{"id":12,"date":"2024-10-24T17:21:00","date_gmt":"2024-10-24T17:21:00","guid":{"rendered":"https:\/\/deltacontrols.wpenginepowered.com\/?page_id=12"},"modified":"2025-07-21T10:22:56","modified_gmt":"2025-07-21T17:22:56","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/dev.deltacontrols.com\/it\/programs-services\/cybersecurity\/","title":{"rendered":"Sicurezza informatica"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"12\" class=\"elementor elementor-12\" data-elementor-post-type=\"page\">\n\t\t\t\t<section class=\"elementor-element elementor-element-07ac068 e-flex e-con-boxed e-con e-parent\" data-id=\"07ac068\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/section>\n\t\t<section class=\"elementor-element elementor-element-c179522 e-flex e-con-boxed e-con e-parent\" data-id=\"c179522\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2537ae6 e-con-full e-flex e-con e-child\" data-id=\"2537ae6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9480aae elementor-widget elementor-widget-heading\" data-id=\"9480aae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Programma di sicurezza informatica di Delta  Controls<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5ab5ac4 e-con-full e-flex e-con e-child\" data-id=\"5ab5ac4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ef71dd elementor-widget elementor-widget-text-editor\" data-id=\"5ef71dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Delta Controls si impegna a fornire soluzioni innovative, efficienti e semplici da implementare, e il nostro programma di sicurezza informatica non \u00e8 da meno.<\/p><p>Gli attuali sistemi di controllo della struttura sono sempre pi\u00f9 connessi e, con l'aumento del numero dei dispositivi online, ci aspettiamo una connettivit\u00e0 sempre maggiore. Ci\u00f2 comporta un aumento del rischio di esposizione a vulnerabilit\u00e0 e minacce.<\/p><p>Attraverso standard industriali come OWASP, ISO, e NIST, Delta Controls dispone delle politiche, delle procedure e dei controlli necessari per garantire la consegna di prodotti sicuri. Ci impegniamo a garantire che le reti delle nostre strutture restino protette grazie a buone pratiche di integrazione informatica, una valutazione costante dei prodotti e tempestivi aggiornamenti delle sicurezza.<\/p><p>Le squadre di sicurezza informatica di Delta Controls sono pronte ad aiutarti ad affrontare le vulnerabilit\u00e0 e le sfide quotidiane alla sicurezza. Scopri in basso come ottenere maggiori informazioni e partecipare al nostro programma di sicurezza informatica.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/section>\n\t\t<section class=\"elementor-element elementor-element-f89debd e-flex e-con-boxed e-con e-parent\" data-id=\"f89debd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a2814e9 e-con-full e-flex e-con e-child\" data-id=\"a2814e9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c700873 elementor-widget elementor-widget-heading\" data-id=\"c700873\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Missione e visione della sicurezza informatica<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d5ecab6 e-con-full e-flex e-con e-child\" data-id=\"d5ecab6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a844297 elementor-widget elementor-widget-text-editor\" data-id=\"a844297\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>La nostra missione<\/strong><\/p><p>Gestire la sicurezza delle informazioni dei clienti, i dati dei dipendenti, la propriet\u00e0 intellettuale e altre risorse che supportano tutte le aree di Delta Controls e contrastare in modo efficace tutti i tentativi di attacchi informatici, evitando la perdita dei dati.<\/p><p><strong>La nostra visione<\/strong><\/p><p>Una infrastruttura delle informazioni sicura che favorisce le innovazioni tecnologiche e la crescita, senza tempi di fermo.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-1b82e1b e-flex e-con-boxed e-con e-parent\" data-id=\"1b82e1b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2f1ee67 elementor-widget elementor-widget-heading\" data-id=\"2f1ee67\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Soluzioni basate sulla tecnologia<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<section class=\"elementor-element elementor-element-c1af91d e-flex e-con-boxed e-con e-parent\" data-id=\"c1af91d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-fd0aef8 e-con-full e-flex e-con e-child\" data-id=\"fd0aef8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f5cb9d9 elementor-widget elementor-widget-heading\" data-id=\"f5cb9d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ciclo di vita sicuro dello sviluppo software Delta Controls <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5b9e078 e-con-full e-flex e-con e-child\" data-id=\"5b9e078\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-457fe19 e-con-full e-flex e-con e-child\" data-id=\"457fe19\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f4ef1ad elementor-widget elementor-widget-image\" data-id=\"f4ef1ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"337\" height=\"424\" src=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/CyberSecurity-Icon.jpg\" class=\"attachment-full size-full wp-image-207\" alt=\"\" srcset=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/CyberSecurity-Icon.jpg 337w, https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/CyberSecurity-Icon-238x300.jpg 238w\" sizes=\"(max-width: 337px) 100vw, 337px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-665e2cc e-con-full e-flex e-con e-child\" data-id=\"665e2cc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-455cfcd text-list elementor-widget elementor-widget-text-editor\" data-id=\"455cfcd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Il team di sviluppo di Delta Controls crea prodotti in un ambiente di sviluppo sicuro, fondato su standard  e  migliori pratiche di sicurezza informatica. Come per il nostro programma della qualit\u00e0, integriamo la sicurezza informatica nei nostri prodotti in ogni fase di produzione. Dall'ideazione al rilascio del prodotto, la sicurezza \u00e8 sempre la nostra priorit\u00e0.<\/p><ul><li>Team di sicurezza dedicato allo sviluppo dei prodotti<\/li><li>Peer review periodiche per le vulnerabilit\u00e0 di codifica<\/li><li>Sicurezza integrata nei requisiti del prodotto<\/li><li>Test della sicurezza del prodotto con gli strumenti e le tecniche pi\u00f9 recenti<\/li><li>Prodotti sviluppati utilizzando i pi\u00f9 recenti software di sicurezza di terzi<\/li><li>Vulnerabilit\u00e0 segnalate in tempi rapidi<\/li><li>Migliori pratiche per code base e repository sicuri<\/li><li>Guide per la protezione avanzata del prodotto<\/li><li>Migliori pratiche basate su OWASP, ISO 27002 e IEC 62443 4-1<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/section>\n\t\t<section class=\"elementor-element elementor-element-ba981df e-flex e-con-boxed e-con e-parent\" data-id=\"ba981df\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ec0ddd8 e-con-full e-flex e-con e-child\" data-id=\"ec0ddd8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-67293e6 elementor-widget elementor-widget-heading\" data-id=\"67293e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Consulenti per la sicurezza di Delta Controls<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a6b71b3 elementor-widget elementor-widget-text-editor\" data-id=\"a6b71b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La comunicazione e condivisione delle informazioni \u00e8 una componente essenziale del nostro programma di sicurezza informatica. Delta Controls offre i seguenti consigli per aiutarti a gestire e affrontare i rischi per la sicurezza dei tuoi siti.<\/p><p>Delta Controls monitora e segnala le minacce alla sicurezza informatica per far s\u00ec che i clienti possano prendere le contromisure necessarie o collaborare con un Partner locale per mantenere sicura la rete della propria sede.<\/p><p>Monitorare questi avvertimenti e prendere le misure necessarie \u00e8 cruciale per garantire che i tuoi siti siano il pi\u00f9 sicuri possibile. La sicurezza informatica \u00e8 una responsabilit\u00e0 di tutti. Il nostro team addetto alla sicurezza informatica e il  Partner locale di Delta Controls nella tua zona sono pronti ad aiutarti ad affrontare sfide e dubbi relativi alla sicurezza.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-58d7271 e-con-full e-flex e-con e-child\" data-id=\"58d7271\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-bfc941b e-con-full e-flex e-con e-child\" data-id=\"bfc941b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1888bdb elementor-align-justify main-btn elementor-widget elementor-widget-button\" data-id=\"1888bdb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6IjMyMzA5IiwidG9nZ2xlIjpmYWxzZX0%3D\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Partecipa alla Comunicazione sulla sicurezza informatica<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bfd1600 e-con-full e-flex e-con e-child\" data-id=\"bfd1600\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-661cdac elementor-widget elementor-widget-image\" data-id=\"661cdac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"400\" height=\"72\" src=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/Cybersecurity_web_logo.png\" class=\"attachment-large size-large