{"id":2251,"date":"2018-11-28T11:39:00","date_gmt":"2018-11-28T10:39:00","guid":{"rendered":"https:\/\/axitea.borasolab.it\/blog\/infosecurity-una-previsione-a-medio-termine\/"},"modified":"2023-12-01T10:36:00","modified_gmt":"2023-12-01T09:36:00","slug":"infosecurity-una-previsione-a-medio-termine","status":"publish","type":"approfondimenti","link":"https:\/\/www.axitea.com\/it\/blog\/infosecurity-una-previsione-a-medio-termine\/","title":{"rendered":"Infosecurity: una previsione a medio termine"},"content":{"rendered":"<p>Fare previsioni \u00a0sul futuro \u00e8 un mestiere difficile, ma qualcuno deve farlo&#8230; Gartner aveva espresso un paio di anni fa \u00a0la seguente proiezione:&#8221;By 2020, 60% of enterprise information security budgets will be allocated for rapid detection and response approaches, which is an increase from less than 30% in 2016&#8243;.\u00a0Special Report: Cybersecurity at the Speed of Digital Business, Gartner.<\/p>\n<p>Vediamo di tradurre questa dichiarazione un po&#8217; inquietante in termini comprensibili.<\/p>\n<p>Definiamo intanto l&#8217;oggetto della dichiarazione: per &#8220;Rapid detection and response&#8221;, in ambito infosecurity, si intende la capacit\u00e0 di un&#8217;azienda di <strong>rilevare e bloccare in tempi rapidi un attacco<\/strong>.\u00a0Questo significa che l&#8217;azienda deve avere strumenti tecnici, operativi e organizzativi tali da accorgersi immediatamente,\u00a0o quasi, di essere sotto attacco e soprattutto di essere in grado di fermare l&#8217;azione offensiva. In realt\u00e0 il concetto di &#8220;risposta&#8221;\u00a0ad un attacco \u00e8 pi\u00f9 ampio di quanto sintetizzato, includendo anche le attivit\u00e0 di remediation, analisi forense, comunicazione agli stakeholders e alle terze parti, ecc&#8230;Si deve notare che qui non si parla di prevenzione, ovvero di preparazione PRIMA dell&#8217;eventuale attacco.<\/p>\n<p>Questo non significa che sia meno importante, anzi: <strong>una corretta e pianificata preparazione \u00e8 condizione necessaria (ma non sufficiente&#8230;) per impedire gli attacchi pi\u00f9 banali e limitare i danni<\/strong> nel caso di azioni offensive mirate.\u00a0Il punto importante \u00e8 per\u00f2 che la prevenzione non basta pi\u00f9 e che attualmente \u00e8 necessario avere capacit\u00e0 di reazione adeguate. Se suona un allarme e nessuno \u00e8 in grado di reagire prontamente \u00e8 anche poco utile tenersi in casa un imponente sistema di detection. La velocit\u00e0 di risposta \u00e8 essenziale nel mondo cyber, forse anche pi\u00f9 del mondo reale.<\/p>\n<p>Come \u00e8 possibile quindi abilitare l&#8217;azienda a questo tipo di esigenza? Non a caso negli ultimi anni si sono moltiplicati i fornitori di soluzione di sicurezza informatica, ma la soluzione non pu\u00f2 essere solamente tecnica. L&#8217;elemento umano \u00e8 indispensabile per l&#8217;analisi e la valutazione degli attacchi, ma soprattutto per attivare l&#8217;indispensabile fase di reazione e contenimento, che deve essere efficace e rapida.\u00a0In attesa che i sistemi di AI siano in grado di fare tutto questo, <strong>la soluzione migliore al momento \u00e8 poter contare su un team di specialisti che operi 24x7x365.\u00a0<\/strong>Soluzione forse onerosa, ma che spiega la previsione di Gartner&#8230;.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fare previsioni \u00a0sul futuro \u00e8 un mestiere difficile, ma qualcuno deve farlo&#8230; Gartner aveva espresso un paio di anni fa \u00a0la seguente proiezione:&#8221;By 2020, 60% of enterprise information security budgets will be allocated for rapid detection and response approaches, which is an increase from less than 30% in 2016&#8243;.