<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" generatedBy="WIX">
<url>
<loc>https://www.vigiliacyber.it/post/referente-csirt-nis2-guida-completa</loc>
<lastmod>2025-12-02</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/4dac22_276016de3c6346d78b666f286bc1edf6~mv2.jpg</image:loc>
<image:title>referente csirt</image:title>
</image:image>
</url>
<url>
<loc>https://www.vigiliacyber.it/post/manifattura-italiana-e-cybersecurity</loc>
<lastmod>2025-11-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/4dac22_00cc459b782148969e350d2376ab0943~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.vigiliacyber.it/post/strumenti-di-rilevamento-e-risposta-nella-gestione-degli-scenari-attuali-di-minacce-cyber</loc>
<lastmod>2025-06-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/1d902e_c5cfdc2bab1c4fa6a385d871b43516b4~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.vigiliacyber.it/post/l-arte-di-fare-backup-senza-errori</loc>
<lastmod>2025-09-18</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/a4d12b_98505bedaad545f0a3577728b93d0051~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.vigiliacyber.it/post/ai-e-data-governance-come-proteggere-i-dati-aziendali-nell-era-dell-ai-generativa</loc>
<lastmod>2025-12-07</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/4dac22_5c8576f566a542c3be1b6553a35a8e60~mv2.png</image:loc>
<image:title>gpr</image:title>
</image:image>
</url>
<url>
<loc>https://www.vigiliacyber.it/post/pmi-e-cybersecurity-perché-delegare-non-basta-più</loc>
<lastmod>2025-10-17</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/a4d12b_c2c151788979414eb32088432c5c08d6~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.vigiliacyber.it/post/vigilia-cyber-annuncia-partnership-strategica-con-resilientx-security-per-potenziare-l-offerta-di-cy</loc>
<lastmod>2025-06-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/1d902e_54e0d6a74cda4995830263c2c3f09f31~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.vigiliacyber.it/post/sicurezza-digitale-con-vigilia-cyber-e-coro</loc>
<lastmod>2025-06-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/1d902e_f01c1d0b0f474d27ab155fa69371a1d8~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.vigiliacyber.it/post/case-study-sekoia</loc>
<lastmod>2025-10-31</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/a4d12b_25d5f357f3c141cc9ef5a7baf358937a~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.vigiliacyber.it/post/edr-vs-xdr-differenza-soluzione-per-le-aziende</loc>
<lastmod>2025-12-01</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/a4d12b_f1d40537c5e54207ad582c79bc2c7a70~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.vigiliacyber.it/post/nis2-il-countdown-per-il-31-maggio-2025-è-partito-cosa-devono-fare-le-aziende-sul-serio</loc>
<lastmod>2025-06-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/1d902e_320e4938cc584581b993bd7d6039834c~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.vigiliacyber.it/post/managed-detection-and-response-in-che-modo-l-mdr-di-vigilia-rafforza-la-vostra-sicurezza</loc>
<lastmod>2025-06-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/1d902e_fc766340de764cf382495ae5fda4f300~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.vigiliacyber.it/post/i-processi-di-patch-management</loc>
<lastmod>2025-09-11</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/a4d12b_974ba97e2595488ca52b6257cd655429~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.vigiliacyber.it/post/conosciamo-cesare-di-lucchio-cyber-security-director-di-vigilia-cyber</loc>
<lastmod>2025-06-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/1d902e_fdf311de1c92430caeeecbc84d22eff3~mv2.png</image:loc>
<image:title>Cesare Di Lucchio, Cyber Security Director di Vigilia Cyber</image:title>
</image:image>
</url>
<url>
<loc>https://www.vigiliacyber.it/post/oltre-la-notifica-la-funzione-tecnica-di-un-soc-gestito-come-estensione-operativa-della-sicurezza-i</loc>
<lastmod>2025-06-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/1d902e_72dc1ab1333e4b8baf393117d4dcb5a8~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.vigiliacyber.it/post/ticino-sotto-attacco-digitale-l-ondata-silenziosa-dell-attacco-informatico</loc>
<lastmod>2026-02-12</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/4dac22_b7829eb99d31488597f4bee0433812b7~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.vigiliacyber.it/post/edr-rmm-agent-backdoor-rischio-aziendale</loc>
<lastmod>2026-03-23</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/4dac22_69ac4c2b05ec4285a8defa5f3741d445~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.vigiliacyber.it/post/vigilia-cyber-annuncia-la-partnership-con-sekoia</loc>
<lastmod>2025-06-05</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/1d902e_4fdf6855870641b5affad1095db10711~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.vigiliacyber.it/post/email-security-per-pmi</loc>
<lastmod>2026-01-29</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/4dac22_662bb0c551be4c2d8ad3fceb7aa49dc9~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.vigiliacyber.it/post/hardening-dei-sistemi-windows-il-fondamento-della-sicurezza-informatica-nell-era-nis2</loc>
<lastmod>2025-09-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/a4d12b_38542a471b724a77a5a3fdc2f25683e0~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.vigiliacyber.it/post/nis2-e-supply-chain-da-obbligo-a-leva-per-la-resilienza-operativa</loc>
<lastmod>2025-06-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/1d902e_ce0ec8ef108e47b390c57d8c43bb5d8c~mv2.png</image:loc>
</image:image>
</url>
</urlset>