{"id":3159,"date":"2025-10-28T14:53:34","date_gmt":"2025-10-28T14:53:34","guid":{"rendered":"https:\/\/phishia.fr\/?p=3159"},"modified":"2025-11-25T14:00:54","modified_gmt":"2025-11-25T14:00:54","slug":"cyber-threat-intelligence-cti-definizione-semplice-esempi-concreti","status":"publish","type":"post","link":"https:\/\/phishia.fr\/it\/blog\/sorveglianza\/cyber-threat-intelligence-cti-definizione-semplice-esempi-concreti\/","title":{"rendered":"Cyber Threat Intelligence (CTI): definizione semplice, esempi concreti."},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"3159\" class=\"elementor elementor-3159\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fb756c3 e-flex e-con-boxed e-con e-parent\" data-id=\"fb756c3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-41fa117 elementor-widget elementor-widget-text-editor\" data-id=\"41fa117\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La <strong data-start=\"1005\" data-end=\"1034\">intelligence sulle minacce informatiche<\/strong> (CTI) \u00e8 la capacit\u00e0 di <strong data-start=\"1059\" data-end=\"1093\">raccogliere, elaborare e analizzare<\/strong> informazioni sulle minacce a <strong data-start=\"1132\" data-end=\"1162\">decidere pi\u00f9 velocemente e meglio<\/strong>. In concreto: rilevare fughe di identificatori, anticipare campagne di phishing\/ransomware, dare priorit\u00e0 alle patch e attivare le azioni giuste (SIEM\/EDR, takedown, MFA). A <strong data-start=\"1349\" data-end=\"1360\">Phishia<\/strong>, trasformiamo questi segnali in <strong data-start=\"1391\" data-end=\"1415\">risultati misurabili<\/strong> per le PMI, le ETI e le autorit\u00e0 locali.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-918581f e-flex e-con-boxed e-con e-parent\" data-id=\"918581f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cffba6e elementor-widget elementor-widget-heading\" data-id=\"cffba6e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber Threat Intelligence: perch\u00e9 adottarla ora?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6751669 e-flex e-con-boxed e-con e-parent\" data-id=\"6751669\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d98970b elementor-widget elementor-widget-text-editor\" data-id=\"d98970b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Le minacce evolvono rapidamente e gli IoC cambiano frequentemente. Senza CTI, noi <strong data-start=\"1723\" data-end=\"1733\">reagisce<\/strong> dopo l'evento. Con il <strong data-start=\"1754\" data-end=\"1783\">intelligence sulle minacce informatiche<\/strong>, noi <strong data-start=\"1788\" data-end=\"1800\">anticipa<\/strong> sappiamo <strong data-start=\"1811\" data-end=\"1818\">che<\/strong> \u00e8 interessato a noi, <strong data-start=\"1839\" data-end=\"1850\">come<\/strong> opera (TTP), <strong data-start=\"1867\" data-end=\"1876\">quando<\/strong> una campagna si sta intensificando e <strong data-start=\"1907\" data-end=\"1913\">dove<\/strong> dare priorit\u00e0 all'azione (identificatori compromessi, accesso rivenduto, vulnerabilit\u00e0 sfruttate).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d61f359 e-flex e-con-boxed e-con e-parent\" data-id=\"d61f359\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-25d4ecb elementor-widget elementor-widget-heading\" data-id=\"25d4ecb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><strong data-start=\"582\" data-end=\"653\">CTI strategica, tattica e operativa: definizioni e utilizzi<\/strong><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3accd3a e-flex e-con-boxed e-con e-parent\" data-id=\"3accd3a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-48775d7 elementor-widget elementor-widget-text-editor\" data-id=\"48775d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li data-start=\"2063\" data-end=\"2194\"><p data-start=\"2065\" data-end=\"2194\"><strong data-start=\"2065\" data-end=\"2080\">Strategico<\/strong> visione macro per i decisori (tendenze, attori, rischi settoriali) per guidare gli investimenti.