{"id":2528,"date":"2024-07-12T18:39:23","date_gmt":"2024-07-12T18:39:23","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=2528"},"modified":"2024-07-12T18:43:13","modified_gmt":"2024-07-12T18:43:13","slug":"avviso-cisa-su-attivita-red-team-sottolinea-necessita-di-difesa-in-profondita","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/it\/sicurezza-informatica\/avviso-cisa-su-attivita-red-team-sottolinea-necessita-di-difesa-in-profondita\/","title":{"rendered":"L'avviso della CISA sull'attivit\u00e0 delle squadre rosse sottolinea la necessit\u00e0 di una difesa in profondit\u00e0"},"content":{"rendered":"<p>La Cybersecurity and Infrastructure Security Agency ha pubblicato un avviso molto dettagliato intitolato \"Le operazioni del CISA Red Team contro un'organizzazione civile federale del ramo esecutivo evidenziano la necessit\u00e0 di una difesa in profondit\u00e0\". L'advisory si basa su una valutazione approfondita eseguita nel 2023, che include le TTP impiegate dalla squadra rossa. Questi risultati e raccomandazioni aiuteranno i dirigenti, i leader e i difensori di rete a migliorare la sicurezza informatica.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"key-findings-and-lessons-learned\"><strong>Risultati chiave e lezioni apprese<\/strong><\/h2>\n\n\n<p>Secondo l'advisory, dalla valutazione sono emersi spunti e lezioni fondamentali per l'implementazione di solide strategie di difesa in profondit\u00e0. Le tattiche e le tecniche chiave utilizzate dal team rosso comprendono:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Simulazione di vettori di minacce persistenti avanzate per testare la resilienza della rete,<\/li>\n\n\n\n<li>Sfruttamento della debolezza della segmentazione di rete e<\/li>\n\n\n\n<li>Spear-phishing sofisticato per l'accesso iniziale.<\/li>\n<\/ul>\n\n\n\n<p>Questi risultati sottolineano la capacit\u00e0 delle organizzazioni di adottare misure di sicurezza multilivello per contrastare efficacemente tali minacce.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"recommendations-to-improve-cybersecurity\"><strong>Raccomandazioni per migliorare la sicurezza informatica<\/strong><\/h2>\n\n\n<p>Il CISA, attraverso la sua consulenza, offre diverse raccomandazioni per migliorare le capacit\u00e0 di sicurezza informatica, rilevamento, risposta e caccia, tra cui:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><b>Implementare la difesa in profondit\u00e0: <\/b>Un concetto che prevede l'implementazione di pi\u00f9 livelli di controlli di sicurezza in un ambiente IT per la protezione da potenziali minacce e attacchi informatici.<\/li>\n\n\n\n<li><strong>Utilizzare una solida segmentazione della rete:<\/strong> La segmentazione della rete si riferisce alla suddivisione della rete in diversi segmenti per rendere difficile la diffusione di un attacco e, quindi, facile da contenere in caso di violazione.<\/li>\n\n\n\n<li><strong>Stabilire le linee guida:<\/strong> Implementare le linee di base del traffico di rete, dell'esecuzione delle applicazioni e dell'autenticazione degli account per identificare le anomalie che indicano le intrusioni.<\/li>\n<\/ul>\n\n\n\n<p>Queste aiutano le organizzazioni a respingere gli attacchi informatici avanzati e a migliorare la loro posizione di sicurezza complessiva.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"importance-of-the-cisas-crosssector-cybersecurity-performance-goals\"><strong>Importanza degli obiettivi di performance della sicurezza informatica intersettoriale della CISA<\/strong><\/h2>\n\n\n<p>Secondo il documento, le risorse per l'identificazione delle minacce, delle tattiche, delle tecniche e delle procedure comuni e d'impatto si trovano negli obiettivi di performance della CISA per la sicurezza informatica intersettoriale. Questi obiettivi mirano a fare quanto segue:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Fornire una serie di pratiche di base per la sicurezza informatica applicabili a tutte le infrastrutture critiche;<\/li>\n\n\n\n<li>Fornire parametri di riferimento per misurare e migliorare la maturit\u00e0 della cybersecurity;<\/li>\n\n\n\n<li>Combinare le pratiche consigliate per i proprietari di tecnologie informatiche e operative;<\/li>\n\n\n\n<li>A<em>a affrontare i rischi per la sicurezza nazionale al di l\u00e0 dei rischi delle singole entit\u00e0<\/em><\/li>\n<\/ul>\n\n\n\n<p>I CPG, con la consulenza approfondita di esperti del settore e funzionari governativi, sono stati selezionati per aiutare le piccole e medie imprese a investire in azioni di cybersecurity che producano risultati di sicurezza ad alto impatto.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"nists-cybersecurity-framework-alignment\"><strong>Allineamento del quadro di riferimento per la sicurezza informatica del NIST<\/strong><\/h2>\n\n\n<p>I CPG CISA sono allineati alle funzioni del NIST CSF. Queste funzioni includono:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Governare:<\/strong> Stabilire, comunicare e monitorare le aspettative e la strategia di gestione del rischio dell'organizzazione.<\/li>\n\n\n\n<li><strong>Identificare:<\/strong> Comprendere gli attuali rischi di cybersecurity per l'organizzazione.<\/li>\n\n\n\n<li><strong>Proteggere:<\/strong> Implementare le misure di sicurezza per gestire i rischi di cybersecurity dell'organizzazione.<\/li>\n\n\n\n<li><strong>Rilevare:<\/strong> Individuazione e analisi di possibili attacchi e compromissioni informatiche.<\/li>\n\n\n\n<li><strong>Rispondere:<\/strong> Agire in caso di incidenti di cybersecurity rilevati.<\/li>\n\n\n\n<li><strong>Recupero:<\/strong> Ripristinare i sistemi, le risorse e le operazioni colpite da un incidente di cybersecurity.<\/li>\n<\/ul>\n\n\n\n<p>Il CISA sta lavorando alla revisione dei suoi CPG per renderli conformi alla versione 2.0 del CSF del NIST, in modo che rimangano pertinenti e utili in risposta al panorama dinamico e in continua evoluzione della sicurezza informatica.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusion\"><strong>In conclusione<\/strong><\/h2>\n\n\n<p>L'ultima consulenza del CISA serve a ricordare di mettere in atto strategie di difesa in profondit\u00e0 e di impiegare buone pratiche di cybersecurity. Le raccomandazioni e i CPG aiutano a rafforzare la propria posizione di cybersecurity contro le minacce emergenti.