<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
<url><loc>https://www.ngsecurity.it/</loc><changefreq>daily</changefreq><priority>1.0</priority></url>
<url><loc>https://www.ngsecurity.it/home</loc><lastmod>2022-03-04T10:57Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/approccio-alla-sicurezza-asm-global</loc><lastmod>2024-10-31T18:42Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/integrazione-e-collaborazione-con-le-autorita-di-sicurezza-nazionale</loc><lastmod>2024-11-04T08:20Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/una-serie-di-gravi-violazioni-di-dati-sono-state-segnalate-nel-settore-sanitario</loc><lastmod>2024-11-04T13:54Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.ngsecurity.it/managed-cloud/business-continuity-disaster-recovery</loc><lastmod>2021-04-16T10:04Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/incident-management</loc><lastmod>2023-09-20T19:15Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/il-ruolo-della-threat-intelligence-nella-protezione-degli-ambienti-it</loc><lastmod>2025-07-10T04:56Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/public-cloud-and-security-new-protection-paradigm</loc><lastmod>2025-07-10T04:56Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/vendita-il-codice-sorgente-violare-firewall-fortinet</loc><lastmod>2025-07-21T07:19Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/metodologie-di-quantificazione-economica-del-rischio</loc><lastmod>2025-07-30T16:43Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.ngsecurity.it/penetration-test</loc><lastmod>2023-09-21T09:16Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/node/113</loc><lastmod>2026-02-16T08:11Z</lastmod><changefreq>monthly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.ngsecurity.it/i-cookies</loc><lastmod>2021-01-26T17:50Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/scadenze-nis2-facciamo-un-po-di-chiarezza</loc><lastmod>2025-09-01T07:56Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/referente-csirt</loc><lastmod>2025-11-26T09:58Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/buon-natale-e-buone-feste</loc><lastmod>2025-12-06T09:01Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.ngsecurity.it/404</loc><lastmod>2022-03-22T14:07Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/security-360-data-protection</loc><lastmod>2026-03-23T18:31Z</lastmod><changefreq>weekly</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/cyber-resilience-act-cra-il-regolamento-i-prodotti-con-componenti-digitali</loc><lastmod>2026-03-31T10:31Z</lastmod><changefreq>hourly</changefreq></url>
<url><loc>https://www.ngsecurity.it/403</loc><lastmod>2022-03-22T14:05Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/contatti</loc><lastmod>2022-10-30T05:08Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/login</loc><lastmod>2022-03-22T14:05Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/password</loc><lastmod>2022-03-22T14:07Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/cyber-security-monitoraggio-dark-web</loc><lastmod>2022-03-22T15:33Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/cyber-security-360</loc><lastmod>2025-09-12T15:23Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.ngsecurity.it/test</loc><lastmod>2021-02-04T16:49Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/corsi-di-formazione-sulla-sicurezza-informatica</loc><lastmod>2024-10-09T11:26Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.ngsecurity.it/chi-siamo</loc><lastmod>2025-01-14T14:10Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.ngsecurity.it/analisi-malware</loc><lastmod>2023-09-20T19:13Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/vulnerability-assessment</loc><lastmod>2022-03-10T14:50Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/phishing-simulation</loc><lastmod>2023-09-20T19:01Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/privacy-policy</loc><lastmod>2021-01-26T17:51Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/sicurezza-informatica-per-aziende</loc><lastmod>2025-09-22T16:06Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.ngsecurity.it/webinar</loc><lastmod>2022-04-12T14:39Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/cybersecurity-anche-le-pmi-sono-nel-radar-degli-hacker</loc><lastmod>2022-09-09T06:48Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/penetration-test-che-cose-e-perche-farlo-indipendentemente-da-che-azienda-hai</loc><lastmod>2022-09-09T06:56Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/attacchi-malware-i-rischi-le-piccole-e-medie-aziende</loc><lastmod>2022-09-09T07:01Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/security-operation-center-soc-alla-portata-di-pmi-i-vantaggi-e-le-opportunita</loc><lastmod>2022-10-30T05:08Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/apt-tutto-quello-che-devi-sapere-se-sei-una-pmi-sugli-advanced-persistent-threat</loc><lastmod>2022-12-06T13:00Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/incident-management-e-cybersecurity-gli-errori-da-evitare-se-sei-una-pmi</loc><lastmod>2022-12-06T16:18Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/principali-minacce-alla-sicurezza-informatica-saas-nel-2023</loc><lastmod>2023-01-10T08:49Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/come-evitare-il-virus-che-sta-mettendo-ginocchio-litalia</loc><lastmod>2023-02-06T17:04Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/vulnerablity-assessment-come-scoprire-i-punti-deboli-della-tua-sicurezza-it</loc><lastmod>2023-02-27T18:10Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/pensare-di-essere-troppo-piccole-essere-notate-dagli-hacker-e-un-errore</loc><lastmod>2023-03-13T09:08Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/ferrari-sotto-attacco</loc><lastmod>2023-03-22T07:16Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/download-form</loc><lastmod>2023-05-03T05:31Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/attacchi-informatici-le-pmi-italiane-sono-il-bersaglio-preferito-degli-hacker</loc><lastmod>2023-05-03T05:35Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/security-assessment</loc><lastmod>2023-09-20T19:08Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/ngsecurity-blog</loc><lastmod>2023-10-02T12:09Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/italiani-state-attenti-dietro-la-promessa-di-rimborso-dalla-presidenza-del-consiglio-dei</loc><lastmod>2023-10-05T17:03Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/penetration-test-red-team</loc><lastmod>2023-10-09T07:08Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/bug-hunting-service</loc><lastmod>2023-10-13T07:21Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/cybergang-lockbit-30-annuncia-un-data-breach-allazienda-italiana-platiit</loc><lastmod>2023-11-12T16:58Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/cybergang-inc-ransom-annuncia-un-data-breach-allazienda-italiana-scolari-srl</loc><lastmod>2023-11-17T05:39Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/la-gang-alphv-annuncia-un-data-breach-nespoli-group</loc><lastmod>2023-11-22T17:58Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/la-gang-lockbit-30-annuncia-un-data-breach-allitaliana-art-eco-srl</loc><lastmod>2023-11-23T11:57Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/rivendicato-un-attacco-informatico-allazienda-wwwofficinaverdedesignit</loc><lastmod>2023-11-23T14:43Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/rivendicato-un-attacco-informatico-allhotel-spa-tirolese-preidlofh</loc><lastmod>2023-11-24T15:43Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/online-la-registrazione-del-webinar-strategie-di-cyber-security-le-piccole-e-medie-imprese</loc><lastmod>2023-12-19T08:13Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/lockbit-30-sono-gli-autori-dell-attacco-westpole</loc><lastmod>2023-12-19T10:04Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/node/97</loc><lastmod>2021-02-06T12:27Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/medicalsoc</loc><lastmod>2024-03-20T10:40Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/manufacturingsoc</loc><lastmod>2024-03-20T10:40Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/nis-2-ricadute-operative-ambito-sanitario-i-principali-fattori-di-rischio</loc><lastmod>2024-05-22T05:46Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/gli-accorgimenti-aderire-alla-nis2</loc><lastmod>2024-05-21T12:28Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/iso27001-e-nis2-relazione-imprescindibile-ne-parliamo-con-il-prof-marco-armoni</loc><lastmod>2024-05-21T12:15Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/la-sicurezza-e-la-protezione-dei-dati-durante-gli-eventi-intervista-giuseppe-rizzello</loc><lastmod>2024-05-31T11:15Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/case-study-settore-sanitario-monitoraggio-soc-nel-settore-sanitario</loc><lastmod>2024-06-13T15:27Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/case-study-settore-privato-security-assessment-nel-settore-privato</loc><lastmod>2024-06-13T15:28Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/case-study-software-house-nel-settore-dei-servizi-studi-professionali-e-imprese</loc><lastmod>2024-06-18T08:36Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/resilienza-digitale-minacce-e-sfide-della-sicurezza-informatica-nei-grandi-eventi</loc><lastmod>2024-06-18T07:09Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/case-study-una-rinomata-catena-alberghiera</loc><lastmod>2024-07-09T06:10Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/legge-902024-sulla-cybersicurezza-e-compliance-integrata-gli-impatti-su-modello-231-e-privacy</loc><lastmod>2024-08-26T07:59Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.ngsecurity.it/advisory-e-compliance</loc><lastmod>2024-12-13T10:00Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/ai-come-rendere-sicure-le-applicazioni</loc><lastmod>2024-11-04T08:17Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/ai-come-difendersi-da-azioni-malevole</loc><lastmod>2024-11-04T08:10Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog/ai-come-evitarne-lutilizzo-scopi-illeciti</loc><lastmod>2024-11-04T08:10Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog-category/sicurezza</loc><lastmod>2022-09-09T06:57Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog-category/privacy</loc><lastmod>2022-09-09T06:57Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog-category/alerts</loc><lastmod>2022-09-09T06:57Z</lastmod><changefreq>never</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog-category/case-study</loc><lastmod>2024-06-13T15:17Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.ngsecurity.it/blog-category/ai</loc><lastmod>2024-10-31T18:41Z</lastmod><changefreq>yearly</changefreq></url>
</urlset>
