{"id":2622,"date":"2024-12-02T11:12:12","date_gmt":"2024-12-02T10:12:12","guid":{"rendered":"https:\/\/ukotek.com\/?p=2622"},"modified":"2024-12-02T15:35:40","modified_gmt":"2024-12-02T14:35:40","slug":"blue-report-2024-picus-security-gestion-de-exposicion-a-amenazas","status":"publish","type":"post","link":"https:\/\/ukotek.com\/it\/blue-report-2024-picus-security-gestion-de-exposicion-a-amenazas\/","title":{"rendered":"Blue Report 2024: Gestire l'esposizione alle minacce nel mondo digitale"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"2622\" class=\"elementor elementor-2622\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d3586e1 e-flex e-con-boxed e-con e-parent\" data-id=\"d3586e1\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1f5f26a elementor-widget elementor-widget-text-editor\" data-id=\"1f5f26a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Il <i>Rapporto Blu 2024<\/i>sviluppato da Picus Labs, \u00e8 un'analisi dettagliata basata su oltre 136 milioni di attacchi informatici simulati in tutto il mondo. Questo rapporto stabilisce un nuovo standard per la comprensione e il miglioramento della gestione dell'esposizione alle minacce, fornendo dati essenziali e raccomandazioni chiare per rafforzare la sicurezza informatica nelle organizzazioni.\u00a0<\/p><h2>\u00a0<\/h2><h2><b>I risultati principali del Blue Report 2024<\/b><b><\/b><\/h2><h3><b>1. Valutazione e definizione delle priorit\u00e0 dei rischi critici<\/b><b><\/b><\/h3><p>Il rapporto evidenzia che il 40% degli ambienti valutati consente l'accesso come amministratore di dominio, il che rappresenta un rischio critico. Questo livello di vulnerabilit\u00e0 pu\u00f2 essere rapidamente sfruttato dagli aggressori, sottolineando la necessit\u00e0 di identificare e dare priorit\u00e0 a questi rischi nei sistemi aziendali.<\/p><h3><b>2. Rilevamento e risposta agli attacchi<\/b><b><\/b><\/h3><p>Attualmente, solo 56% di attacchi vengono registrati e solo 12% generano avvisi. Questa carenza di capacit\u00e0 di rilevamento e risposta indica l'urgente necessit\u00e0 di ottimizzare i sistemi di sicurezza per migliorare la visibilit\u00e0 e ridurre al minimo le lacune che i criminali informatici potrebbero sfruttare.<\/p><h3><b>3. Sicurezza in ambienti macOS: un punto debole<\/b><b><\/b><\/h3><p>Mentre i sistemi Windows e Linux sono in grado di prevenire oltre 60% di attacchi, i dispositivi macOS riescono a prevenire solo 23%. Ci\u00f2 rafforza la necessit\u00e0 di prestare maggiore attenzione alla protezione degli ambienti macOS, spesso sottovalutati nelle strategie di sicurezza.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dfc2676 elementor-widget elementor-widget-text-editor\" data-id=\"dfc2676\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2 class=\"p3\"><b style=\"text-align: var(--text-align);\">Scarica il Rapporto Blu 2024 di Picus Security<\/b><\/h2>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5333423 e-flex e-con-boxed e-con e-parent\" data-id=\"5333423\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b4db2a8 e-con-full e-flex e-con e-child\" data-id=\"b4db2a8\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-37970da elementor-widget elementor-widget-image\" data-id=\"37970da\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"697\" height=\"984\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/12\/Cover-BlueReport2024-Picus-Security-Ukotek.png\" class=\"attachment-large size-large wp-image-2630\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/12\/Cover-BlueReport2024-Picus-Security-Ukotek.png 697w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/12\/Cover-BlueReport2024-Picus-Security-Ukotek-213x300.png 213w\" sizes=\"(max-width: 697px) 100vw, 697px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6361160 e-con-full e-flex e-con e-child\" data-id=\"6361160\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-503b6fa elementor-widget elementor-widget-text-editor\" data-id=\"503b6fa\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Accedete all'analisi completa e scoprite come rafforzare la sicurezza della vostra organizzazione di fronte alle sfide odierne. Compilate il modulo sottostante per scaricare il rapporto.