<\/p><\/li><li data-start=\"2195\" data-end=\"2311\"><p data-start=\"2197\" data-end=\"2311\"><strong data-start=\"2197\" data-end=\"2222\">Operativo\/Tattico<\/strong> comprensione di <strong data-start=\"2243\" data-end=\"2250\">TTP<\/strong> e preparare le difese (SIEM, rilevamenti, playbook).<\/p><\/li><li data-start=\"2312\" data-end=\"2437\"><p data-start=\"2314\" data-end=\"2437\"><strong data-start=\"2314\" data-end=\"2327\">Tecnica<\/strong> : <strong data-start=\"2330\" data-end=\"2345\">indicatori<\/strong> concreto (IP, domini, hash, firme) a <strong data-start=\"2395\" data-end=\"2420\">configurazione dei radar<\/strong> e bloccare rapidamente.<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb43c8c e-flex e-con-boxed e-con e-parent\" data-id=\"eb43c8c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-79bc84a elementor-widget elementor-widget-heading\" data-id=\"79bc84a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Esempi di vita reale (phishing, ransomware, frodi) su cosa cambia la CTI giorno per giorno<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d31f313 e-flex e-con-boxed e-con e-parent\" data-id=\"d31f313\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8fa310d elementor-widget elementor-widget-text-editor\" data-id=\"8fa310d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li data-start=\"2637\" data-end=\"2738\"><p data-start=\"2639\" data-end=\"2738\"><strong data-start=\"2639\" data-end=\"2664\">Perdita di identificatori<\/strong> : ripristini mirati, rinforzo dell'MFA, avvisi di utilizzo anomalo.<\/p><\/li><li data-start=\"2739\" data-end=\"2837\"><p data-start=\"2741\" data-end=\"2837\"><strong data-start=\"2741\" data-end=\"2765\">Accesso VPN per la rivendita<\/strong> (dark web): blocco immediato, rotazione dei segreti, caccia laterale.<\/p><\/li><li data-start=\"2838\" data-end=\"2942\"><p data-start=\"2840\" data-end=\"2942\"><strong data-start=\"2840\" data-end=\"2868\">Kit di phishing con marchio<\/strong> takedown, filtraggio DNS\/MTA\/proxy, sensibilizzazione dei team interessati.<\/p><\/li><li data-start=\"2943\" data-end=\"3043\"><p data-start=\"2945\" data-end=\"3043\"><strong data-start=\"2945\" data-end=\"2974\">Vulnerabilit\u00e0 sfruttate<\/strong> patch prioritarie in base all'uso effettivo (non solo al punteggio).<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3a97e13 e-flex e-con-boxed e-con e-parent\" data-id=\"3a97e13\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ec48b7f elementor-widget elementor-widget-heading\" data-id=\"ec48b7f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Flare + Phishia: dal segnale all'azione misurabile<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e11889b e-flex e-con-boxed e-con e-parent\" data-id=\"e11889b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cb07dbf elementor-widget elementor-widget-text-editor\" data-id=\"cb07dbf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"3107\" data-end=\"3222\">Utilizziamo <strong data-start=\"3122\" data-end=\"3131\">Bagliori<\/strong> per rilevare perdite, accesso alla rivendita e segnali criminali. <strong data-start=\"3193\" data-end=\"3204\">Phishia<\/strong> fa il resto:<\/p><ol data-start=\"3223\" data-end=\"3500\"><li data-start=\"3223\" data-end=\"3282\"><p data-start=\"3226\" data-end=\"3282\"><strong data-start=\"3226\" data-end=\"3243\">Qualifica<\/strong> (filtraggio, validit\u00e0, impatto sul business),<\/p><\/li><li data-start=\"3283\" data-end=\"3327\"><p data-start=\"3286\" data-end=\"3327\"><strong data-start=\"3286\" data-end=\"3298\">Contesto<\/strong> (attori, TTP, campagne),<\/p><\/li><li data-start=\"3328\" data-end=\"3407\"><p data-start=\"3331\" data-end=\"3407\"><strong data-start=\"3331\" data-end=\"3355\">Decisione ed esecuzione<\/strong> (IoC \u2192 <strong data-start=\"3363\" data-end=\"3375\">SIEM\/EDR<\/strong>, Sigma, YARA, takedown, MFA),<\/p><\/li><li data-start=\"3408\" data-end=\"3500\"><p data-start=\"3411\" data-end=\"3500\"><strong data-start=\"3411\" data-end=\"3436\">Misurazione e miglioramento<\/strong> (MTTD\/MTTR, allarmi % attivati, riduzione delle riesposizioni).