e0: perch\u00e9 un approccio risk-based \u00e8 pi\u00f9 efficace - WEGG","isPartOf":{"@id":"https:\/\/www.wegg.it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wegg.it\/gestione-vulnerabilita-vantaggi-approccio-risk-based\/#primaryimage"},"image":{"@id":"https:\/\/wegg.it\/gestione-vulnerabilita-vantaggi-approccio-risk-based\/#primaryimage"},"thumbnailUrl":"https:\/\/wegg.it\/wp-content\/uploads\/2022\/10\/conny-schneider-s8JOKMUiyo4--e1686910098920.jpg","datePublished":"2022-10-10T11:38:13+00:00","dateModified":"2024-02-02T09:37:27+00:00","description":"Quali sono i vantaggi di un approccio risk-based nella gestione delle vulnerabilit\u00e0 dei dispositivi aziendali?","breadcrumb":{"@id":"https:\/\/wegg.it\/gestione-vulnerabilita-vantaggi-approccio-risk-based\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wegg.it\/gestione-vulnerabilita-vantaggi-approccio-risk-based\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wegg.it\/gestione-vulnerabilita-vantaggi-approccio-risk-based\/#primaryimage","url":"https:\/\/wegg.it\/wp-content\/uploads\/2022\/10\/conny-schneider-s8JOKMUiyo4--e1686910098920.jpg","contentUrl":"https:\/\/wegg.it\/wp-content\/uploads\/2022\/10\/conny-schneider-s8JOKMUiyo4--e1686910098920.jpg","width":1033,"height":646},{"@type":"BreadcrumbList","@id":"https:\/\/wegg.it\/gestione-vulnerabilita-vantaggi-approccio-risk-based\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wegg.it\/"},{"@type":"ListItem","position":2,"name":"Gestione delle vulnerabilit\u00e0: perch\u00e9 un approccio risk-based \u00e8 pi\u00f9 efficace"}]},{"@type":"WebSite","@id":"https:\/\/www.wegg.it\/#website","url":"https:\/\/www.wegg.it\/","name":"WEGG","description":"The Impact factory","publisher":{"@id":"https:\/\/www.wegg.it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wegg.it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.wegg.it\/#organization","name":"WEGG","url":"https:\/\/www.wegg.it\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.wegg.it\/#\/schema\/logo\/image\/","url":"https:\/\/wegg.it\/wp-content\/uploads\/2022\/03\/cropped-WEGG-marchio-RGB.png","contentUrl":"https:\/\/wegg.it\/wp-content\/uploads\/2022\/03\/cropped-WEGG-marchio-RGB.png","width":968,"height":236,"caption":"WEGG"},"image":{"@id":"https:\/\/www.wegg.it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/it.linkedin.com\/company\/wegg-theimpactfactory"]},{"@type":"Person","@id":"https:\/\/www.wegg.it\/#\/schema\/person\/24198ae076770466cc8f909ad75bea89","name":"Camilla Bottin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.wegg.it\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4dfdf1e48dfe6958209ecc04d673e37c0e6743fb4c85ab6199ed40cd200097de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4dfdf1e48dfe6958209ecc04d673e37c0e6743fb4c85ab6199ed40cd200097de?s=96&d=mm&r=g","caption":"Camilla Bottin"},"url":"https:\/\/wegg.it\/eng\/author\/cbottin\/"}]}},"_links":{"self":[{"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/posts\/29942","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/users\/8828"}],"replies":[{"embeddable":true,"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/comments?post=29942"}],"version-history":[{"count":18,"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/posts\/29942\/revisions"}],"predecessor-version":[{"id":36611,"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/posts\/29942\/revisions\/36611"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/media\/29944"}],"wp:attachment":[{"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/media?parent=29942"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/categories?post=29942"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/tags?post=29942"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}