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e6c8fe elementor-widget elementor-widget-html\" data-id=\"1e6c8fe\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js-eu1.hsforms.net\/forms\/embed\/v2.js\"><\/script>\n<script>\n  hbspt.forms.create({\n    portalId: \"144892228\",\n    formId: \"a96273ce-1f1f-436b-bb12-919fcd8fe234\"\n  });\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-efbdc82 e-flex e-con-boxed e-con e-parent\" data-id=\"efbdc82\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Il Blue Report 2024, sviluppato da Picus Labs, \u00e8 un'analisi dettagliata basata su oltre 136 milioni di attacchi informatici simulati in tutto il mondo. Questo rapporto stabilisce un nuovo standard per la comprensione e il miglioramento della gestione dell'esposizione alle minacce, fornendo dati essenziali e raccomandazioni chiare per rafforzare la sicurezza informatica nelle organizzazioni.  [...]<\/p>","protected":false},"author":1,"featured_media":2637,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[13],"tags":[16,17,18],"class_list":["post-2622","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-soluciones","tag-ciberseguridad","tag-gestion-amenazas","tag-picus-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Blue Report 2024: Gesti\u00f3n de Exposici\u00f3n a Amenazas en el Mundo Digital - Ukotek<\/title>\n<meta name=\"description\" content=\"Descubre el informe Blue 2024 de Picus Security, un an\u00e1lisis detallado sobre la gesti\u00f3n de exposici\u00f3n a amenazas en el mundo digital. Obt\u00e9n datos esenciales y recomendaciones claras para fortalecer la seguridad cibern\u00e9tica en tu organizaci\u00f3n.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ukotek.com\/it\/blue-report-2024-picus-security-gestion-de-exposicion-a-amenazas\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Blue Report 2024: Gesti\u00f3n de Exposici\u00f3n a Amenazas en el Mundo Digital - Ukotek\" \/>\n<meta property=\"og:description\" content=\"Descubre el informe Blue 2024 de Picus Security, un an\u00e1lisis detallado sobre la gesti\u00f3n de exposici\u00f3n a amenazas en el mundo digital. Obt\u00e9n datos esenciales y recomendaciones claras para fortalecer la seguridad cibern\u00e9tica en tu organizaci\u00f3n.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ukotek.com\/it\/blue-report-2024-picus-security-gestion-de-exposicion-a-amenazas\/\" \/>\n<meta property=\"og:site_name\" content=\"Ukotek\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-02T10:12:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-02T14:35:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/12\/BlueReport2024_PicusSecurity_Ukotek_GestionAmenazas-1024x701.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"701\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"arquitecto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"arquitecto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ukotek.com\/blue-report-2024-picus-security-gestion-de-exposicion-a-amenazas\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ukotek.com\/blue-report-2024-picus-security-gestion-de-exposicion-a-amenazas\/\"},\"author\":{\"name\":\"arquitecto\",\"@id\":\"https:\/\/ukotek.com\/#\/schema\/person\/177fd6e76e98b176d0673081ed3eff46\"},\"headline\":\"Blue Report 2024: Gesti\u00f3n de Exposici\u00f3n a Amenazas en el Mundo Digital\",\"datePublished\":\"2024-12-02T10:12:12+00:00\",\"dateModified\":\"2024-12-02T14:35:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ukotek.com\/blue-report-2024-picus-security-gestion-de-exposicion-a-amenazas\/\"},\"wordCount\":286,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ukotek.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/ukotek.com\/blue-report-2024-picus-security-gestion-de-exposicion-a-amenazas\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/12\/BlueReport2024_PicusSecurity_Ukotek_GestionAmenazas.png\",\"keywords\":[\"ciberseguridad\",\"gestion amenazas\",\"picus security\"],\"articleSection\":[\"SOLUCIONES\"],\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ukotek.com\/blue-report-2024-picus-security-gestion-de-exposicion-a-amenazas\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ukotek.com\/blue-report-2024-picus-security-gestion-de-exposicion-a-amenazas\/\",\"url\":\"https:\/\/ukotek.com\/blue-report-2024-picus-security-gestion-de-exposicion-a-amenazas\/\",\"name\":\"Blue Report 2024: Gesti\u00f3n de Exposici\u00f3n a Amenazas en el Mundo Digital - Ukotek\",\"isPartOf\":{\"@id\":\"https:\/\/ukotek.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ukotek.com\/blue-report-2024-picus-security-gestion-de-exposicion-a-amenazas\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ukotek.com\/blue-report-2024-picus-security-gestion-de-exposicion-a-amenazas\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/12\/BlueReport2024_PicusSecurity_Ukotek_GestionAmenazas.png\",\"datePublished\":\"2024-12-02T10:12:12+00:00\",\"dateModified\":\"2024-12-02T14:35:40+00:00\",\"description\":\"Descubre el informe Blue 2024 de Picus Security, un an\u00e1lisis detallado sobre la gesti\u00f3n de exposici\u00f3n a amenazas en el mundo digital. Obt\u00e9n datos esenciales y recomendaciones claras para fortalecer la seguridad cibern\u00e9tica en tu organizaci\u00f3n.