{"id":100418,"date":"2023-11-21T15:29:56","date_gmt":"2023-11-21T14:29:56","guid":{"rendered":"https:\/\/www.dgsspa.com\/?page_id=100418"},"modified":"2024-05-14T14:19:02","modified_gmt":"2024-05-14T13:19:02","slug":"dgs-cylabs","status":"publish","type":"page","link":"https:\/\/www.dgsspa.com\/en\/dgs-cylabs\/","title":{"rendered":"DGS CyLABs"},"content":{"rendered":"<section class=\"dgs-hero\">\n\t<div class=\"dgs-hero-bg\" style=\"background: url('https:\/\/www.dgsspa.com\/wp-content\/uploads\/2023\/11\/Banner_2560x1920.jpg') no-repeat 50% 50%; background-size: cover;\"><\/div>\n\t\t<div class=\"dgs-hero-ptrn \"><\/div>\n\t<div class=\"hero-inner\">\n\t\t\n\n<span class=\"wp-block-dgs-theme-category-title category-title\"><span class=\"label\">LABS<\/span><\/span>\n\n\n\n<h1 class=\"hero-heading hero-heading--undefined\">DGS CyLABs<\/h1>\n\n\n\n<div class=\"wp-block-dgs-theme-hero-text hero-text\"><p>The reinforcement and reorganisation of our cyber security laboratories enables us to continue to offer services and solutions that are always in step with the future. We aim to support our customers more strongly in the entire security governance process and make our contribution to the protection of the digital ecosystem.<\/p><\/div>\n\n\t<\/div>\n<\/section>\n\n\n\n<div class=\"wp-block-group alignwide archive-items-container has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<span class=\"wp-block-dgs-theme-category-title category-title\"><span class=\"label\">DGS CyLABS<\/span><\/span>\n\n\n\n<p>In a landscape where identities represent the new corporate perimeter to be protected, in an increasingly dematerialised context of cloud and hybrid infrastructures, the increased attack surface amplifies the risk of compromising processes, systems and data, with negative implications for the economy and sustainability.<\/p>\n\n\n\n<p>To protect infrastructures and data from cyber-attacks and to promote energy savings by optimising processes and the use of technological resources, <strong>at DGS we have developed an approach aimed at consolidating internal competencies by strengthening, verticalising and reinforcing the organisational structure of our Cybersecurity Labs (CyLABs).<\/strong><\/p>\n\n\n\n<p>Within these factories, our experts test cutting-edge solutions and technologies from innovative start-ups and leading industry vendors in various fields.<\/p>\n\n\n\n<p>By strengthening and reorganising the Cybersecurity Labs, we are consolidating our expertise to meet the challenges of the industry with greater strength.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignwide archive-items-container has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"facetwp-template\" data-name=\"labs_post\"><section class=\"article-loop\">\n\t\n\t\t  \t\t\t\t  <article class=\"card entry\" style=\"background-image: url('https:\/\/www.dgsspa.com\/wp-content\/uploads\/2023\/11\/Card_CyLABS9.jpg'); background-size: cover;  background-position: center;\">\n\t\t\t\t\t<div class=\"pre-title\">\n\t\t\t\t<div class=\"wp-block-post-date\"><\/div>\n\t\t\t\t\t\t\t\t<div class=\"dgs-labs-article-tags\"><\/div>\n\t\t\t<\/div>\n\t\t\t<h2 class=\"dgs-labs-article-title\"><a href=\"https:\/\/www.dgsspa.com\/en\/labs\/identity-threat-detection-and-response-itdr\/\">Identity Threat Detection and Response (ITDR)<\/a><\/h2>\n\t\t\t<div class=\"wp-block-labs-excerpt\"><p>We experiment news threat detection techniques and tools, leveraging the know-how of our resources, to protect Digital Identities and secure corporate assets.