<\/p>\n\n\n\n<p>Per ulteriori informazioni, visitate la pagina web del CISA: <strong><a href=\"https:\/\/www.cisa.gov\/securebydesign\" target=\"_blank\" rel=\"noreferrer noopener\">Sicurezza del design<\/a><\/strong> per la consulenza completa e altre risorse.<\/p>","protected":false},"excerpt":{"rendered":"<p>La Cybersecurity and Infrastructure Security Agency ha pubblicato un avviso molto dettagliato intitolato \"Le operazioni del CISA Red Team contro un'organizzazione civile federale del ramo esecutivo evidenziano la necessit\u00e0 di una difesa in profondit\u00e0\". L'avviso... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/it\/sicurezza-informatica\/avviso-cisa-su-attivita-red-team-sottolinea-necessita-di-difesa-in-profondita\/\">Continue reading <span class=\"screen-reader-text\">L'avviso della CISA sull'attivit\u00e0 delle squadre rosse sottolinea la necessit\u00e0 di una difesa in profondit\u00e0<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":2531,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15,27],"tags":[],"class_list":["post-2528","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-security","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/it\/sicurezza-informatica\/avviso-cisa-su-attivita-red-team-sottolinea-necessita-di-difesa-in-profondita\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"The Cybersecurity and Infrastructure Security Agency published a very detailed advisory entitled &#8220;CISA Red Team&#8217;s Operations Against a Federal Civilian Executive Branch Organization Highlights the Need for Defense-in-Depth.&#8221; The advisory&hellip; Continua a leggere CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/it\/sicurezza-informatica\/avviso-cisa-su-attivita-red-team-sottolinea-necessita-di-difesa-in-profondita\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-12T18:39:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-12T18:43:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1265\" \/>\n\t<meta property=\"og:image:height\" content=\"422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth\",\"datePublished\":\"2024-07-12T18:39:23+00:00\",\"dateModified\":\"2024-07-12T18:43:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/\"},\"wordCount\":535,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg\",\"articleSection\":[\"cybersecurity\",\"Security\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/\",\"url\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/\",\"name\":\"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg\",\"datePublished\":\"2024-07-12T18:39:23+00:00\",\"dateModified\":\"2024-07-12T18:43:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg\",\"width\":1265,\"height\":422,\"caption\":\"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/it\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Avviso CISA sull'Attivit\u00e0 del Red Team Sottolinea la Necessit\u00e0 di una Difesa in Profondit\u00e0 | Briefing sulla Sicurezza","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/it\/sicurezza-informatica\/avviso-cisa-su-attivita-red-team-sottolinea-necessita-di-difesa-in-profondita\/","og_locale":"it_IT","og_type":"article","og_title":"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth | Security Briefing","og_description":"The Cybersecurity and Infrastructure Security Agency published a very detailed advisory entitled &#8220;CISA Red Team&#8217;s Operations Against a Federal Civilian Executive Branch Organization Highlights the Need for Defense-in-Depth.&#8221; The advisory&hellip; Continua a leggere CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth","og_url":"https:\/\/securitybriefing.net\/it\/sicurezza-informatica\/avviso-cisa-su-attivita-red-team-sottolinea-necessita-di-difesa-in-profondita\/","og_site_name":"Security Briefing","article_published_time":"2024-07-12T18:39:23+00:00","article_modified_time":"2024-07-12T18:43:13+00:00","og_image":[{"width":1265,"height":422,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"C\u00e9sar Daniel Barreto","Tempo di lettura stimato":"3 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth","datePublished":"2024-07-12T18:39:23+00:00","dateModified":"2024-07-12T18:43:13+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/"},"wordCount":535,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg","articleSection":["cybersecurity","Security"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/","url":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/","name":"Avviso CISA sull'Attivit\u00e0 del Red Team Sottolinea la Necessit\u00e0 di una Difesa in Profondit\u00e0 | Briefing sulla Sicurezza","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg","datePublished":"2024-07-12T18:39:23+00:00","dateModified":"2024-07-12T18:43:13+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg","width":1265,"height":422,"caption":"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Briefing sulla sicurezza","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Briefing sulla sicurezza","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"Cesare Daniele Barreto","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto \u00e8 uno stimato scrittore ed esperto di cybersecurity, noto per la sua conoscenza approfondita e la capacit\u00e0 di semplificare argomenti complessi di sicurezza informatica. Con una vasta esperienza nel campo della sicurezza di rete e della protezione dei dati, contribuisce regolarmente con articoli e analisi approfondite sulle ultime tendenze della cybersecurity, educando sia i professionisti che il pubblico.","url":"https:\/\/securitybriefing.net\/it\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/posts\/2528","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/comments?post=2528"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/posts\/2528\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/media\/2531"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/media?parent=2528"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/categories?post=2528"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/it\/wp-json\/wp\/v2\/tags?post=2528"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}