{"id":5044,"date":"2025-02-20T10:16:33","date_gmt":"2025-02-20T10:16:33","guid":{"rendered":"https:\/\/r1group.it\/eventi\/cyber-bee-and-cyberoo-new-remediation-techniques-and-nis2\/"},"modified":"2025-02-20T10:16:33","modified_gmt":"2025-02-20T10:16:33","slug":"cyber-bee-and-cyberoo-new-remediation-techniques-and-nis2","status":"publish","type":"eventi","link":"https:\/\/r1group.it\/en\/eventi\/cyber-bee-and-cyberoo-new-remediation-techniques-and-nis2\/","title":{"rendered":"Cyber-Bee and Cyberoo: New Remediation Techniques and NIS2"},"content":{"rendered":"<p>With 2025 just around the corner, which promises increasingly stringent regulations and a growing <strong>cyber insecurity<\/strong> landscape, companies cannot be satisfied with basic security solutions.<\/p>\n<p>During the event, experts from Cyber-Bee and Cyberoo explored cyber-related topics such as chain of rescue, MDR solutions and more with the goal of innovating business by protecting it.<\/p>\n","protected":false},"featured_media":4716,"template":"","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":""},"tag-evento":[144],"class_list":["post-5044","eventi","type-eventi","status-publish","has-post-thumbnail","hentry","tag-evento-cyber-bee"],"acf":[],"_links":{"self":[{"href":"https:\/\/r1group.it\/en\/wp-json\/wp\/v2\/eventi\/5044","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/r1group.it\/en\/wp-json\/wp\/v2\/eventi"}],"about":[{"href":"https:\/\/r1group.it\/en\/wp-json\/wp\/v2\/types\/eventi"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/r1group.it\/en\/wp-json\/wp\/v2\/media\/4716"}],"wp:attachment":[{"href":"https:\/\/r1group.it\/en\/wp-json\/wp\/v2\/media?parent=5044"}],"wp:term":[{"taxonomy":"tag-evento","embeddable":true,"href":"https:\/\/r1group.it\/en\/wp-json\/wp\/v2\/tag-evento?post=5044"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}