<\/p>\n<\/div>\n\t\t\t<div class=\"dgs-labs-article-footer\">\n\t\t\t\t<div class=\"wp-block-button is-style-plus-icon\"><a href=\"https:\/\/www.dgsspa.com\/en\/labs\/identity-threat-detection-and-response-itdr\/\" class=\"wp-block-button__link wp-element-button\">Read more<\/a><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/article>\n\n\t\t  \t\t\t\t  <article class=\"card entry\" style=\"background-image: url('https:\/\/www.dgsspa.com\/wp-content\/uploads\/2023\/11\/Card_CyLABS8.jpg'); background-size: cover;  background-position: center;\">\n\t\t\t\t\t<div class=\"pre-title\">\n\t\t\t\t<div class=\"wp-block-post-date\"><\/div>\n\t\t\t\t\t\t\t\t<div class=\"dgs-labs-article-tags\"><\/div>\n\t\t\t<\/div>\n\t\t\t<h2 class=\"dgs-labs-article-title\"><a href=\"https:\/\/www.dgsspa.com\/en\/labs\/cloud-native-application-protection-platform-cnapp\/\">Cloud Native Application Protection Platform (CNAPP)<\/a><\/h2>\n\t\t\t<div class=\"wp-block-labs-excerpt\"><p>We develop new techniques for identifying and responding to infrastructural gaps in cloud-native environments to guarantee the integrity, confidentiality and availability of information.<\/p>\n<\/div>\n\t\t\t<div class=\"dgs-labs-article-footer\">\n\t\t\t\t<div class=\"wp-block-button is-style-plus-icon\"><a href=\"https:\/\/www.dgsspa.com\/en\/labs\/cloud-native-application-protection-platform-cnapp\/\" class=\"wp-block-button__link wp-element-button\">Read more<\/a><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/article>\n\n\t\t  \t\t\t\t  <article class=\"card entry\" style=\"background-image: url('https:\/\/www.dgsspa.com\/wp-content\/uploads\/2023\/11\/Card_CyLABS6.jpg'); background-size: cover;  background-position: center;\">\n\t\t\t\t\t<div class=\"pre-title\">\n\t\t\t\t<div class=\"wp-block-post-date\"><\/div>\n\t\t\t\t\t\t\t\t<div class=\"dgs-labs-article-tags\"><\/div>\n\t\t\t<\/div>\n\t\t\t<h2 class=\"dgs-labs-article-title\"><a href=\"https:\/\/www.dgsspa.com\/en\/labs\/extended-detection-and-response-xdr\/\">eXtended Detection and Response (xDR)<\/a><\/h2>\n\t\t\t<div class=\"wp-block-labs-excerpt\"><p>We identify new methodologies and technologies for automatic threat detection and response to protect the entire technological infrastructure.<\/p>\n<\/div>\n\t\t\t<div class=\"dgs-labs-article-footer\">\n\t\t\t\t<div class=\"wp-block-button is-style-plus-icon\"><a href=\"https:\/\/www.dgsspa.com\/en\/labs\/extended-detection-and-response-xdr\/\" class=\"wp-block-button__link wp-element-button\">Read more<\/a><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/article>\n\n\t\t  \t\t\t\t  <article class=\"card entry\" style=\"background-image: url('https:\/\/www.dgsspa.com\/wp-content\/uploads\/2023\/11\/Card_CyLABS.jpg'); background-size: cover;  background-position: center;\">\n\t\t\t\t\t<div class=\"pre-title\">\n\t\t\t\t<div class=\"wp-block-post-date\"><\/div>\n\t\t\t\t\t\t\t\t<div class=\"dgs-labs-article-tags\"><\/div>\n\t\t\t<\/div>\n\t\t\t<h2 class=\"dgs-labs-article-title\"><a href=\"https:\/\/www.dgsspa.com\/en\/labs\/advanced-threat-detection-intelligence-atdi\/\">Advanced Threat Detection Intelligence (ATDI)<\/a><\/h2>\n\t\t\t<div class=\"wp-block-labs-excerpt\"><p>We experiment with new methodologies and technologies to detect, prevent and respond to threats in order to preserve the security of the entire technological infrastructure. <\/p>\n<\/div>\n\t\t\t<div class=\"dgs-labs-article-footer\">\n\t\t\t\t<div class=\"wp-block-button is-style-plus-icon\"><a href=\"https:\/\/www.dgsspa.com\/en\/labs\/advanced-threat-detection-intelligence-atdi\/\" class=\"wp-block-button__link wp-element-button\">Read more<\/a><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/article>\n\n\t\t  \t\t\t\t  <article class=\"card entry\" style=\"background-image: url('https:\/\/www.dgsspa.com\/wp-content\/uploads\/2023\/11\/Card_CyLABS7.jpg'); background-size: cover;  background-position: center;\">\n\t\t\t\t\t<div class=\"pre-title\">\n\t\t\t\t<div class=\"wp-block-post-date\"><\/div>\n\t\t\t\t\t\t\t\t<div class=\"dgs-labs-article-tags\"><\/div>\n\t\t\t<\/div>\n\t\t\t<h2 class=\"dgs-labs-article-title\"><a href=\"https:\/\/www.dgsspa.com\/en\/labs\/business-email-compromise-bec\/\">Business Email Compromise (BEC)<\/a><\/h2>\n\t\t\t<div class=\"wp-block-labs-excerpt\"><p>We orchestrate training, analysis tools and infrastructure protocols for effective protection against Business E-mail Compromise attacks.