wp-image-206\" alt=\"\" srcset=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/Cybersecurity_web_logo.png 400w, https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/Cybersecurity_web_logo-300x54.png 300w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f46e17d e-con-full e-flex e-con e-child\" data-id=\"f46e17d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2289343 elementor-align-justify main-btn elementor-widget elementor-widget-button\" data-id=\"2289343\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/dev.deltacontrols.com\/it\/vulnerability-reporting-and-handling\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Segnala vulnerabilit\u00e0<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/section>\n\t\t<section class=\"elementor-element elementor-element-2d46dd1 e-flex e-con-boxed e-con e-parent\" data-id=\"2d46dd1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-151c6b9 e-con-full e-flex e-con e-child\" data-id=\"151c6b9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3657aa1 elementor-widget elementor-widget-heading\" data-id=\"3657aa1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Bollettini di sicurezza per i prodotti Delta Controls<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1a82f01 e-con-full e-flex e-con e-child\" data-id=\"1a82f01\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9e6142f elementor-widget elementor-widget-shortcode\" data-id=\"9e6142f\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"responsive-1\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n<table id=\"tablepress-1\" class=\"tablepress tablepress-id-1\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\">Data<\/th><th class=\"column-2\">Number<\/th><th class=\"column-3\">Prodotto<\/th><th class=\"column-4\">Descrizione<\/th><th class=\"column-5\">Allegato<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">12 luglio 2025<\/td><td class=\"column-2\">SecB0013<\/td><td class=\"column-3\">enteliWEB (non interessato)<\/td><td class=\"column-4\">CVE-2024-21147 \u00e8 una vulnerabilit\u00e0 ad alto rischio (CVSS 7.4) che interessa Java HotSpot Virtual Machine in Oracle Java e distribuzioni compatibili come Amazon Corretto. Questa vulnerabilit\u00e0 potrebbe consentire agli aggressori remoti di compromettere le applicazioni basate su Java in condizioni specifiche che comportano una deserializzazione non sicura o una gestione errata degli input.<\/td><td class=\"column-5\"><a class=\"download-link\" target=\"_blank\" href=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/SecB0013_Security_Bulletin.pdf\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">22 maggio 2025<\/td><td class=\"column-2\">SecB0012<\/td><td class=\"column-3\">Niagara Framework, Niagara Enterprise Security<\/td><td class=\"column-4\">Aggiorna il software Niagara per gestire numerose vulnerabilit\u00e0 identificate nel Niagara Framework \u00ae<\/td><td class=\"column-5\"><a class=\"download-link\" target=\"_blank\" href=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/SecB0012_Security_Bulletin.pdf\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">27 gennaio 2025<\/td><td class=\"column-2\">SecB0011<\/td><td class=\"column-3\">enteliWEB<\/td><td class=\"column-4\">Durante la navigazione in enteliWEB con Google Chrome, ad alcuni utenti \u00e8 comparso il messaggio di avviso \"Sito pericoloso\".<\/td><td class=\"column-5\"><a class=\"download-link\" target=\"_blank\" href=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/SecB0011_Google-Dangerous-Sites-Security-Bulletin-.pdf\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">14 giugno 2024<\/td><td class=\"column-2\">SecB0010<\/td><td class=\"column-3\">enteliWEB<\/td><td class=\"column-4\">Nelle versioni PHP precedenti alla 3.5, quando si usa Apache e PHP-CGI in Windows, se il sistema \u00e8 impostato per usare determinate pagine di codice, Windows potrebbe utilizzare il comportamento \"Best-Fit\" per sostituire i caratteri della riga di comando dati alle funzioni WinHI API. Il modulo PHP CGI potrebbe fraintendere tali caratteri come opzioni di PHP, e questo potrebbe consentire a un utente malintenzionato di passare le opzioni a un codice binario di PHP in esecuzione e quindi rivelare il codice sorgente degli script, eseguire codice PHP arbitrario sul server, ecc.