\",\"breadcrumb\":{\"@id\":\"https:\/\/ukotek.com\/blue-report-2024-picus-security-gestion-de-exposicion-a-amenazas\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ukotek.com\/blue-report-2024-picus-security-gestion-de-exposicion-a-amenazas\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/ukotek.com\/blue-report-2024-picus-security-gestion-de-exposicion-a-amenazas\/#primaryimage\",\"url\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/12\/BlueReport2024_PicusSecurity_Ukotek_GestionAmenazas.png\",\"contentUrl\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/12\/BlueReport2024_PicusSecurity_Ukotek_GestionAmenazas.png\",\"width\":1958,\"height\":1340},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ukotek.com\/blue-report-2024-picus-security-gestion-de-exposicion-a-amenazas\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/ukotek.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blue Report 2024: Gesti\u00f3n de Exposici\u00f3n a Amenazas en el Mundo Digital\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ukotek.com\/#website\",\"url\":\"https:\/\/ukotek.com\/\",\"name\":\"Ukotek\",\"description\":\"Ciber Security\",\"publisher\":{\"@id\":\"https:\/\/ukotek.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ukotek.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ukotek.com\/#organization\",\"name\":\"Ukotek\",\"url\":\"https:\/\/ukotek.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/ukotek.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png\",\"contentUrl\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png\",\"width\":783,\"height\":224,\"caption\":\"Ukotek\"},\"image\":{\"@id\":\"https:\/\/ukotek.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/ukotek.com\/#\/schema\/person\/177fd6e76e98b176d0673081ed3eff46\",\"name\":\"arquitecto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/ukotek.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/69a4ef20cbbb8c8f69609c016ada76beed3417abea04975c0b7adc44c919b0e0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/69a4ef20cbbb8c8f69609c016ada76beed3417abea04975c0b7adc44c919b0e0?s=96&d=mm&r=g\",\"caption\":\"arquitecto\"},\"sameAs\":[\"http:\/\/10.0.1.6\"],\"url\":\"https:\/\/ukotek.com\/it\/author\/arquitecto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Blue Report 2024: Gesti\u00f3n de Exposici\u00f3n a Amenazas en el Mundo Digital - Ukotek","description":"Descubre el informe Blue 2024 de Picus Security, un an\u00e1lisis detallado sobre la gesti\u00f3n de exposici\u00f3n a amenazas en el mundo digital. Obt\u00e9n datos esenciales y recomendaciones claras para fortalecer la seguridad cibern\u00e9tica en tu organizaci\u00f3n.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ukotek.com\/it\/blue-report-2024-picus-security-gestion-de-exposicion-a-amenazas\/","og_locale":"it_IT","og_type":"article","og_title":"Blue Report 2024: Gesti\u00f3n de Exposici\u00f3n a Amenazas en el Mundo Digital - Ukotek","og_description":"Descubre el informe Blue 2024 de Picus Security, un an\u00e1lisis detallado sobre la gesti\u00f3n de exposici\u00f3n a amenazas en el mundo digital. Obt\u00e9n datos esenciales y recomendaciones claras para fortalecer la seguridad cibern\u00e9tica en tu organizaci\u00f3n.","og_url":"https:\/\/ukotek.com\/it\/blue-report-2024-picus-security-gestion-de-exposicion-a-amenazas\/","og_site_name":"Ukotek","article_published_time":"2024-12-02T10:12:12+00:00","article_modified_time":"2024-12-02T14:35:40+00:00","og_image":[{"width":1024,"height":701,"url":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/12\/BlueReport2024_PicusSecurity_Ukotek_GestionAmenazas-1024x701.png","type":"image\/png"}],"author":"arquitecto","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"arquitecto","Tempo di lettura stimato":"2 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ukotek.com\/blue-report-2024-picus-security-gestion-de-exposicion-a-amenazas\/#article","isPartOf":{"@id":"https:\/\/ukotek.com\/blue-report-2024-picus-security-gestion-de-exposicion-a-amenazas\/"},"author":{"name":"arquitecto","@id":"https:\/\/ukotek.com\/#\/schema\/person\/177fd6e76e98b176d0673081ed3eff46"},"headline":"Blue Report 2024: Gesti\u00f3n de Exposici\u00f3n a Amenazas en el Mundo