<\/p>\n<\/div>\n\t\t\t<div class=\"dgs-labs-article-footer\">\n\t\t\t\t<div class=\"wp-block-button is-style-plus-icon\"><a href=\"https:\/\/www.dgsspa.com\/en\/labs\/business-email-compromise-bec\/\" class=\"wp-block-button__link wp-element-button\">Read more<\/a><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/article>\n\n\t\t  \t\t\t\t  <article class=\"card entry\" style=\"background-image: url('https:\/\/www.dgsspa.com\/wp-content\/uploads\/2023\/11\/Card_CyLABS.jpg'); background-size: cover;  background-position: center;\">\n\t\t\t\t\t<div class=\"pre-title\">\n\t\t\t\t<div class=\"wp-block-post-date\"><\/div>\n\t\t\t\t\t\t\t\t<div class=\"dgs-labs-article-tags\"><\/div>\n\t\t\t<\/div>\n\t\t\t<h2 class=\"dgs-labs-article-title\"><a href=\"https:\/\/www.dgsspa.com\/en\/labs\/critical-infrastructure-iot-protection-ics-iot-protection\/\">Critical Infrastructure &amp; IoT Protection (ICS &amp; IoT Protection)<\/a><\/h2>\n\t\t\t<div class=\"wp-block-labs-excerpt\"><p>We protect critical infrastructures that are increasingly interconnected and vulnerable to cyber attacks by developing customised solutions.<\/p>\n<\/div>\n\t\t\t<div class=\"dgs-labs-article-footer\">\n\t\t\t\t<div class=\"wp-block-button is-style-plus-icon\"><a href=\"https:\/\/www.dgsspa.com\/en\/labs\/critical-infrastructure-iot-protection-ics-iot-protection\/\" class=\"wp-block-button__link wp-element-button\">Read more<\/a><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/article>\n\n\t\t  \t\t\t\t  <article class=\"card entry\" style=\"background-image: url('https:\/\/www.dgsspa.com\/wp-content\/uploads\/2023\/11\/Card_CyLABS10.jpg'); background-size: cover;  background-position: center;\">\n\t\t\t\t\t<div class=\"pre-title\">\n\t\t\t\t<div class=\"wp-block-post-date\"><\/div>\n\t\t\t\t\t\t\t\t<div class=\"dgs-labs-article-tags\"><\/div>\n\t\t\t<\/div>\n\t\t\t<h2 class=\"dgs-labs-article-title\"><a href=\"https:\/\/www.dgsspa.com\/en\/labs\/attack-surface-check-and-remediation-ascr\/\">Attack Surface Check and Remediation (ASCR)<\/a><\/h2>\n\t\t\t<div class=\"wp-block-labs-excerpt\"><p>We experiment with solutions that help our customers keep an eye on changes in their attack surface, to defend their core assets from cyber attacks.<\/p>\n<\/div>\n\t\t\t<div class=\"dgs-labs-article-footer\">\n\t\t\t\t<div class=\"wp-block-button is-style-plus-icon\"><a href=\"https:\/\/www.dgsspa.com\/en\/labs\/attack-surface-check-and-remediation-ascr\/\" class=\"wp-block-button__link wp-element-button\">Read more<\/a><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/article>\n\n\t\t  \t\t\t\t  <article class=\"card entry\" style=\"background-image: url('https:\/\/www.dgsspa.com\/wp-content\/uploads\/2023\/11\/Card_CyLABS11.jpg'); background-size: cover;  background-position: center;\">\n\t\t\t\t\t<div class=\"pre-title\">\n\t\t\t\t<div class=\"wp-block-post-date\"><\/div>\n\t\t\t\t\t\t\t\t<div class=\"dgs-labs-article-tags\"><\/div>\n\t\t\t<\/div>\n\t\t\t<h2 class=\"dgs-labs-article-title\"><a href=\"https:\/\/www.dgsspa.com\/en\/labs\/automation-orchestration-ao\/\">Automation &amp; Orchestration (A&amp;O)<\/a><\/h2>\n\t\t\t<div class=\"wp-block-labs-excerpt\"><p>We experiment with innovative solutions and technologies for the automation and orchestration of IT security management processes.<\/p>\n<\/div>\n\t\t\t<div class=\"dgs-labs-article-footer\">\n\t\t\t\t<div class=\"wp-block-button is-style-plus-icon\"><a href=\"https:\/\/www.dgsspa.com\/en\/labs\/automation-orchestration-ao\/\" class=\"wp-block-button__link wp-element-button\">Read more<\/a><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/article>\n\n\t\t  \t\t\t\t  <article class=\"card entry\" style=\"background-image: url('https:\/\/www.dgsspa.com\/wp-content\/uploads\/2023\/11\/Card_CyLABS5.jpg'); background-size: cover;  background-position: center;\">\n\t\t\t\t\t<div class=\"pre-title\">\n\t\t\t\t<div class=\"wp-block-post-date\"><\/div>\n\t\t\t\t\t\t\t\t<div class=\"dgs-labs-article-tags\"><\/div>\n\t\t\t<\/div>\n\t\t\t<h2 class=\"dgs-labs-article-title\"><a href=\"https:\/\/www.dgsspa.com\/en\/labs\/data-access-and-governance-dag\/\">Data Access and Governance (DAG)<\/a><\/h2>\n\t\t\t<div class=\"wp-block-labs-excerpt\"><p>We study and identify new methodologies and technologies for identifying and mitigating risks to sensitive corporate data to reduce the attack surface and the likelihood of a data breach.