<\/td><td class=\"column-5\"><a class=\"download-link\" target=\"_blank\" href=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/SecB0010_Security_Bulletin.pdf\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">22 gennaio 2024<\/td><td class=\"column-2\">SecB0009<\/td><td class=\"column-3\">Niagara Tridium<\/td><td class=\"column-4\">Il Niagara Framework\u00ae \u00e8 stato aggiornato per risolvere una vulnerabilit\u00e0 nel componente libwebp utilizzato da jxBrowser. <\/td><td class=\"column-5\"><a class=\"download-link\" href=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/SecB0009_Security_Bulletin.pdf\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">31 ottobre \u200b\u200b\u200b\u200b\u200b\u200b2023<\/td><td class=\"column-2\">SecB0008<\/td><td class=\"column-3\">enteliSYNC<\/td><td class=\"column-4\">\u00c8 stato riscontrato un difetto nelle versioni di PostgreSQL precedenti alle versioni 13.1, 12.5, 11.10, 10.15, 9.6.20 e 9.5.24.<\/td><td class=\"column-5\"><a class=\"download-link\" target=\"_blank\" href=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/SecB0008_Security_Bulletin.pdf\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\">16 ottobre \u200b\u200b\u200b\u200b\u200b\u200b2023<\/td><td class=\"column-2\">SecB0007<\/td><td class=\"column-3\">enteliCLOUD<\/td><td class=\"column-4\">Un fornitore di soluzioni di threat intelligence e mitigazione ha erroneamente individuato enteliCLOUD.com come una minaccia di phishing.<\/td><td class=\"column-5\"><a class=\"download-link\" target=\"_blank\" href=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/SecB0007_Security_Bulletin.pdf\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\">16 nov. 2022<\/td><td class=\"column-2\">SecB0006<\/td><td class=\"column-3\">Open SSL Ver. 3.0.0-3.0.6<\/td><td class=\"column-4\">CVE-2022-3786 E CVE-2022-3602<\/td><td class=\"column-5\"><a class=\"download-link\" href=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/SecB0006_Security_Bulletin.pdf\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\">3 febbraio 2022<\/td><td class=\"column-2\">SecB005<\/td><td class=\"column-3\">CopperCube<\/td><td class=\"column-4\">Vulnerabilit\u00e0 dell'utilit\u00e0 di sistema pkexec di CVE-2021-4034 Polkit<\/td><td class=\"column-5\"><a class=\"download-link\" target=\"_blank\" href=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/SecB0005_Security_Bulletin.pdf\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\">21 gennaio 2020<\/td><td class=\"column-2\">SecB003<\/td><td class=\"column-3\">enteliWEB versione 4.13<\/td><td class=\"column-4\">Contiene una vulnerabilit\u00e0 di attraversamento del percorso dei file che consente agli utenti enteliWEB autenticati di accedere ai file sul server<\/td><td class=\"column-5\"><a class=\"download-link\" target=\"_blank\" href=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/SecB0003_Security_Bulletin-enteliWEB-File-path.pdf\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\">10 settembre 2019<\/td><td class=\"column-2\">SecB002<\/td><td class=\"column-3\">Workbench e supervisore Delta N4 Controlli Delta JACE<br \/>\nDelta JACE controllers<\/td><td class=\"column-4\">Vulnerabilit\u00e0 Niagara JACE, Edge 10 QNX<\/td><td class=\"column-5\"><a class=\"download-link\"  target=\"_blank\" href=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/SecB0002_Security_Bulletin-Tridium.pdf\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-13\">\n\t<td class=\"column-1\">18 luglio 2019<\/td><td class=\"column-2\">SecB001<\/td><td class=\"column-3\">enteliBUS\t<\/td><td class=\"column-4\">I controlli enteliBUS con firmware 3.40 R5 versione 571848 o precedenti contengono una vulnerabilit\u00e0 di buffer overflow che permette l'esecuzione del codice da remoto<\/td><td class=\"column-5\"><a class=\"download-link\" target=\"_blank\" href=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/SecB0001_Security_Bulletin.pdf\">PDF<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-1 from cache --><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-82f8fe9 e-con-full e-flex e-con e-child\" data-id=\"82f8fe9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<section class=\"elementor-element elementor-element-2ad72c8 e-con-full e-flex e-con e-child\" data-id=\"2ad72c8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7368978 e-con-full e-flex e-con e-child\" data-id=\"7368978\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-53588e1 elementor-widget elementor-widget-heading\" data-id=\"53588e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Novit\u00e0 sulla sicurezza informatica<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-edfdb99 elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-card-shadow-yes elementor-posts__hover-gradient load-more-align-center elementor-widget elementor-widget-posts\" data-id=\"edfdb99\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;pagination_type&quot;:&quot;load_more_on_click&quot;,&quot;cards_columns&quot;:&quot;3&quot;,&quot;cards_columns_tablet&quot;:&quot;2&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;cards_row_gap_widescreen&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_tablet_extra&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile_extra&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;load_more_spinner&quot;:{&quot;value&quot;:&quot;fas