\u00a0Special Report: Cybersecurity at the Speed of &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.axitea.com\/it\/blog\/infosecurity-una-previsione-a-medio-termine\/\"> <span class=\"screen-reader-text\">Infosecurity: una previsione a medio termine<\/span> Leggi tutto \u00bb<\/a><\/p>\n","protected":false},"author":12,"featured_media":2148,"parent":0,"template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"approfondimenti-categorie":[66],"approfondimenti-tag":[132],"class_list":["post-2251","approfondimenti","type-approfondimenti","status-publish","has-post-thumbnail","hentry","approfondimenti-categorie-sicurezza-informatica","approfondimenti-tag-security-experts"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Infosecurity: una previsione a medio termine | AXITEA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.axitea.com\/it\/blog\/infosecurity-una-previsione-a-medio-termine\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Infosecurity: una previsione a medio termine | AXITEA\" \/>\n<meta property=\"og:description\" content=\"Fare previsioni \u00a0sul futuro \u00e8 un mestiere difficile, ma qualcuno deve farlo&#8230; Gartner aveva espresso un paio di anni fa \u00a0la seguente proiezione:&#8221;By 2020, 60% of enterprise information security budgets will be allocated for rapid detection and response approaches, which is an increase from less than 30% in 2016&#8243;.\u00a0Special Report: Cybersecurity at the Speed of &hellip; Infosecurity: una previsione a medio termine Leggi tutto \u00bb\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.axitea.com\/it\/blog\/infosecurity-una-previsione-a-medio-termine\/\" \/>\n<meta property=\"og:site_name\" content=\"AXITEA\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-01T09:36:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/10\/tech-5090539_1280.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/blog\\\/infosecurity-una-previsione-a-medio-termine\\\/\",\"url\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/blog\\\/infosecurity-una-previsione-a-medio-termine\\\/\",\"name\":\"Infosecurity: una previsione a medio termine | AXITEA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/blog\\\/infosecurity-una-previsione-a-medio-termine\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/blog\\\/infosecurity-una-previsione-a-medio-termine\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.axitea.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/tech-5090539_1280.jpg\",\"datePublished\":\"2018-11-28T10:39:00+00:00\",\"dateModified\":\"2023-12-01T09:36:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/blog\\\/infosecurity-una-previsione-a-medio-termine\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.axitea.com\\\/it\\\/blog\\\/infosecurity-una-previsione-a-medio-termine\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/blog\\\/infosecurity-una-previsione-a-medio-termine\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.axitea.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/tech-5090539_1280.jpg\",\"contentUrl\":\"https:\\\/\\\/www.axitea.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/tech-5090539_1280.jpg\",\"width\":700,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/blog\\\/infosecurity-una-previsione-a-medio-termine\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Axitea\",\"item\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security\",\"item\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/blog\\\/sicurezza-informatica\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Infosecurity: una previsione a medio termine\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/#website\",\"url\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/\",\"name\":\"AXITEA\",\"description\":\"Security Evolution\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/#organization\",\"name\":\"Axitea\",\"url\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.axitea.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/logo-axitea-colore.svg\",\"contentUrl\":\"https:\\\/\\\/www.axitea.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/logo-axitea-colore.svg\",\"width\":515,\"height\":217,\"caption\":\"Axitea\"},\"image\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Infosecurity: una previsione a medio termine | AXITEA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.axitea.com\/it\/blog\/infosecurity-una-previsione-a-medio-termine\/","og_locale":"it_IT","og_type":"article","og_title":"Infosecurity: una previsione a medio termine | AXITEA","og_description":"Fare previsioni \u00a0sul futuro \u00e8 un mestiere difficile, ma qualcuno deve farlo&#8230; Gartner aveva espresso un paio di anni fa \u00a0la seguente proiezione:&#8221;By 2020, 60% of enterprise information security budgets will be allocated for rapid detection and response approaches, which is an increase from less than 30% in 2016&#8243;.