Digital","datePublished":"2024-12-02T10:12:12+00:00","dateModified":"2024-12-02T14:35:40+00:00","mainEntityOfPage":{"@id":"https:\/\/ukotek.com\/blue-report-2024-picus-security-gestion-de-exposicion-a-amenazas\/"},"wordCount":286,"commentCount":0,"publisher":{"@id":"https:\/\/ukotek.com\/#organization"},"image":{"@id":"https:\/\/ukotek.com\/blue-report-2024-picus-security-gestion-de-exposicion-a-amenazas\/#primaryimage"},"thumbnailUrl":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/12\/BlueReport2024_PicusSecurity_Ukotek_GestionAmenazas.png","keywords":["ciberseguridad","gestion amenazas","picus security"],"articleSection":["SOLUCIONES"],"inLanguage":"it-IT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ukotek.com\/blue-report-2024-picus-security-gestion-de-exposicion-a-amenazas\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ukotek.com\/blue-report-2024-picus-security-gestion-de-exposicion-a-amenazas\/","url":"https:\/\/ukotek.com\/blue-report-2024-picus-security-gestion-de-exposicion-a-amenazas\/","name":"Blue Report 2024: Gesti\u00f3n de Exposici\u00f3n a Amenazas en el Mundo Digital - Ukotek","isPartOf":{"@id":"https:\/\/ukotek.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ukotek.com\/blue-report-2024-picus-security-gestion-de-exposicion-a-amenazas\/#primaryimage"},"image":{"@id":"https:\/\/ukotek.com\/blue-report-2024-picus-security-gestion-de-exposicion-a-amenazas\/#primaryimage"},"thumbnailUrl":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/12\/BlueReport2024_PicusSecurity_Ukotek_GestionAmenazas.png","datePublished":"2024-12-02T10:12:12+00:00","dateModified":"2024-12-02T14:35:40+00:00","description":"Descubre el informe Blue 2024 de Picus Security, un an\u00e1lisis detallado sobre la gesti\u00f3n de exposici\u00f3n a amenazas en el mundo digital. Obt\u00e9n datos esenciales y recomendaciones claras para fortalecer la seguridad cibern\u00e9tica en tu organizaci\u00f3n.","breadcrumb":{"@id":"https:\/\/ukotek.com\/blue-report-2024-picus-security-gestion-de-exposicion-a-amenazas\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ukotek.com\/blue-report-2024-picus-security-gestion-de-exposicion-a-amenazas\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/ukotek.com\/blue-report-2024-picus-security-gestion-de-exposicion-a-amenazas\/#primaryimage","url":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/12\/BlueReport2024_PicusSecurity_Ukotek_GestionAmenazas.png","contentUrl":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/12\/BlueReport2024_PicusSecurity_Ukotek_GestionAmenazas.png","width":1958,"height":1340},{"@type":"BreadcrumbList","@id":"https:\/\/ukotek.com\/blue-report-2024-picus-security-gestion-de-exposicion-a-amenazas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/ukotek.com\/"},{"@type":"ListItem","position":2,"name":"Blue Report 2024: Gesti\u00f3n de Exposici\u00f3n a Amenazas en el Mundo Digital"}]},{"@type":"WebSite","@id":"https:\/\/ukotek.com\/#website","url":"https:\/\/ukotek.com\/","name":"Ukotek","description":"Ciber Security","publisher":{"@id":"https:\/\/ukotek.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ukotek.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/ukotek.com\/#organization","name":"Ukotek","url":"https:\/\/ukotek.com\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/ukotek.com\/#\/schema\/logo\/image\/","url":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png","contentUrl":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png","width":783,"height":224,"caption":"Ukotek"},"image":{"@id":"https:\/\/ukotek.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/ukotek.com\/#\/schema\/person\/177fd6e76e98b176d0673081ed3eff46","name":"arquitecto","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/ukotek.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/69a4ef20cbbb8c8f69609c016ada76beed3417abea04975c0b7adc44c919b0e0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/69a4ef20cbbb8c8f69609c016ada76beed3417abea04975c0b7adc44c919b0e0?s=96&d=mm&r=g","caption":"arquitecto"},"sameAs":["http:\/\/10.0.1.6"],"url":"https:\/\/ukotek.com\/it\/author\/arquitecto\/"}]}},"_links":{"self":[{"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/posts\/2622","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/comments?post=2622"}],"version-history":[{"count":27,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/posts\/2622\/revisions"}],"predecessor-version":[{"id":2662,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/posts\/2622\/revisions\/2662"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/media\/2637"}],"wp:attachment":[{"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/media?parent=2622"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/categories?post=2622"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/tags?post=2622"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}