<\/p>\n<\/div>\n\t\t\t<div class=\"dgs-labs-article-footer\">\n\t\t\t\t<div class=\"wp-block-button is-style-plus-icon\"><a href=\"https:\/\/www.dgsspa.com\/en\/labs\/data-access-and-governance-dag\/\" class=\"wp-block-button__link wp-element-button\">Read more<\/a><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/article>\n\n\t\t  \t\t\t\t  <article class=\"card entry\" style=\"background-image: url('https:\/\/www.dgsspa.com\/wp-content\/uploads\/2023\/11\/Card_CyLABS7.jpg'); background-size: cover;  background-position: center;\">\n\t\t\t\t\t<div class=\"pre-title\">\n\t\t\t\t<div class=\"wp-block-post-date\"><\/div>\n\t\t\t\t\t\t\t\t<div class=\"dgs-labs-article-tags\"><\/div>\n\t\t\t<\/div>\n\t\t\t<h2 class=\"dgs-labs-article-title\"><a href=\"https:\/\/www.dgsspa.com\/en\/labs\/web-application-and-api-protection-waap\/\">Web Application and API Protection (WAAP)<\/a><\/h2>\n\t\t\t<div class=\"wp-block-labs-excerpt\"><p>We test new services and solutions to protect companies\u2019 and users\u2019 web applications and APIs from the most insidious cyber risks. <\/p>\n<\/div>\n\t\t\t<div class=\"dgs-labs-article-footer\">\n\t\t\t\t<div class=\"wp-block-button is-style-plus-icon\"><a href=\"https:\/\/www.dgsspa.com\/en\/labs\/web-application-and-api-protection-waap\/\" class=\"wp-block-button__link wp-element-button\">Read more<\/a><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t<div class=\"last-filler\"><\/div>\n<\/section>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull archive-items-pagination has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"facetwp-facet facetwp-facet-pagination facetwp-type-pager\" data-name=\"pagination\" data-type=\"pager\"><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>In a landscape where identities represent the new corporate perimeter to be protected, in an increasingly dematerialised context of cloud and hybrid infrastructures, the increased attack surface amplifies the risk of compromising processes, systems and data, with negative implications for the economy and sustainability. To protect infrastructures and data from cyber-attacks and to promote energy [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"categories":[],"class_list":["post-100418","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DGS CyLABs - DGS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dgsspa.com\/en\/dgs-cylabs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DGS CyLABs - DGS\" \/>\n<meta property=\"og:description\" content=\"In a landscape where identities represent the new corporate perimeter to be protected, in an increasingly dematerialised context of cloud and hybrid infrastructures, the increased attack surface amplifies the risk of compromising processes, systems and data, with negative implications for the economy and sustainability. To protect infrastructures and data from cyber-attacks and to promote energy [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dgsspa.com\/en\/dgs-cylabs\/\" \/>\n<meta property=\"og:site_name\" content=\"DGS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/gruppoDGS\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-14T13:19:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/12\/dgs-logo-opengraph.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@dgs_group\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/dgs-cylabs\\\/\",\"url\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/dgs-cylabs\\\/\",\"name\":\"DGS CyLABs - DGS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/#website\"},\"datePublished\":\"2023-11-21T14:29:56+00:00\",\"dateModified\":\"2024-05-14T13:19:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/dgs-cylabs\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/dgs-cylabs\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/dgs-cylabs\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DGS CyLABs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/\",\"name\":\"DGS spa\",\"description\":\"DGS SPA\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/#organization\",\"name\":\"DGS spa\",\"url\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dgsspa.