fa-spinner&quot;,&quot;library&quot;:&quot;fa-solid&quot;}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-32300 post type-post status-publish format-standard has-post-thumbnail hentry category-cybersecurity category-events\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/dev.deltacontrols.com\/it\/news-events\/cybersecurity\/apache-foundation-log4j-2-vulnerability-cve-2021-44228\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img decoding=\"async\" width=\"644\" height=\"401\" src=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/delta-controls-logo-no-background-1.png\" class=\"attachment-medium_large size-medium_large wp-image-22\" alt=\"\" srcset=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/delta-controls-logo-no-background-1.png 644w, https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/delta-controls-logo-no-background-1-300x187.png 300w\" sizes=\"(max-width: 644px) 100vw, 644px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/dev.deltacontrols.com\/it\/news-events\/cybersecurity\/apache-foundation-log4j-2-vulnerability-cve-2021-44228\/\" >\n\t\t\t\tVulnerabilit\u00e0 Apache Foundation Log4j 2 (CVE-2021-44228)\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/dev.deltacontrols.com\/it\/news-events\/cybersecurity\/apache-foundation-log4j-2-vulnerability-cve-2021-44228\/\" aria-label=\"Leggi tutto Apache Foundation Log4j 2 Vulnerability (CVE-2021-44228)\" tabindex=\"-1\" >\n\t\t\tContinua \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tDicembre 14, 2021\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-18885 post type-post status-publish format-standard has-post-thumbnail hentry category-cybersecurity category-events category-general\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/dev.deltacontrols.com\/it\/news-events\/general\/dci-care-packages\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"644\" height=\"363\" src=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/care-packages.jpg\" class=\"attachment-medium_large size-medium_large wp-image-31898\" alt=\"\" srcset=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/care-packages.jpg 644w, https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/care-packages-300x169.jpg 300w\" sizes=\"(max-width: 644px) 100vw, 644px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/dev.deltacontrols.com\/it\/news-events\/general\/dci-care-packages\/\" >\n\t\t\t\tPacchetti di assistenza Delta Controls: fare le cose come si deve\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/dev.deltacontrols.com\/it\/news-events\/general\/dci-care-packages\/\" aria-label=\"Leggi tutto Delta Controls Care Packages- Doing It Right\" tabindex=\"-1\" >\n\t\t\tContinua \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tAprile 13, 2021\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-18421 post type-post status-publish format-standard has-post-thumbnail hentry category-cybersecurity category-events category-featured\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/dev.deltacontrols.com\/it\/news-events\/featured\/robert-hemmerdinger-featured-on-iot-for-all\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"644\" height=\"363\" src=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/iotforall.jpg\" class=\"attachment-medium_large size-medium_large wp-image-31899\" alt=\"\" srcset=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/iotforall.jpg 644w, https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/iotforall-300x169.jpg 300w\" sizes=\"(max-width: 644px) 100vw, 644px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/dev.deltacontrols.com\/it\/news-events\/featured\/robert-hemmerdinger-featured-on-iot-for-all\/\" >\n\t\t\t\tRobert Hemmerdinger su IoT For All\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/dev.deltacontrols.com\/it\/news-events\/featured\/robert-hemmerdinger-featured-on-iot-for-all\/\" aria-label=\"Leggi tutto Robert Hemmerdinger featured on IoT For All\" tabindex=\"-1\" >\n\t\t\tContinua \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tMarzo 16, 2021\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-17056 post type-post status-publish format-standard has-post-thumbnail hentry category-awards category-cybersecurity category-events\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/dev.deltacontrols.com\/it\/news-events\/awards\/cv-magazine-awards-2020\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"644\" height=\"363\" src=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/CV.jpg\" class=\"attachment-medium_large