{"id":2061,"date":"2023-03-28T22:49:00","date_gmt":"2023-03-28T20:49:00","guid":{"rendered":"http:\/\/10.0.1.197\/?p=2061"},"modified":"2024-06-07T22:53:21","modified_gmt":"2024-06-07T20:53:21","slug":"2061-2","status":"publish","type":"post","link":"http:\/\/192.168.0.78\/2061-2\/","title":{"rendered":"atsec information security at the Milan Security Summit 2023"},"content":{"rendered":"\n
\"\"<\/figure>\n\n\n\n

After years of video conferences, the Security Summit<\/a> was finally back in person in Milan, Italy, from March 14 to 16, 2023. atsec couldn\u2019t miss the opportunity to participate as gold sponsor in one of the most important cyber security events held in Italy and to meet our customers, partners, and people involved in the information security business face-to-face again.<\/p>\n\n\n\n

The long-awaited return to a physical conference has attracted many visitors from all around the country to attend the presentation of the Clusit Report 2023, which describes the state-of-the-art of cybersecurity in Italy (and abroad).<\/p>\n\n\n\n

Clusit, established in 2000 at the Department of Informatics of the University of Milan, is the largest and most authoritative Italian association in the field of IT security with more than 500 member organizations.<\/p>\n\n\n\n

According to the scenario described by the Clusit Report, the year 2022 registered another record of cyber attacks, with an increase of 21% worldwide compared to the previous year. In Italy, the situation was even worse and the increase was 169%. These alarming numbers highlight the need to increase investments in information security in Italy and worldwide.<\/p>\n\n\n\n

\"\"<\/figure>\n\n\n\n

Alessandro Fazio from atsec Italy provided a presentation on the \u201cSecurity certification of cryptographic products according to NIST\u2019s FIPS 140-3 standard.\u201d The presentation was much appreciated by the participants, who acknowledged the importance of having an approved set of cryptographic tools and an authority that can provide assurance of their effective and efficient implementation.<\/p>\n","protected":false},"excerpt":{"rendered":"

After years of video conferences, the Security Summit w […]<\/p>\n","protected":false},"author":2,"featured_media":2062,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/posts\/2061"}],"collection":[{"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/comments?post=2061"}],"version-history":[{"count":2,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/posts\/2061\/revisions"}],"predecessor-version":[{"id":2065,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/posts\/2061\/revisions\/2065"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/media\/2062"}],"wp:attachment":[{"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/media?parent=2061"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/categories?post=2061"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/tags?post=2061"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}