<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CyberSecurity | ConsulThink</title>
	<atom:link href="https://www.consulthink.it/category/cybersecurity-it/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.consulthink.it</link>
	<description>IT consulting</description>
	<lastBuildDate>Fri, 05 Sep 2025 10:19:14 +0000</lastBuildDate>
	<language>it-IT</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.consulthink.it/wp-content/uploads/2020/02/logo-icon-87x87.ico</url>
	<title>CyberSecurity | ConsulThink</title>
	<link>https://www.consulthink.it</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>AI predittiva e Criminalità: tra Prevenzione, Privacy ed Etica algoritmica</title>
		<link>https://www.consulthink.it/ai-predittiva-e-criminalita-tra-prevenzione-privacy-ed-etica-algoritmica/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ai-predittiva-e-criminalita-tra-prevenzione-privacy-ed-etica-algoritmica</link>
		
		<dc:creator><![CDATA[Consulthink]]></dc:creator>
		<pubDate>Fri, 05 Sep 2025 10:06:39 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[CyberSecurity]]></category>
		<category><![CDATA[ExperThinkers]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[GRC]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Trend]]></category>
		<category><![CDATA[AI Act]]></category>
		<category><![CDATA[AI predittiva]]></category>
		<category><![CDATA[Criminalità]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Sicurezza]]></category>
		<guid isPermaLink="false">https://www.consulthink.it/?p=11060</guid>

					<description><![CDATA[<p>Introduzione Nel panorama tecnologico contemporaneo, l&#8217;intelligenza artificiale sta penetrando in ambiti sempre più delicati della società, sollevando interrogativi profondi sulle implicazioni etiche, sociali e legali del suo utilizzo. Tra le applicazioni più controverse figura l&#8217;impiego di algoritmi predittivi per l&#8217;identificazione di potenziali criminali prima che commettano reati. Questa tecnologia, che evoca inevitabilmente scenari distopici alla ...</p>
<p>The post <a href="https://www.consulthink.it/ai-predittiva-e-criminalita-tra-prevenzione-privacy-ed-etica-algoritmica/">AI predittiva e Criminalità: tra Prevenzione, Privacy ed Etica algoritmica</a> first appeared on <a href="https://www.consulthink.it">ConsulThink</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Cyber Insurance: pro e contro di un fenomeno in continua evoluzione</title>
		<link>https://www.consulthink.it/cyber-insurance-pro-e-contro-di-un-fenomeno-in-continua-evoluzione/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cyber-insurance-pro-e-contro-di-un-fenomeno-in-continua-evoluzione</link>
		
		<dc:creator><![CDATA[Consulthink]]></dc:creator>
		<pubDate>Fri, 30 May 2025 09:07:03 +0000</pubDate>
				<category><![CDATA[Awareness]]></category>
		<category><![CDATA[CyberSecurity]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[ExperThinkers]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[GRC]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Cyber insurance]]></category>
		<category><![CDATA[Cyber risk]]></category>
		<category><![CDATA[Risk]]></category>
		<guid isPermaLink="false">https://www.consulthink.it/?p=11064</guid>

					<description><![CDATA[<p>1. CYBERSECURITY INSURANCE, MERCATO A 33,4 MILIARDI DI DOLLARI ENTRO IL 2028 Il forte impatto che incidenti e attacchi informatici possono avere sulla capacità di una azienda di generare profitto, assieme ai relativi danni collaterali (perdita di reputazione, sanzioni, conseguenze legali) rende necessario considerare la sicurezza informatica come fattore fondamentale nel corretto processo di gestione ...</p>
<p>The post <a href="https://www.consulthink.it/cyber-insurance-pro-e-contro-di-un-fenomeno-in-continua-evoluzione/">Cyber Insurance: pro e contro di un fenomeno in continua evoluzione</a> first appeared on <a href="https://www.consulthink.it">ConsulThink</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Approccio storico alla Progettazione del Software e alla Sicurezza Informatica</title>
		<link>https://www.consulthink.it/approccio-storico-alla-progettazione-del-software-e-alla-sicurezza-informatica/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=approccio-storico-alla-progettazione-del-software-e-alla-sicurezza-informatica</link>
		