<\/p><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d6dccc3 e-flex e-con-boxed e-con e-parent\" data-id=\"d6dccc3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8a31a0b elementor-widget elementor-widget-heading\" data-id=\"8a31a0b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Valore aggiunto: PMI, ETI e autorit\u00e0 locali<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-264b592 e-flex e-con-boxed e-con e-parent\" data-id=\"264b592\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a4bd24 elementor-widget elementor-widget-text-editor\" data-id=\"3a4bd24\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li data-start=\"3700\" data-end=\"3777\"><p data-start=\"3702\" data-end=\"3777\"><strong data-start=\"3702\" data-end=\"3716\">Visibilit\u00e0<\/strong> comprendere le minacce <strong data-start=\"3742\" data-end=\"3757\">specifico<\/strong> al proprio contesto.<\/p><\/li><li data-start=\"3778\" data-end=\"3850\"><p data-start=\"3780\" data-end=\"3850\"><strong data-start=\"3780\" data-end=\"3798\">Allarme precoce<\/strong> ricezione <strong data-start=\"3814\" data-end=\"3833\">segnali filtrati<\/strong> senza SOC 24\/7.<\/p><\/li><li data-start=\"3851\" data-end=\"3954\"><p data-start=\"3853\" data-end=\"3954\"><strong data-start=\"3853\" data-end=\"3880\">Priorit\u00e0 di bilancio<\/strong> azioni mirate <strong data-start=\"3902\" data-end=\"3924\">con maggiore impatto<\/strong> (patch, EDR, backup).<\/p><\/li><li data-start=\"3955\" data-end=\"4046\"><p data-start=\"3957\" data-end=\"4046\"><strong data-start=\"3957\" data-end=\"3983\">Conformit\u00e0 e assicurazione<\/strong> dimostrare un <strong data-start=\"4000\" data-end=\"4020\">monitoraggio organizzato<\/strong> (utile NIS2\/assicuratori).<\/p><\/li><li data-start=\"4047\" data-end=\"4142\"><p data-start=\"4049\" data-end=\"4142\"><strong data-start=\"4049\" data-end=\"4069\">Cultura della sicurezza<\/strong> esempi <strong data-start=\"4085\" data-end=\"4097\">cemento armato<\/strong> che fanno muovere le cose (MFA, processo).<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3573104 e-flex e-con-boxed e-con e-parent\" data-id=\"3573104\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a323617 elementor-widget elementor-widget-heading\" data-id=\"a323617\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">FAQ<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e13e2f9 e-flex e-con-boxed e-con e-parent\" data-id=\"e13e2f9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a963558 elementor-widget elementor-widget-text-editor\" data-id=\"a963558\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"4183\" data-end=\"4350\"><strong data-start=\"4183\" data-end=\"4254\">L'intelligence sulle minacce informatiche \u00e8 solo per i grandi gruppi?<\/strong><br data-start=\"4254\" data-end=\"4257\" \/>No. Offriamo <strong data-start=\"4281\" data-end=\"4300\">offerte su misura<\/strong> alle PMI, alle ETI e alle autorit\u00e0 locali (CTI-as-a-Service).<\/p><p data-start=\"4352\" data-end=\"4580\"><strong data-start=\"4352\" data-end=\"4392\">Qual \u00e8 la differenza tra CTI e SOC?<\/strong><br data-start=\"4392\" data-end=\"4395\" \/>La <strong data-start=\"4398\" data-end=\"4405\">CTI<\/strong> porta il <strong data-start=\"4417\" data-end=\"4434\">informazioni<\/strong> (chi\/che cosa\/come\/perch\u00e9), il <strong data-start=\"4467\" data-end=\"4474\">SOC<\/strong> opera il <strong data-start=\"4484\" data-end=\"4497\">rilevamento<\/strong> e il\u2019<strong data-start=\"4503\" data-end=\"4520\">indagine<\/strong>. Insieme, riducono il rumore e accelerano la risposta.<\/p><p data-start=\"4582\" data-end=\"4738\"><strong data-start=\"4582\" data-end=\"4611\">Si pu\u00f2 iniziare in piccolo?<\/strong><br data-start=\"4611\" data-end=\"4614\" \/>S\u00ec. Un inizio frugale (feed gratuiti + avvisi mirati), poi un aumento (Flare, integrazioni SIEM\/EDR, playbook).