<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.netech-solution.it/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.netech-solution.it/2022/11/15/come-evitare-il-cracking-delle-password-nel-2023/</loc>
		<lastmod>2022-11-15T14:01:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2022/11/Cracking-Password-1024x506-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2022/11/Cracking-Password-1024x506-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2023/01/16/cybersecurity-5-temi-caldi-del-2023/</loc>
		<lastmod>2023-01-16T14:14:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2023/01/CyberSecurity.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2023/01/CyberSecurity.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2023/01/XDR-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2023/05/22/6-motivi-per-cui-il-backup-di-microsoft-365-e-importantissimo/</loc>
		<lastmod>2023-05-22T14:54:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2022/11/Microsoft-365-Backup.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2022/11/Microsoft-365-Backup.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2022/11/responsibility-model_it.png.web_.1920.1920.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2022/11/6-motivi-backup-office-365.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2024/01/24/limpatto-dellintelligenza-artificiale-nelle-soluzioni-di-cyber-security-aziendale/</loc>
		<lastmod>2024-01-25T15:16:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/01/AI-e-Cyber-Security-1080px.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/01/AI-e-Cyber-Security-1080px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2024/11/13/intervista-a-gianluigi-monti-di-netech-sicurezza-integrata-nellofferta-private-cloud/</loc>
		<lastmod>2024-11-13T17:47:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/11/miniatura-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2024/11/11/genai-sicurezza-qualita-dei-dati-uomo-al-centro-impatto-sostenibile/</loc>
		<lastmod>2024-11-25T11:32:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/11/IA-netech.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2023/11/23/responsabilita-condivisa-di-microsoft-365/</loc>
		<lastmod>2024-11-25T11:59:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2023/11/Resp-Condivisa-M365.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/11/Resp-Condivisa-M365.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2021/04/01/accordo-di-collaborazione-tra-sapg-legal-tech-e-netech/</loc>
		<lastmod>2024-11-25T14:20:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2022/09/sapg-legal.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/11/sapg-legal.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2020/10/04/soluzioni-per-lo-smart-working/</loc>
		<lastmod>2024-11-25T14:21:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2022/09/smart-work.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/11/smart-work.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2024/03/08/limportanza-del-mdr-managed-detection-and-response-per-la-cyber-security-aziendale/</loc>
		<lastmod>2024-11-26T14:32:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/03/MDR-Netech.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/11/MDR-Netech.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2021/04/23/nasce-bcloud-services-la-nuova-rete-dimprese/</loc>
		<lastmod>2024-11-26T14:34:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2022/09/BCLOUD-SERVICES.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/11/BCLOUD-SERVICES.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/11/Soci-BcloudServices.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2022/07/NETECH_we-do-it-better_0.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2022/09/Logo-def-BCLOUD-300x200-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2022/09/download.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2023/09/19/sicurezza-delle-password-le-regole-del-nist-per-renderle-inattaccabili/</loc>
		<lastmod>2024-11-26T14:35:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2023/09/Protezione-password.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/11/Protezione-password.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2021/05/20/partnership-netech-darktrace/</loc>
		<lastmod>2024-11-26T14:36:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2021/05/03_netec-darktrace-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/11/00__netec-darktrace.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2023/09/19/gli-attacchi-informatici-sono-difficili-da-assicurare/</loc>
		<lastmod>2024-11-26T14:37:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2023/09/Cyber-Insurance-2016x1365px.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/11/Cyber-Insurance-2016x1365px.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2024/02/02/compleaano-netech-2024/</loc>
		<lastmod>2024-11-27T14:36:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/11/Compleanno-Netech-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/11/Compleanno-Netech-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2023/02/21/ricerca-darktrace-approccio-olistico-alla-cyber-security/</loc>
		<lastmod>2024-11-27T14:37:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2023/02/Approccio-olistico-alla-cyber-security.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2023/02/Approccio-olistico-alla-cyber-security.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2024/11/30/brute-force-attack-e-protezione-delle-password/</loc>