		<dc:creator><![CDATA[Consulthink]]></dc:creator>
		<pubDate>Fri, 21 Mar 2025 14:04:16 +0000</pubDate>
				<category><![CDATA[Casi di successo]]></category>
		<category><![CDATA[CyberSecurity]]></category>
		<category><![CDATA[ExperThinkers]]></category>
		<category><![CDATA[GRC]]></category>
		<category><![CDATA[ICT]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Software]]></category>
		<guid isPermaLink="false">https://www.consulthink.it/?p=10998</guid>

					<description><![CDATA[<p>Introduzione Denver, Colorado, 1993: uno dei più grandi e trafficati hub aeroportuali del mondo. Era stato previsto un software per controllare l’intero sistema di smistamento dei bagagli. Fu una debacle completa, uno dei più gravi fallimenti nella storia dell’ingegneria del software. Un errore nella progettazione architetturale e logica portò l’aeroporto al collasso totale, con conseguenze ...</p>
<p>The post <a href="https://www.consulthink.it/approccio-storico-alla-progettazione-del-software-e-alla-sicurezza-informatica/">Approccio storico alla Progettazione del Software e alla Sicurezza Informatica</a> first appeared on <a href="https://www.consulthink.it">ConsulThink</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Rustware Part 2: Process Enumeration Development</title>
		<link>https://www.consulthink.it/rustware-part-2-process-enumeration-development/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=rustware-part-2-process-enumeration-development</link>
		
		<dc:creator><![CDATA[Consulthink]]></dc:creator>
		<pubDate>Mon, 06 Nov 2023 12:18:11 +0000</pubDate>
				<category><![CDATA[Cyberattack]]></category>
		<category><![CDATA[CyberSecurity]]></category>
		<category><![CDATA[ExperThinkers]]></category>
		<category><![CDATA[Offensive Security]]></category>
		<category><![CDATA[Red Team]]></category>
		<category><![CDATA[Malware]]></category>
		<guid isPermaLink="false">https://www.consulthink.it/?p=10303</guid>

					<description><![CDATA[<p>In the previous blog post we have seen how to develop a Shellcode Process Injection in Rust; the described Process Injection flow relies on several WinAPIs: OpenProcess used to open a handle to the target process, then the VirtualAllocEx was used to allocate a new readable and writable region of memory into the target process, ...</p>
<p>The post <a href="https://www.consulthink.it/rustware-part-2-process-enumeration-development/">Rustware Part 2: Process Enumeration Development</a> first appeared on <a href="https://www.consulthink.it">ConsulThink</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Rustware Part 1: Shellcode Process Injection Development</title>
		<link>https://www.consulthink.it/rustware-part-1-shellcode-process-injection-development/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=rustware-part-1-shellcode-process-injection-development</link>
		
		<dc:creator><![CDATA[Consulthink]]></dc:creator>
		<pubDate>Fri, 27 Oct 2023 12:27:54 +0000</pubDate>
				<category><![CDATA[CyberSecurity]]></category>
		<category><![CDATA[ExperThinkers]]></category>
		<category><![CDATA[Offensive Security]]></category>
		<category><![CDATA[Red Team]]></category>
		<category><![CDATA[Injection]]></category>
		<category><![CDATA[Rustware]]></category>
		<guid isPermaLink="false">https://www.consulthink.it/?p=10192</guid>

