<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://pierguidoiezzi.com/2019/04/19/assange-e-la-vox-populi-degli-hacker/</loc><lastmod>2019-04-19T12:46:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2019/04/15/la-mail-che-ruba-i-nostri-dati-il-phishing/</loc><lastmod>2019-04-15T16:53:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2019/04/12/cybersecurity-motus-e-and-swascan/</loc><lastmod>2019-04-12T16:36:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2019/04/12/la-cybersecurity-in-primo-piano-a-motus-e-grazie-a-swascan/</loc><lastmod>2019-04-12T16:36:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2019/03/12/fatturazione-elettronica-e-minacce-cyber-ecco-come-impostare-un-corretto-framework-di-sicurezza/</loc><lastmod>2019-03-12T10:32:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2019/03/11/le-vulnerabilita-di-adobe-sandbox/</loc><lastmod>2019-03-11T18:33:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2019/03/11/unazienda-italiana-scopre-le-vulnerabilita-di-adobe-sandobox/</loc><lastmod>2019-03-11T12:32:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2019/03/11/scoperte-nuove-vulnerabilita-di-adobe-sandbox/</loc><lastmod>2019-03-11T09:28:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2019/03/11/new-adobe-sandbox-vulnerabilities-found/</loc><lastmod>2019-03-11T09:28:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2019/02/18/fatturazione-elettronica-e-possibili-rischi-correlati/</loc><lastmod>2019-02-18T11:03:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2019/02/11/joomla-security-strumenti-per-mettere-in-sicurezza-il-sito-aziendale-impariamo-ad-usarli/</loc><lastmod>2019-02-11T09:34:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2019/02/01/cybersecurity-il-punto-tra-passato-e-futuro/</loc><lastmod>2019-02-01T14:46:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2019/01/22/nist-cybersecurity-framework-di-cosa-si-tratta/</loc><lastmod>2019-01-22T09:18:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2019/01/14/security-della-fatturazione-elettronica-i-cyber-risk/</loc><lastmod>2019-01-14T15:20:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2019/01/10/penetration-test-come-e-perche/</loc><lastmod>2019-01-10T15:21:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2019/01/10/cyber-security-in-sanita-best-practice-contro-i-data-breach/</loc><lastmod>2019-01-10T11:21:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2019/01/09/come-hanno-hackerato-la-merkel-e-i-politici-tedeschi/</loc><lastmod>2019-01-09T17:01:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2019/01/07/mssp-i-managed-security-services-di-swascan/</loc><lastmod>2019-01-07T11:01:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/12/28/digital-forensics-cyber-security-training/</loc><lastmod>2018-12-28T16:09:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/12/28/ethical-hacking-cyber-security-training/</loc><lastmod>2018-12-28T14:09:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/12/28/crisis-management-cyber-security-training/</loc><lastmod>2018-12-28T14:09:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/12/28/grc-governance-risk-management-compliance-training/</loc><lastmod>2018-12-28T14:09:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/12/28/cyber-security-training-ict-security-awareness/</loc><lastmod>2018-12-28T12:09:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/12/14/feste-sicure-tanti-auguri-dal-team-di-swascan/</loc><lastmod>2018-12-14T11:00:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/12/11/analisi-del-rischio-tecnologico-perche-e-cosi-importante/</loc><lastmod>2018-12-11T16:17:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/11/22/0day-zero-day-significato-ed-esempi-pratici/</loc><lastmod>2018-11-22T17:40:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/11/20/intelligenza-artificiale-opportunita-e-rischi-collaterali/</loc><lastmod>2018-11-20T09:40:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/11/08/joomla-cyber-security-proteggi-il-tuo-sito-web/</loc><lastmod>2018-11-08T10:49:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/11/07/drupal-cyber-security-la-guida-per-la-sicurezza-in-drupal/</loc><lastmod>2018-11-07T09:42:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/11/01/il-porno-online-fa-male/</loc><lastmod>2018-11-01T12:01:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/10/31/atm-security-come-funzionano-gli-attacchi-ai-bancomat-e-come-prevenirli/</loc><lastmod>2018-10-31T08:01:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/10/25/web-security-il-100-dei-siti-ha-almeno-una-vulnerabilita-nota/</loc><lastmod>2018-10-25T15:34:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/10/24/phishing-simulation-attack-how-to-avoid-phishing-attacks/</loc><lastmod>2018-10-24T11:34:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/10/24/brochure-swascan-3/</loc><lastmod>2018-10-24T11:34:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/10/22/webinar-swascan-gdpr-analisi-del-rischio-tecnologico/</loc><lastmod>2018-10-22T10:51:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/10/10/phishing-simulation-attack-attacchi-di-phishing-e-come-fermarli/</loc><lastmod>2018-10-10T10:35:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/10/09/wordpress-proteggere-i-siti-contro-i-problemi-di-sicurezza-ecco-cosa-fare-in-azienda/</loc><lastmod>2018-10-09T08:35:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/10/04/settore-sanitario-vittima-preferite-dei-cyber-criminali/</loc><lastmod>2018-10-04T10:55:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/10/03/ai-cybersecurity-e-ai-powered-cyber-attack/</loc><lastmod>2018-10-03T10:55:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/09/29/hackerato-facebook-tutte-le-app-e-i-siti-a-rischio/</loc><lastmod>2018-09-29T15:38:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/09/28/air-canada-data-breach-mobile-app-users-locked-out/</loc><lastmod>2018-09-28T09:38:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/09/20/atm-cybersecurity-cyber-crime-e-i-cyber-risk-degli-atm/</loc><lastmod>2018-09-20T10:53:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/09/18/cosi-gli-anonymous-italiani-colpiscono-i-siti-web-istituzionali/</loc><lastmod>2018-09-18T16:53:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/09/10/atm-cyber-crime-i-rischi-e-le-tecniche-dei-criminal-hacker/</loc><lastmod>2018-09-10T10:25:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/09/07/gdpr-per-hotel-bb-strutture-ricettive-le-cose-principali-da-fare/</loc><lastmod>2018-09-07T09:21:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/09/06/swascan-annuncia-il-suo-ingresso-nel-fintech-district/</loc><lastmod>2018-09-06T13:21:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/09/06/smart-car-cybersecurity-il-cyber-risk-delle-auto-intelligenti/</loc><lastmod>2018-09-06T11:21:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/09/05/sprint-vulnerability-the-flaw-in-the-online-portal/</loc><lastmod>2018-09-05T17:08:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/08/31/healthcare-vulnerability-gateway-medicale-datacaptor/</loc><lastmod>2018-08-31T06:21:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/08/29/scoperta-una-grave-vulnerabilita-sui-computer-windows-siamo-tutti-a-rischio/</loc><lastmod>2018-08-29T10:23:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/08/28/cybersecurity-minute-a-lot-happens-in-just-sixty-seconds/</loc><lastmod>2018-08-28T16:23:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/08/27/ee-security-vulnerabilities-in-their-online-portals/</loc><lastmod>2018-08-27T17:33:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/08/27/brochure-cybersecurity-swascan-security-testing-compliance/</loc><lastmod>2018-08-27T15:34:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/08/19/foreshadow-intel-cpus-affected-by-l1tf-vulnerabilities/</loc><lastmod>2018-08-19T10:38:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/08/13/brochure-swascan-2/</loc><lastmod>2018-08-13T09:56:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/08/13/segmentsmack-a-tcp-vulnerability-targeting-linux-4-9/</loc><lastmod>2018-08-13T09:56:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/08/10/troll-hate-speech-e-fake-news-saranno-il-nostro-futuro/</loc><lastmod>2018-08-10T17:20:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/08/07/the-unhackable-bitfi-cryptocurrency-wallet/</loc><lastmod>2018-08-07T14:31:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/08/02/smart-home-al-riparo-dai-criminal-hacker/</loc><lastmod>2018-08-02T09:27:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/08/01/samsam-ransomware-has-raised-6-million/</loc><lastmod>2018-08-01T15:27:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/07/30/supply-chain-cybersecurity-cyber-risk-e-soluzioni/</loc><lastmod>2018-07-30T15:27:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/07/30/milioni-di-cellulari-a-rischio-hacker/</loc><lastmod>2018-07-30T15:27:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/07/25/e-commerce-cybercrime-come-proteggersi-dagli-attacchi-sempre-piu-diffusi/</loc><lastmod>2018-07-25T16:37:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/07/14/healthcare-cybersecurity-i-rischi-cybercrime-per-la-sanita/</loc><lastmod>2018-07-14T14:07:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/07/13/rischio-di-data-breach-come-ridurlo-del-70/</loc><lastmod>2018-07-13T14:52:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/07/13/brochure-swascan/</loc><lastmod>2018-07-13T08:51:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/07/11/wordpress-cybersecurity-le-minacce-e-come-proteggersi/</loc><lastmod>2018-07-11T16:19:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/06/01/i-vettori-di-attacco-aprile-2018/</loc><image:image><image:loc>https://pierguidoiezzi.com/wp-content/uploads/2018/06/april-2018-attacks.jpg</image:loc><image:title>April-2018-Attacks</image:title></image:image><lastmod>2018-06-01T14:58:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/2018/06/01/lklklkl/</loc><image:image><image:loc>https://pierguidoiezzi.com/wp-content/uploads/2018/06/amd.png</image:loc><image:title>amd</image:title></image:image><lastmod>2018-06-01T13:51:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pierguidoiezzi.com/informazioni/</loc><lastmod>2018-06-01T13:01:28+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://pierguidoiezzi.com/contatti/</loc><lastmod>2018-06-01T13:01:28+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://pierguidoiezzi.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2019-04-19T12:46:36+00:00</lastmod></url></urlset>