		<lastmod>2024-11-30T07:46:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/11/Netech-brute-force-attack-servizi-autenticazione-password-cybersecurity-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2024/12/13/cybersecurity-nella-convergenza-tra-ot-e-it-in-industria-5-0/</loc>
		<lastmod>2024-12-13T12:58:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/12/Netech-cybersecurity-convergenza-OT-IT-Industry-5.0.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2024/12/20/trend-2024-negli-attacchi-informatici-e-sicurezza-del-backup-dei-dati-aziendali/</loc>
		<lastmod>2024-12-20T12:58:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/12/Netech-trend-attacchi-informatici-Clusit-sicurezza-backup-dati.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/01/09/cybersecurity-e-gen-z-il-rischio-corre-via-app-mobile/</loc>
		<lastmod>2025-01-09T10:59:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/01/Netech-cybersecurity-Gen-Z-dispositivi-mobili.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/02/13/dora-e-nis2-per-la-resilienza-dei-fornitori-nelle-supply-chain/</loc>
		<lastmod>2025-02-13T17:18:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/02/Netech-cybersecurity-supply-chain-DORA-NIS2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/02/21/autopsia-di-un-attacco-reale-dallaccesso-alla-esfiltrazione-dei-dati-passando-per-lo-studio-della-rete/</loc>
		<lastmod>2025-02-21T14:33:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/02/cyberattack-analisi.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/02/28/difendersi-dal-ransomware-il-back-up-dei-dati-non-basta/</loc>
		<lastmod>2025-02-28T13:48:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/02/Netech-NDR-detection-and-response-difesa-attacchi-ransomware-segmentazione-rete-cybersecurity.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/03/06/tecnologie-di-ai-per-la-difesa-avanzata-dalle-nuove-minacce-cyber/</loc>
		<lastmod>2025-03-06T16:46:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/03/NETECH-tecnologie-AI-difesa-attacchi-informatici-cybersecurity.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/03/14/cyber-resilience-act-security-by-design-nei-prodotti-connessi/</loc>
		<lastmod>2025-03-14T14:02:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/03/Netech-Cyber-Resilience-Act-CRA-normative-cybersecurity-prodotti-connessi.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/03/21/allerta-raas-e-deepfake-come-proteggersi-in-azienda/</loc>
		<lastmod>2025-03-21T14:07:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/03/Netech-SOC-ransomware-as-a-service-infostealer.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/03/28/furto-di-identita-digitale-il-vishing-incontra-la-ai/</loc>
		<lastmod>2025-03-28T15:11:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/03/Netech-vishing.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/04/04/zero-trust-e-gestione-delle-identita-contro-le-insidie-del-malware/</loc>
		<lastmod>2025-04-04T12:53:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/04/Netech-zero-trust-furto-identita-digitale.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/04/11/cybersecurity-alle-soglie-della-rivoluzione-quantistica/</loc>
		<lastmod>2025-04-11T14:39:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/04/Netech-cybersecurity-quantum-computing-crittografia-quantistica.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/04/29/transizione-sicura-ai-sistemi-ai-per-le-aziende-europee-con-lai-pact/</loc>
		<lastmod>2025-04-29T13:56:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/04/Netech-AI-Pact-intelligenza-artificiale-UE.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/05/02/prepararsi-alla-rivoluzione-della-cybersecurity-post-quantum-con-la-crittografia-quantistica/</loc>
		<lastmod>2025-05-02T12:58:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/05/Netech-cybersecurity-crittografia-quantistica.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2024/02/06/intervista-a-gianluigi-monti-sales-manager-di-netech/</loc>
		<lastmod>2025-05-07T07:54:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/02/Intervista-Gianluigi-Monti.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/05/07/intervista-a-gianluigi-monti-sales-manager-di-netech-maggio-2025/</loc>
		<lastmod>2025-05-07T08:49:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/05/story-time-intervista-maggio-2025.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/05/14/la-cina-partner-alternativo-sempre-piu-interessante-nella-cybersecurity/</loc>
		<lastmod>2025-05-14T09:36:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/05/Netech-Cina-fornitore-alternativo-cybersecurity.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/05/21/caso-vmware-le-aziende-valutano-la-migrazione-ad-hypervisor-alternativi/</loc>
		<lastmod>2025-05-21T09:00:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/05/NETECH-migrazione-VMware-virtualizzazione-hypervisor.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/05/28/lefficacia-delle-strategie-mdr-riduce-la-permanenza/</loc>
		<lastmod>2025-05-28T09:24:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/05/NETECH-strategie-MDR-SOAR.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/06/03/backup-immutabile-asset-chiave-anche-negli-ambienti-cloud/</loc>
		<lastmod>2025-06-03T09:50:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/06/Netech-backup-immutabile-cloud.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/06/16/cybersecurity-tra-agenti-installati-e-agentless-nelle-reti-ot/</loc>