					<description><![CDATA[<p>Introduction Malware development is essential when performing activities like Red Teaming, Adversary Emulation and Network Penetration Testing, the operator can use custom malwares to perform various tasks based on the specific situation. At the same time, analyzing Malwares is useful to learn how malwares work and how to detect them, in order to defend our ...</p>
<p>The post <a href="https://www.consulthink.it/rustware-part-1-shellcode-process-injection-development/">Rustware Part 1: Shellcode Process Injection Development</a> first appeared on <a href="https://www.consulthink.it">ConsulThink</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>L&#8217;Automotive del futuro: sicurezza informatica e normative</title>
		<link>https://www.consulthink.it/lautomotive-del-futuro-sicurezza-informatica-e-normative/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=lautomotive-del-futuro-sicurezza-informatica-e-normative</link>
		
		<dc:creator><![CDATA[Consulthink]]></dc:creator>
		<pubDate>Tue, 19 Sep 2023 14:00:49 +0000</pubDate>
				<category><![CDATA[CyberSecurity]]></category>
		<category><![CDATA[ExperThinkers]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Automotive]]></category>
		<category><![CDATA[Compliance]]></category>
		<guid isPermaLink="false">https://www.consulthink.it/?p=10069</guid>

					<description><![CDATA[<p>L&#8217;industria automobilistica sta attraversando una profonda trasformazione, con l&#8217;ingresso sempre più massiccio di tecnologie avanzate e veicoli sempre connessi con funzionalità spesso governate anche dell’intelligenza artificiale. Di conseguenza, le questioni relative alla sicurezza e alla conformità (compliance) stanno diventando centrali per costruttori, fornitori e altri stakeholder del settore. &#160; 1. Security nell&#8217;Automotive La connessione dei ...</p>
<p>The post <a href="https://www.consulthink.it/lautomotive-del-futuro-sicurezza-informatica-e-normative/">L’Automotive del futuro: sicurezza informatica e normative</a> first appeared on <a href="https://www.consulthink.it">ConsulThink</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>iOS Strings Obfuscation in Swift</title>
		<link>https://www.consulthink.it/ios-strings-obfuscation-in-swift/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ios-strings-obfuscation-in-swift</link>
		
		<dc:creator><![CDATA[Consulthink]]></dc:creator>
		<pubDate>Wed, 17 May 2023 10:36:12 +0000</pubDate>
				<category><![CDATA[CyberSecurity]]></category>
		<category><![CDATA[ExperThinkers]]></category>
		<category><![CDATA[Offensive]]></category>
		<category><![CDATA[Red Team]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Obfuscation]]></category>
		<guid isPermaLink="false">https://www.consulthink.it/?p=9985</guid>

					<description><![CDATA[<p>Introduction Usually when reversing an iOS Application, it’s common to see methods and strings that can help an attacker to figure out how the application works. When I’m looking for jailbreak detection mechanisms, I usually start to search for strings and functions containing the word “jailbr  (jail, jailbreak or jailbroken) or “root”. If I’m not lucky with these method names, ...</p>
<p>The post <a href="https://www.consulthink.it/ios-strings-obfuscation-in-swift/">iOS Strings Obfuscation in Swift</a> first appeared on <a href="https://www.consulthink.it">ConsulThink</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Attuazione di un programma di CyberSecurity Awareness efficace: da dove cominciare?</title>
		<link>https://www.consulthink.it/attuazione-di-un-programma-di-cybersecurity-awareness-efficace-da-dove-cominciare/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=attuazione-di-un-programma-di-cybersecurity-awareness-efficace-da-dove-cominciare</link>
		
		<dc:creator><![CDATA[Consulthink]]></dc:creator>
		<pubDate>Tue, 29 Nov 2022 11:00:45 +0000</pubDate>
				<category><![CDATA[Awareness]]></category>
		<category><![CDATA[CyberSecurity]]></category>
		<category><![CDATA[ExperThinkers]]></category>
		<category><![CDATA[Formazione]]></category>
		<category><![CDATA[Awareness Program]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[CyberSecurity Strategy]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[Formazione Sicurezza]]></category>
		<category><![CDATA[Gestione Rischi]]></category>
		<category><![CDATA[Human Factor]]></category>
		<category><![CDATA[Phishing Prevention]]></category>
		<category><![CDATA[Protezione Dati]]></category>
		<category><![CDATA[Rischio Umano]]></category>
		<category><![CDATA[Security Awareness]]></category>
		<category><![CDATA[Sicurezza Aziendale]]></category>
		<guid isPermaLink="false">https://www.consulthink.it/?p=9920</guid>