size-medium_large wp-image-31902\" alt=\"\" srcset=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/CV.jpg 644w, https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/CV-300x169.jpg 300w\" sizes=\"(max-width: 644px) 100vw, 644px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/dev.deltacontrols.com\/it\/news-events\/awards\/cv-magazine-awards-2020\/\" >\n\t\t\t\tMigliore azienda 2020 di sistemi di automazione delle strutture commerciali\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/dev.deltacontrols.com\/it\/news-events\/awards\/cv-magazine-awards-2020\/\" aria-label=\"Leggi tutto Best Commercial Building Automation Systems Company 2020\" tabindex=\"-1\" >\n\t\t\tContinua \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tGennaio 5, 2021\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-31855 post type-post status-publish format-standard has-post-thumbnail hentry category-cybersecurity category-events category-general category-updates\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/dev.deltacontrols.com\/it\/news-events\/general\/o3-sensor-us-patent-approva\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"571\" height=\"321\" src=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/AwardWinning-O3-2021-cover.jpg\" class=\"attachment-medium_large size-medium_large wp-image-31856\" alt=\"\" srcset=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/AwardWinning-O3-2021-cover.jpg 571w, https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/AwardWinning-O3-2021-cover-300x169.jpg 300w\" sizes=\"(max-width: 571px) 100vw, 571px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/dev.deltacontrols.com\/it\/news-events\/general\/o3-sensor-us-patent-approva\/\" >\n\t\t\t\tL'importanza dell'approvazione del brevetto americano per il nostro premiato O3 Sensor\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/dev.deltacontrols.com\/it\/news-events\/general\/o3-sensor-us-patent-approva\/\" aria-label=\"Leggi tutto The Significance of Our Award-Winning O3 Sensor\u2019s US Patent Approval\" tabindex=\"-1\" >\n\t\t\tContinua \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tDicembre 14, 2020\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-16872 post type-post status-publish format-standard has-post-thumbnail hentry category-cybersecurity category-events category-updates\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/dev.deltacontrols.com\/it\/news-events\/updates\/automatedbuildings-vcon\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"644\" height=\"401\" src=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/RoberH-COVER.jpg\" class=\"attachment-medium_large size-medium_large wp-image-32179\" alt=\"\" srcset=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/RoberH-COVER.jpg 644w, https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/RoberH-COVER-300x187.jpg 300w\" sizes=\"(max-width: 644px) 100vw, 644px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/dev.deltacontrols.com\/it\/news-events\/updates\/automatedbuildings-vcon\/\" >\n\t\t\t\tDomande e risposte AutomatedBuildings.com con Delta Controls\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/dev.deltacontrols.com\/it\/news-events\/updates\/automatedbuildings-vcon\/\" aria-label=\"Leggi tutto AutomatedBuildings.com Q&#038;A with Delta Controls\" tabindex=\"-1\" >\n\t\t\tContinua \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tDicembre 1, 2020\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\t\t\t<span class=\"e-load-more-spinner\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-spinner\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M304 48c0 26.51-21.49 48-48 48s-48-21.49-48-48 21.49-48 48-48 48 21.49 48 48zm-48 368c-26.51 0-48 21.49-48 48s21.49 48 48 48 48-21.49 48-48-21.49-48-48-48zm208-208c-26.51 0-48 21.49-48 48s21.49 48 48 48 48-21.49 48-48-21.49-48-48-48zM96 256c0-26.51-21.49-48-48-48S0 229.49 0 256s21.49 48 48 48 48-21.49 48-48zm12.922 99.078c-26.51 0-48 21.49-48 48s21.49 48 48 48 48-21.49 48-48c0-26.509-21.491-48-48-48zm294.156 0c-26.51 0-48 21.49-48 48s21.49 48 48 48 48-21.49 48-48c0-26.509-21.49-48-48-48zM108.922 60.922c-26.51 0-48 21.49-48 48s21.49 48 48 48 48-21.49 48-48-21.491-48-48-48z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\n\t\t\t\t<div class=\"e-load-more-anchor\" data-page=\"1\" data-max-page=\"4\" data-next-page=\"https:\/\/dev.deltacontrols.com\/it\/wp-json\/wp\/v2\/pages\/12\/page\/2\/\"><\/div>\n\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Carica altri articoli<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<div