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-944181b e-flex e-con-boxed e-con e-parent\" data-id=\"944181b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f1f9570 elementor-widget elementor-widget-heading\" data-id=\"f1f9570\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">La nostra offerta PhishiaCTI<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1ab997e e-flex e-con-boxed e-con e-parent\" data-id=\"1ab997e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-678e60c elementor-widget elementor-widget-text-editor\" data-id=\"678e60c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"203\" data-end=\"449\">La <strong data-start=\"206\" data-end=\"235\">intelligence sulle minacce informatiche<\/strong> (CTI) viene utilizzato per <strong data-start=\"249\" data-end=\"276\">vedere attacchi in arrivo<\/strong> e <strong data-start=\"282\" data-end=\"302\">reagire pi\u00f9 velocemente<\/strong>. L'idea non \u00e8 quella di aggiungere strumenti complicati, ma di <strong data-start=\"362\" data-end=\"405\">ricevere le informazioni giuste al momento giusto<\/strong> e <strong data-start=\"412\" data-end=\"448\">sapere cosa fare ora<\/strong>.<\/p><h3 data-start=\"451\" data-end=\"484\">Cosa fa Phishia per voi<\/h3><ul data-start=\"485\" data-end=\"1097\"><li data-start=\"485\" data-end=\"606\"><p data-start=\"487\" data-end=\"606\"><strong data-start=\"487\" data-end=\"517\">Teniamo d'occhio<\/strong> ci\u00f2 che vi preoccupa (identificatori trapelati, accessi in vendita, truffe che coinvolgono il vostro marchio).<\/p><\/li><li data-start=\"607\" data-end=\"700\"><p data-start=\"609\" data-end=\"700\"><strong data-start=\"609\" data-end=\"649\">Selezioniamo e spieghiamo in modo chiaro<\/strong> ci\u00f2 che \u00e8 importante, senza annegare negli avvisi.<\/p><\/li><li data-start=\"701\" data-end=\"834\"><p data-start=\"703\" data-end=\"834\"><strong data-start=\"703\" data-end=\"743\">Vi diciamo subito cosa fare<\/strong> (ad esempio, cambiare password mirate, bloccare un sito fraudolento, avvisare un servizio).<\/p><\/li><li data-start=\"835\" data-end=\"962\"><p data-start=\"837\" data-end=\"962\"><strong data-start=\"837\" data-end=\"870\">Vi aiutiamo a implementare<\/strong> queste azioni nei vostri strumenti attuali (e-mail, accesso, filtraggio), senza alcun progetto tecnico importante.<\/p><\/li><li data-start=\"963\" data-end=\"1097\"><p data-start=\"965\" data-end=\"1097\"><strong data-start=\"965\" data-end=\"995\">Stiamo dimostrando l'efficacia<\/strong> con alcuni semplici dati: tempo di intervento, numero di incidenti evitati\/ripetuti, riduzione del rumore.<\/p><\/li><\/ul><h3 data-start=\"1099\" data-end=\"1135\">Cosa si ottiene in realt\u00e0<\/h3><ul data-start=\"1136\" data-end=\"1379\"><li data-start=\"1136\" data-end=\"1214\"><p data-start=\"1138\" data-end=\"1214\"><strong data-start=\"1138\" data-end=\"1156\">Avvisi utili<\/strong> e spiegato in una pagina (cosa, perch\u00e9, cosa fare).<\/p><\/li><li data-start=\"1215\" data-end=\"1289\"><p data-start=\"1217\" data-end=\"1289\"><strong data-start=\"1217\" data-end=\"1253\">Supporto pratico e breve<\/strong> se necessario (lo faremo con voi).<\/p><\/li><li data-start=\"1290\" data-end=\"1379\"><p data-start=\"1292\" data-end=\"1379\"><strong data-start=\"1292\" data-end=\"1317\">Rapporto mensile di facile lettura<\/strong> per la gestione (cosa \u00e8 stato evitato, cosa resta da fare).<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4cb9978 e-flex e-con-boxed e-con e-parent\" data-id=\"4cb9978\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>La cyber threat intelligence (CTI) est la capacit\u00e9 \u00e0 collecter, traiter et analyser des informations sur les menaces pour d\u00e9cider plus vite et mieux. Concr\u00e8tement : d\u00e9tecter des fuites d\u2019identifiants, anticiper des campagnes de phishing\/ransomware, prioriser les patchs et d\u00e9clencher les bonnes actions (SIEM\/EDR, takedown, MFA). Chez Phishia, on transforme ces signaux en r\u00e9sultats mesurables [&hellip;]<\/p>","protected":false},"author":3,"featured_media":3161,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[24],"tags":[],"class_list":["post-3159","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-surveillance"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Threat Intelligence (CTI) : d\u00e9finition simple, exemples concrets. - Phishia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/phishia.fr\/it\/blog\/sorveglianza\/cyber-threat-intelligence-cti-definizione-semplice-esempi-concreti\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Threat