\u00a0Special Report: Cybersecurity at the Speed of &hellip; Infosecurity: una previsione a medio termine Leggi tutto \u00bb","og_url":"https:\/\/www.axitea.com\/it\/blog\/infosecurity-una-previsione-a-medio-termine\/","og_site_name":"AXITEA","article_modified_time":"2023-12-01T09:36:00+00:00","og_image":[{"width":700,"height":350,"url":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/10\/tech-5090539_1280.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Tempo di lettura stimato":"2 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.axitea.com\/it\/blog\/infosecurity-una-previsione-a-medio-termine\/","url":"https:\/\/www.axitea.com\/it\/blog\/infosecurity-una-previsione-a-medio-termine\/","name":"Infosecurity: una previsione a medio termine | AXITEA","isPartOf":{"@id":"https:\/\/www.axitea.com\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.axitea.com\/it\/blog\/infosecurity-una-previsione-a-medio-termine\/#primaryimage"},"image":{"@id":"https:\/\/www.axitea.com\/it\/blog\/infosecurity-una-previsione-a-medio-termine\/#primaryimage"},"thumbnailUrl":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/10\/tech-5090539_1280.jpg","datePublished":"2018-11-28T10:39:00+00:00","dateModified":"2023-12-01T09:36:00+00:00","breadcrumb":{"@id":"https:\/\/www.axitea.com\/it\/blog\/infosecurity-una-previsione-a-medio-termine\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.axitea.com\/it\/blog\/infosecurity-una-previsione-a-medio-termine\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.axitea.com\/it\/blog\/infosecurity-una-previsione-a-medio-termine\/#primaryimage","url":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/10\/tech-5090539_1280.jpg","contentUrl":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/10\/tech-5090539_1280.jpg","width":700,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/www.axitea.com\/it\/blog\/infosecurity-una-previsione-a-medio-termine\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Axitea","item":"https:\/\/www.axitea.com\/it\/"},{"@type":"ListItem","position":2,"name":"Cyber Security","item":"https:\/\/www.axitea.com\/it\/blog\/sicurezza-informatica\/"},{"@type":"ListItem","position":3,"name":"Infosecurity: una previsione a medio termine"}]},{"@type":"WebSite","@id":"https:\/\/www.axitea.com\/it\/#website","url":"https:\/\/www.axitea.com\/it\/","name":"AXITEA","description":"Security Evolution","publisher":{"@id":"https:\/\/www.axitea.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.axitea.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.axitea.com\/it\/#organization","name":"Axitea","url":"https:\/\/www.axitea.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.axitea.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg","contentUrl":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg","width":515,"height":217,"caption":"Axitea"},"image":{"@id":"https:\/\/www.axitea.com\/it\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.axitea.com\/it\/wp-json\/wp\/v2\/approfondimenti\/2251","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.axitea.com\/it\/wp-json\/wp\/v2\/approfondimenti"}],"about":[{"href":"https:\/\/www.axitea.com\/it\/wp-json\/wp\/v2\/types\/approfondimenti"}],"author":[{"embeddable":true,"href":"https:\/\/www.axitea.com\/it\/wp-json\/wp\/v2\/users\/12"}],"version-history":[{"count":0,"href":"https:\/\/www.axitea.com\/it\/wp-json\/wp\/v2\/approfondimenti\/2251\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.axitea.com\/it\/wp-json\/wp\/v2\/media\/2148"}],"wp:attachment":[{"href":"https:\/\/www.axitea.com\/it\/wp-json\/wp\/v2\/media?parent=2251"}],"wp:term":[{"taxonomy":"approfondimenti-categorie","embeddable":true,"href":"https:\/\/www.axitea.com\/it\/wp-json\/wp\/v2\/approfondimenti-categorie?post=2251"},{"taxonomy":"approfondimenti-tag","embeddable":true,"href":"https:\/\/www.axitea.com\/it\/wp-json\/wp\/v2\/approfondimenti-tag?post=2251"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}