class=\"e-load-more-message\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Delta Controls Cybersecurity Program Delta Controls has always focused our efforts on providing solutions that are innovative, responsive, and easy to implement, and our cybersecurity program is no different. The<\/p>","protected":false},"author":1,"featured_media":209,"parent":31400,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-12","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.9 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity | Delta Controls<\/title>\n<meta name=\"description\" content=\"Delta\u2019s built-in cybersecurity protects your BAS with secure-by-design hardware, software, and protocols that meet global standards.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dev.deltacontrols.com\/it\/programs-services\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Delta\u2019s built-in cybersecurity protects your BAS with secure-by-design hardware, software, and protocols that meet global standards.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dev.deltacontrols.com\/it\/programs-services\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Delta Intelligent Building Technologies (Canada) Inc.\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-21T17:22:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/Cybersecurity-Web-Banner.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2249\" \/>\n\t<meta property=\"og:image:height\" content=\"555\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@deltacontrols\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/dev.deltacontrols.com\\\/programs-services\\\/cybersecurity\\\/\",\"url\":\"https:\\\/\\\/dev.deltacontrols.com\\\/programs-services\\\/cybersecurity\\\/\",\"name\":\"Cybersecurity | Delta Controls\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dev.deltacontrols.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/dev.deltacontrols.com\\\/programs-services\\\/cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/dev.deltacontrols.com\\\/programs-services\\\/cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/dev.deltacontrols.com\\\/wp-content\\\/uploads\\\/Cybersecurity-Web-Banner.jpg\",\"datePublished\":\"2024-10-24T17:21:00+00:00\",\"dateModified\":\"2025-07-21T17:22:56+00:00\",\"description\":\"Delta\u2019s built-in cybersecurity protects your BAS with secure-by-design hardware, software, and protocols that meet global standards.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/dev.deltacontrols.com\\\/programs-services\\\/cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/dev.deltacontrols.com\\\/programs-services\\\/cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/dev.deltacontrols.com\\\/programs-services\\\/cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/dev.deltacontrols.com\\\/wp-content\\\/uploads\\\/Cybersecurity-Web-Banner.jpg\",\"contentUrl\":\"https:\\\/\\\/dev.deltacontrols.com\\\/wp-content\\\/uploads\\\/Cybersecurity-Web-Banner.jpg\",\"width\":2249,\"height\":555},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/dev.deltacontrols.com\\\/programs-services\\\/cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/dev.deltacontrols.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Programs &#038; Services\",\"item\":\"https:\\\/\\\/dev.deltacontrols.com\\\/programs-services\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/dev.deltacontrols.com\\\/#website\",\"url\":\"https:\\\/\\\/dev.deltacontrols.com\\\/\",\"name\":\"Delta Intelligent Building Technologies (Canada) Inc.\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/dev.deltacontrols.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/dev.deltacontrols.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/dev.deltacontrols.com\\\/#organization\",\"name\":\"Delta Intelligent Building Technologies (Canada) Inc.\",\"url\":\"https:\\\/\\\/dev.deltacontrols.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/dev.deltacontrols.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/dev.deltacontrols.com\\\/wp-content\\\/uploads\\\/Delta-Controls-Logo-2024-RGB_WhiteWithRed.png\",\"contentUrl\":\"https:\\\/\\\/dev.deltacontrols.com\\\/wp-content\\\/uploads\\\/Delta-Controls-Logo-2024-RGB_WhiteWithRed.png\",\"width\":1124,\"height\":542,\"caption\":\"Delta Intelligent Building Technologies (Canada) Inc.\"},\"image\":{\"@id\":\"https:\\\/\\\/dev.deltacontrols.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/deltacontrols\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/delta-controls\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity | Delta Controls","description":"Delta\u2019s built-in cybersecurity protects your BAS with secure-by-design hardware, software, and protocols that meet global standards.