Intelligence (CTI) : d\u00e9finition simple, exemples concrets. - Phishia\" \/>\n<meta property=\"og:description\" content=\"La cyber threat intelligence (CTI) est la capacit\u00e9 \u00e0 collecter, traiter et analyser des informations sur les menaces pour d\u00e9cider plus vite et mieux. Concr\u00e8tement : d\u00e9tecter des fuites d\u2019identifiants, anticiper des campagnes de phishing\/ransomware, prioriser les patchs et d\u00e9clencher les bonnes actions (SIEM\/EDR, takedown, MFA). Chez Phishia, on transforme ces signaux en r\u00e9sultats mesurables [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/phishia.fr\/it\/blog\/sorveglianza\/cyber-threat-intelligence-cti-definizione-semplice-esempi-concreti\/\" \/>\n<meta property=\"og:site_name\" content=\"Phishia\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-28T14:53:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-25T14:00:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/09\/CTI_png.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"679\" \/>\n\t<meta property=\"og:image:height\" content=\"680\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\\\/\"},\"author\":{\"name\":\"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/ab1f38ad06f750da69863e8f06e86528\"},\"headline\":\"Cyber Threat Intelligence (CTI) : d\u00e9finition simple, exemples concrets.\",\"datePublished\":\"2025-10-28T14:53:34+00:00\",\"dateModified\":\"2025-11-25T14:00:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\\\/\"},\"wordCount\":677,\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/CTI_png.jpg\",\"articleSection\":[\"Surveillance\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\\\/\",\"name\":\"Cyber Threat Intelligence (CTI) : d\u00e9finition simple, exemples concrets. - Phishia\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/CTI_png.jpg\",\"datePublished\":\"2025-10-28T14:53:34+00:00\",\"dateModified\":\"2025-11-25T14:00:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\\\/#primaryimage\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/CTI_png.jpg\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/CTI_png.jpg\",\"width\":679,\"height\":680},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/phishia.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Surveillance\",\"item\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/category\\\/surveillance\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Threat Intelligence (CTI) : d\u00e9finition simple, exemples concrets.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"name\":\"Phishia\",\"description\":\"Cabinet de Conseil IT, Cybers\u00e9curit\u00e9, Durabilit\u00e9\",\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/phishia.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\",\"name\":\"Phishia\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"width\":512,\"height\":128,\"caption\":\"Phishia\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/phishia\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/ab1f38ad06f750da69863e8f06e86528\",\"name\":\"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Threat Intelligence (CTI): definizione semplice, esempi concreti. - Phishia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/phishia.fr\/it\/blog\/sorveglianza\/cyber-threat-intelligence-cti-definizione-semplice-esempi-concreti\/","og_locale":"it_IT","og_type":"article","og_title":"Cyber Threat Intelligence (CTI) : d\u00e9finition simple, exemples concrets. - Phishia","og_description":"La cyber threat intelligence (CTI) est la capacit\u00e9 \u00e0 collecter, traiter et analyser des informations sur les menaces pour d\u00e9cider plus vite et mieux. Concr\u00e8tement : d\u00e9tecter des fuites d\u2019identifiants, anticiper des campagnes de phishing\/ransomware, prioriser les patchs et d\u00e9clencher les bonnes actions (SIEM\/EDR, takedown, MFA). Chez Phishia, on transforme ces signaux en r\u00e9sultats mesurables [&hellip;]","og_url":"https:\/\/phishia.fr\/it\/blog\/sorveglianza\/cyber-threat-intelligence-cti-definizione-semplice-esempi-concreti\/","og_site_name":"Phishia","article_published_time":"2025-10-28T14:53:34+00:00","article_modified_time":"2025-11-25T14:00:54+00:00","og_image":[{"width":679,"height":680,"url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/09\/CTI_png.jpg","type":"image\/jpeg"}],"author":"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9","Tempo di lettura stimato":"3 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/phishia.fr\/blog\/surveillance\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\/#article","isPartOf":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\/"},"author":{"name":"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9","@id":"https:\/\/phishia.fr\/#\/schema\/person\/ab1f38ad06f750da69863e8f06e86528"},"headline":"Cyber Threat Intelligence (CTI) : d\u00e9finition simple, exemples concrets.","datePublished":"2025-10-28T14:53:34+00:00","dateModified":"2025-11-25T14:00:54+00:00","mainEntityOfPage":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\/"},"wordCount":677,"publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"image":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/09\/CTI_png.jpg","articleSection":["Surveillance"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/phishia.fr\/blog\/surveillance\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\/","url":"https:\/\/phishia.fr\/blog\/surveillance\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\/","name":"Cyber Threat Intelligence (CTI): definizione semplice, esempi concreti. - Phishia","isPartOf":{"@id":"https:\/\/phishia.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\/#primaryimage"},"image":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/09\/CTI_png.jpg","datePublished":"2025-10-28T14:53:34+00:00","dateModified":"2025-11-25T14:00:54+00:00","breadcrumb":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/phishia.fr\/blog\/surveillance\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/phishia.fr\/blog\/surveillance\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\/#primaryimage","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/09\/CTI_png.jpg","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/09\/CTI_png.jpg","width":679,"height":680},{"@type":"BreadcrumbList","@id":"https:\/\/phishia.fr\/blog\/surveillance\/cyber-threat-intelligence-cti-definition-simple-exemples-concrets\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/phishia.fr\/"},{"@type":"ListItem","position":2,"name":"Surveillance","item":"https:\/\/phishia.fr\/blog\/category\/surveillance\/"},{"@type":"ListItem","position":3,"name":"Cyber Threat Intelligence (CTI) : d\u00e9finition simple, exemples concrets."}]},{"@type":"WebSite","@id":"https:\/\/phishia.fr\/#website","url":"https:\/\/phishia.fr\/","name":"Phishia","description":"Consulenza informatica, sicurezza informatica, sostenibilit\u00e0","publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/phishia.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/phishia.fr\/#organization","name":"Phishia","url":"https:\/\/phishia.fr\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","width":512,"height":128,"caption":"Phishia"},"image":{"@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/phishia\/"]},{"@type":"Person","@id":"https:\/\/phishia.fr\/#\/schema\/person\/ab1f38ad06f750da69863e8f06e86528","name":"Enzo Debosque, consulente junior di CyberSecurity"}]}},"_links":{"self":[{"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/posts\/3159","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/comments?post=3159"}],"version-history":[{"count":11,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/posts\/3159\/revisions"}],"predecessor-version":[{"id":3905,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/posts\/3159\/revisions\/3905"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/media\/3161"}],"wp:attachment":[{"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/media?parent=3159"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/categories?post=3159"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/tags?post=3159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}