		<lastmod>2025-06-16T09:39:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/06/Netech-cybersecurity-soluzioni-NDR-agentless.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/06/26/protezione-della-rete-con-zero-trust-e-micro-segmentazione/</loc>
		<lastmod>2025-06-26T10:13:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/06/Netech-approccio-zero-trust-e-micro-segmentazione.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/07/08/competitivita-nel-mercato-cloud-europeo-cispe-presenta-lo-stato-dei-lavori/</loc>
		<lastmod>2025-07-08T15:55:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/07/Netech-Osservatorio-competitivita-mercato-cloud-europeo-CISPE.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2024/04/18/nms-group-protegge-dati-essenziali/</loc>
		<lastmod>2025-07-21T17:40:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/04/nms-blu.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/11/mns.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/04/mns_logoDXI.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/11/mns_02.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/04/NMS_logo_v2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/11/mns_03.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/04/Quantum_Corporation_logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/04/NMS_logo_v2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/01/logo-netech-case-study.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2024/02/20/itelyum-eset/</loc>
		<lastmod>2025-07-22T13:40:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/02/Itelyum.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/01/itelyum-footer.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/11/itelyum-purification.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/01/logo-eset.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/01/logo-itelyum.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/01/logo-netech-case-study.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2021/05/31/lombardini22/</loc>
		<lastmod>2025-07-22T13:43:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/11/data-center-world.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/11/data-center-world.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/11/6149fba78efa286debfedeb9_L22_TerrazzaNuova_03.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2022/07/DE.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2022/09/logo-lombardini22.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2021/05/27/itelyum/</loc>
		<lastmod>2025-07-22T13:46:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2021/05/purification_itelium.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2022/08/purification_itelium.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2021/05/26/infinidat/</loc>
		<lastmod>2025-07-22T13:48:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2022/09/infinidat.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/11/infinidat.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2022/09/netech-case-study-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2021/03/22/farmicol/</loc>
		<lastmod>2025-07-22T13:57:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2022/09/data-migration.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2024/11/data-migration.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2022/09/farmicol-data-center.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/07/23/furto-di-credenziali-e-identita-a-rischio-lattacco-parte-dal-log-in/</loc>
		<lastmod>2025-07-23T12:52:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/07/NETECH-infostealer-furto-identita-digitale.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/07/25/truffa-del-doppio-spid-come-proteggere-la-propria-identita-digitale/</loc>
		<lastmod>2025-07-25T08:48:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/07/NETECH-truffa-doppio-SPID-identita-digitale.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/08/04/ai-nelle-soluzioni-ndr-per-la-cyber-intelligence/</loc>
		<lastmod>2025-08-04T09:34:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/08/NETECH-tecniche-AI-correlazione-eventi-NDR.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/08/07/cybersecurity-leva-strategica-per-la-resilienza-della-supply-chain/</loc>
		<lastmod>2025-08-07T08:41:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/08/NETECH-Cybersecurity-leva-strategica-resilienza-supply-chain.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/02/03/ransomware-35-anni-di-attacchi/</loc>
		<lastmod>2025-08-07T15:49:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/02/Netech-35-anni-attacchi-ransomware-cybersecurity.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/09/02/segmentazione-per-la-protezione-delle-moderne-reti-iot/</loc>
		<lastmod>2025-09-02T08:22:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/09/Netech-segmentazione-della-rete-protezione-IoT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/10/01/prevenzione-e-blocco-dei-movimenti-laterali-con-la-segmentazione/</loc>
		<lastmod>2025-10-01T09:21:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/10/Netech-segmentazione-prevenzione-movimenti-laterali.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/10/08/segmentazione-della-rete-best-practices-per-un-approccio-zero-trust/</loc>
		<lastmod>2025-10-08T14:17:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/10/Netech-segmentazione-della-rete-zero-trust.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/10/28/virtualizzazione-container-e-migrazione-agile-dei-workload/</loc>