					<description><![CDATA[<p>L’obiettivo dei programmi di Security Awareness è quello di influenzare positivamente gli utenti informatici al fine di far loro adottare comportamenti sicuri nell’ambito dello svolgimento delle attività quotidiane connesse all’utilizzo di dispositivi e servizi informatici. Più tali comportamenti diventeranno un’abitudine, più saranno replicati in modalità automatica nel tempo e quindi si consolideranno come pratica sicura ...</p>
<p>The post <a href="https://www.consulthink.it/attuazione-di-un-programma-di-cybersecurity-awareness-efficace-da-dove-cominciare/">Attuazione di un programma di CyberSecurity Awareness efficace: da dove cominciare?</a> first appeared on <a href="https://www.consulthink.it">ConsulThink</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>IoT – Un mondo oltre la domotica</title>
		<link>https://www.consulthink.it/iot-un-mondo-oltre-la-domotica/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=iot-un-mondo-oltre-la-domotica</link>
		
		<dc:creator><![CDATA[Consulthink]]></dc:creator>
		<pubDate>Thu, 08 Sep 2022 07:44:13 +0000</pubDate>
				<category><![CDATA[CyberSecurity]]></category>
		<category><![CDATA[ExperThinkers]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Automotive]]></category>
		<category><![CDATA[dispositivi connessi]]></category>
		<category><![CDATA[domotica]]></category>
		<category><![CDATA[infrastrutture IoT]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[logistica]]></category>
		<category><![CDATA[sicurezza IoT]]></category>
		<category><![CDATA[smart city]]></category>
		<category><![CDATA[smart home]]></category>
		<category><![CDATA[tecnologia]]></category>
		<category><![CDATA[test di sicurezza]]></category>
		<guid isPermaLink="false">https://www.consulthink.it/?p=9669</guid>

					<description><![CDATA[]]></description>
		
		
		
			</item>
		<item>
		<title>Framework Nazionale per la Cybersecurity e la Data Protection e la disciplina normativa delle Criticità: come affrontare la multi-compliance nella CyberSecurity</title>
		<link>https://www.consulthink.it/framework-nazionale-per-la-cybersecurity-e-la-data-protection-e-la-disciplina-normativa-delle-criticita-come-affrontare-la-multi-compliance-nella-cybersecurity/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=framework-nazionale-per-la-cybersecurity-e-la-data-protection-e-la-disciplina-normativa-delle-criticita-come-affrontare-la-multi-compliance-nella-cybersecurity</link>
		
		<dc:creator><![CDATA[Consulthink]]></dc:creator>
		<pubDate>Wed, 31 Aug 2022 09:56:32 +0000</pubDate>
				<category><![CDATA[CyberSecurity]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[ExperThinkers]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[GRC]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Normative]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[AIIC]]></category>
		<category><![CDATA[audit di sicurezza]]></category>
		<category><![CDATA[compliance management]]></category>
		<category><![CDATA[compliance normativa]]></category>
		<category><![CDATA[framework di sicurezza]]></category>
		<category><![CDATA[Infrastrutture Critiche]]></category>
		<category><![CDATA[ISO 27001]]></category>
		<category><![CDATA[monitoraggio normativo]]></category>
		<category><![CDATA[protezione dei dati]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[self-assessment]]></category>
		<category><![CDATA[sicurezza delle informazioni]]></category>
		<category><![CDATA[sicurezza informatica]]></category>
		<guid isPermaLink="false">https://www.consulthink.it/?p=9666</guid>

					<description><![CDATA[]]></description>
		
		
		
			</item>
	</channel>
</rss>