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Logo_DGS.png\",\"contentUrl\":\"https:\\\/\\\/www.dgsspa.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Logo_DGS.png\",\"width\":400,\"height\":400,\"caption\":\"DGS spa\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/gruppoDGS\",\"https:\\\/\\\/x.com\\\/dgs_group\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/dgsspa\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCTrU_JDYEEOcYXNjL5a9k5g\",\"https:\\\/\\\/www.instagram.com\\\/dgs_spa\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DGS CyLABs - DGS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dgsspa.com\/en\/dgs-cylabs\/","og_locale":"en_US","og_type":"article","og_title":"DGS CyLABs - DGS","og_description":"In a landscape where identities represent the new corporate perimeter to be protected, in an increasingly dematerialised context of cloud and hybrid infrastructures, the increased attack surface amplifies the risk of compromising processes, systems and data, with negative implications for the economy and sustainability. To protect infrastructures and data from cyber-attacks and to promote energy [&hellip;]","og_url":"https:\/\/www.dgsspa.com\/en\/dgs-cylabs\/","og_site_name":"DGS","article_publisher":"https:\/\/www.facebook.com\/gruppoDGS","article_modified_time":"2024-05-14T13:19:02+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/12\/dgs-logo-opengraph.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@dgs_group","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.dgsspa.com\/en\/dgs-cylabs\/","url":"https:\/\/www.dgsspa.com\/en\/dgs-cylabs\/","name":"DGS CyLABs - DGS","isPartOf":{"@id":"https:\/\/www.dgsspa.com\/en\/#website"},"datePublished":"2023-11-21T14:29:56+00:00","dateModified":"2024-05-14T13:19:02+00:00","breadcrumb":{"@id":"https:\/\/www.dgsspa.com\/en\/dgs-cylabs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dgsspa.com\/en\/dgs-cylabs\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.dgsspa.com\/en\/dgs-cylabs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dgsspa.com\/en\/"},{"@type":"ListItem","position":2,"name":"DGS CyLABs"}]},{"@type":"WebSite","@id":"https:\/\/www.dgsspa.com\/en\/#website","url":"https:\/\/www.dgsspa.com\/en\/","name":"DGS spa","description":"DGS SPA","publisher":{"@id":"https:\/\/www.dgsspa.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dgsspa.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.dgsspa.com\/en\/#organization","name":"DGS spa","url":"https:\/\/www.dgsspa.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dgsspa.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/11\/Logo_DGS.png","contentUrl":"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/11\/Logo_DGS.png","width":400,"height":400,"caption":"DGS spa"},"image":{"@id":"https:\/\/www.dgsspa.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/gruppoDGS","https:\/\/x.com\/dgs_group","https:\/\/www.linkedin.com\/company\/dgsspa\/","https:\/\/www.youtube.com\/channel\/UCTrU_JDYEEOcYXNjL5a9k5g","https:\/\/www.instagram.com\/dgs_spa"]}]}},"_links":{"self":[{"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/pages\/100418","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/comments?post=100418"}],"version-history":[{"count":3,"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/pages\/100418\/revisions"}],"predecessor-version":[{"id":101518,"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/pages\/100418\/revisions\/101518"}],"wp:attachment":[{"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/media?parent=100418"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/categories?post=100418"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}