		<lastmod>2025-10-28T16:03:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/10/Netech-virtualizzazione-container-protezione-workload.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/10/31/i-rischi-della-mancata-protezione-dei-dati-personali-non-sensibili/</loc>
		<lastmod>2025-10-31T14:05:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/10/NETECH-protezione-dati-non-sensibili.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/11/07/sicurezza-della-rete-migliorata-e-dinamica-con-la-micro-segmentazione/</loc>
		<lastmod>2025-11-07T13:47:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/11/Netech-micro-segmentazione-della-rete-protezione-workload-multi-cloud.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/11/13/adempimenti-nis2-la-nuova-figura-del-referente-csirt/</loc>
		<lastmod>2025-11-13T15:04:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/11/Netech-NIS2-Referente-CSIRT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/11/25/il-60-degli-alert-di-cybersecurity-sara-gestito-dalla-ai-entro-tre-anni/</loc>
		<lastmod>2025-11-25T13:54:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/11/Netech-AI-supporto-attivita-rilevazione-minacce-SOC.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/12/01/la-cybersecurity-sale-di-grado-nelle-discussioni-strategiche-del-board/</loc>
		<lastmod>2025-12-01T15:40:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/12/Netech-discussione-cybersecurity-board-aziendale.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/12/05/best-practices-di-micro-segmentazione-della-rete/</loc>
		<lastmod>2025-12-05T13:28:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/12/micro-segmentazione-netech-scaled.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/12/17/cybersecurity-trend-in-crescita-per-numero-e-gravita-di-incidenti-informatici-nel-i-semestre-2025/</loc>
		<lastmod>2025-12-17T13:31:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/12/rapporto-Clusit-2025-scaled.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2025/12/23/hacktivism-in-testa-tra-gli-incidenti-informatici-in-italia-nel-2025/</loc>
		<lastmod>2025-12-23T14:15:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2025/12/Rapporto-Clusit-Italia-scaled.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2026/01/12/sinergie-uomo-ai-contro-il-cybercrime-industrializzato-nel-2026/</loc>
		<lastmod>2026-01-12T14:08:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2026/01/Netech-sinergia-AI-esperti-SOC-contro-il-cybercrime-scaled.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2026/01/16/misure-di-sicurezza-di-base-e-notifica-incidenti-nuove-specifiche-per-la-nis-2/</loc>
		<lastmod>2026-01-16T13:55:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2026/01/Netech-specifiche-misure-minime-cybersecurity-notifiche-incidenti-NIS-2-scaled.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2026/01/27/formazione-e-detection-response-evoluta-per-contrastare-ai-agentica-e-deepfake/</loc>
		<lastmod>2026-01-27T14:54:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2026/01/Netech-trend-2026-AI-agentica-deepfake-minacce-informatiche-scaled.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2026/02/03/micro-segmentazione-dei-workload-e-sicurezza-agile-in-ztna/</loc>
		<lastmod>2026-02-03T15:16:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2026/02/micro-segmentazione-e-ZTNA-scaled.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2026/02/11/ispezioni-di-sicurezza-per-le-aziende-nis-2-valgono-diligenza-e-tempestivita-nel-notificare/</loc>
		<lastmod>2026-02-11T17:41:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2026/02/Netech-ispezioni-misure-cybersecurity-NIS2-scaled.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2026/02/17/sicurezza-ot-nelle-infrastrutture-critiche-le-lacune-piu-diffuse/</loc>
		<lastmod>2026-02-17T15:10:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2026/02/Netech-lacune-cybersecurity-OT-infrastrutture-critiche-scaled.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2026/02/24/sfide-pratiche-nella-dora-compliance-a-un-anno-di-operativita/</loc>
		<lastmod>2026-02-24T10:33:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2026/02/Netech-sfide-pratiche-compliance-regolamento-DORA-cybersecurity-scaled.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2026/03/05/prove-forensi-e-fattore-tempo-nelle-prime-fasi-di-un-attacco-cyber/</loc>
		<lastmod>2026-03-05T13:47:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2026/03/Netech-prove-forensi-incidenti-informatici-scaled.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2026/03/10/sovranita-nei-servizi-cloud-lhosting-locale-dei-dati-non-basta/</loc>
		<lastmod>2026-03-10T15:57:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2026/03/Netech-requisiti-sovranita-cloud-scaled.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2026/03/17/vishing-e-strumenti-di-attacco-automatizzati-minacciano-gli-ambienti-cloud/</loc>
		<lastmod>2026-03-17T15:28:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2026/03/Netech-attacchi-vishing-applicazioni-SaaS-cloud-scaled.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.netech-solution.it/2026/03/30/guida-applicativa-dellue-al-cyber-resilience-act-per-i-prodotti-digitali/</loc>
		<lastmod>2026-03-30T14:32:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2026/03/Netech-guida-applicativa-UE-cyber-resilience-act.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.netech-solution.it/wp-content/uploads/2026/03/NETECH-cybdersecurity-confronto-normative-NIS2-CER-Cyber-Resiliece-Act-scaled.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->