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dev.deltacontrols.com\/it\/programs-services\/cybersecurity\/","og_locale":"it_IT","og_type":"article","og_title":"Cybersecurity","og_description":"Delta\u2019s built-in cybersecurity protects your BAS with secure-by-design hardware, software, and protocols that meet global standards.","og_url":"https:\/\/dev.deltacontrols.com\/it\/programs-services\/cybersecurity\/","og_site_name":"Delta Intelligent Building Technologies (Canada) Inc.","article_modified_time":"2025-07-21T17:22:56+00:00","og_image":[{"width":2249,"height":555,"url":"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/Cybersecurity-Web-Banner.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@deltacontrols","twitter_misc":{"Est. reading time":"3 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/dev.deltacontrols.com\/programs-services\/cybersecurity\/","url":"https:\/\/dev.deltacontrols.com\/programs-services\/cybersecurity\/","name":"Cybersecurity | Delta Controls","isPartOf":{"@id":"https:\/\/dev.deltacontrols.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dev.deltacontrols.com\/programs-services\/cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/dev.deltacontrols.com\/programs-services\/cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/Cybersecurity-Web-Banner.jpg","datePublished":"2024-10-24T17:21:00+00:00","dateModified":"2025-07-21T17:22:56+00:00","description":"Delta\u2019s built-in cybersecurity protects your BAS with secure-by-design hardware, software, and protocols that meet global standards.","breadcrumb":{"@id":"https:\/\/dev.deltacontrols.com\/programs-services\/cybersecurity\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dev.deltacontrols.com\/programs-services\/cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/dev.deltacontrols.com\/programs-services\/cybersecurity\/#primaryimage","url":"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/Cybersecurity-Web-Banner.jpg","contentUrl":"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/Cybersecurity-Web-Banner.jpg","width":2249,"height":555},{"@type":"BreadcrumbList","@id":"https:\/\/dev.deltacontrols.com\/programs-services\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dev.deltacontrols.com\/"},{"@type":"ListItem","position":2,"name":"Programs &#038; Services","item":"https:\/\/dev.deltacontrols.com\/programs-services\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/dev.deltacontrols.com\/#website","url":"https:\/\/dev.deltacontrols.com\/","name":"Delta Intelligent Building Technologies (Canada) Inc.","description":"","publisher":{"@id":"https:\/\/dev.deltacontrols.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dev.deltacontrols.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/dev.deltacontrols.com\/#organization","name":"Delta Intelligent Building Technologies (Canada) Inc.","url":"https:\/\/dev.deltacontrols.com\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/dev.deltacontrols.com\/#\/schema\/logo\/image\/","url":"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/Delta-Controls-Logo-2024-RGB_WhiteWithRed.png","contentUrl":"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/Delta-Controls-Logo-2024-RGB_WhiteWithRed.png","width":1124,"height":542,"caption":"Delta Intelligent Building Technologies (Canada) Inc."},"image":{"@id":"https:\/\/dev.deltacontrols.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/deltacontrols","https:\/\/www.linkedin.com\/company\/delta-controls"]}]}},"featured_image_src":"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/Cybersecurity-Web-Banner-600x400.jpg","featured_image_src_square":"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/Cybersecurity-Web-Banner-600x555.jpg","_links":{"self":[{"href":"https:\/\/dev.deltacontrols.com\/it\/wp-json\/wp\/v2\/pages\/12","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dev.deltacontrols.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dev.deltacontrols.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dev.deltacontrols.com\/it\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dev.deltacontrols.com\/it\/wp-json\/wp\/v2\/comments?post=12"}],"version-history":[{"count":0,"href":"https:\/\/dev.deltacontrols.com\/it\/wp-json\/wp\/v2\/pages\/12\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/dev.deltacontrols.com\/it\/wp-json\/wp\/v2\/pages\/31400"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dev.deltacontrols.com\/it\/wp-json\/wp\/v2\/media\/209"}],"wp:attachment":[{"href":"https:\/\/dev.deltacontrols.com\/it\/wp-json\/wp\/v2\/media?parent=12"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}