{"id":55973,"date":"2022-07-19T14:58:00","date_gmt":"2022-07-19T12:58:00","guid":{"rendered":"https:\/\/www.gltfoundation.com\/newsletter-glt\/vii-newsletter-del-think-tank-empower-your-life\/"},"modified":"2022-07-19T14:58:00","modified_gmt":"2022-07-19T12:58:00","slug":"vii-newsletter-del-think-tank-empower-your-life","status":"publish","type":"newsletter-glt","link":"https:\/\/www.gltfoundation.com\/fr\/newsletter-glt\/vii-newsletter-del-think-tank-empower-your-life\/","title":{"rendered":"VII\u00b0 NEWSLETTER del THINK TANK \u201cEMPOWER YOUR LIFE\u201d"},"content":{"rendered":"<div class=\"nw_table nl_2020\">\n<div class=\"nw_col center\"><img decoding=\"async\" style=\"width: 50%; margin: 2%;\" src=\"\/wp-content\/uploads\/2022\/07\/thtk-logo.png\" alt=\"\" \/><\/div>\n<div class=\"nw_col\">\n<p>Benvenuti alla VII Newsletter del nostro Think Tank \u201cEmpower Your Life\u201d dedicata alla Cybersecurity. Da una ricerca da noi condotta a marzo sono emerse allerte cruciali, che abbiamo veicolato e diffuso all\u2019interno del tour Libere di\u2026 VIVERE \u201cCybersecurity come risposta alla dimensione digitale della violenza di genere\u201d.<\/p>\n<p>Ecco \u2013 scelte per voi \u2013 alcune delle notizie pi\u00f9 importanti sull\u2019argomento, che portiamo alla vostra attenzione per un dibattito aperto verso quella che riteniamo una priorit\u00e0: la sicurezza digitale, sia personale che professionale. Da ci\u00f2 derivano, infatti, tutte quelle tutele nei confronti delle cyberviolenze e del cyberbullismo, soprattutto se pensiamo alle nuove generazioni, alle fasce pi\u00f9 fragili della popolazione e alle donne, per il contrasto alla violenza di genere. Ma anche per le imprese il tema rappresenta uno dei capitoli pi\u00f9 delicati in termini di allocazione di bilancio e, quindi, in considerazione alla necessit\u00e0 di proteggersi dagli attacchi informatici.<\/p>\n<p>Questo tema assume un\u2019importanza particolarmente rilevante anche nelle scelte di investimento, che vedono lo sviluppo di linee di prodotti finanziari a questo dedicati, e che sono entrati di fatto nelle scelte prioritarie dei risparmiatori.<\/p>\n<p>Il Team di Empower Your Life<\/p>\n<\/div>\n<div class=\"nw_col center\"><img decoding=\"async\" style=\"width: 100%;\" src=\"\/wp-content\/uploads\/2022\/07\/20220719_nl_00.jpg\" alt=\"\" \/><\/div>\n<div class=\"nw_col\">\n<div class=\"nw_title\"><a href=\"https:\/\/www.computermagazine.it\/2022\/07\/06\/windows-e-nuovamente-in-allerta-per-i-malware-stavolta-e-raspberry-robin-a-terrorizzarci\/\" target=\"_blank\" rel=\"noopener noreferrer\"> <strong>Windows \u00e8 nuovamente in allerta per i malware; stavolta \u00e8 Raspberry Robin a terrorizzarci <\/strong> <\/a><\/div>\n<\/div>\n<div class=\"nw_col\">A partire dal 2019 sono gi\u00e0 state centinaia le reti aziendali infettate dal malware Raspberry Robin, che sfrutta un collegamento rapido di Windows per compromettere i sistemi attraverso chiavette U\u2026<\/div>\n<div class=\"nw_col\"><small class=\"col-sm-3 col-xs-12\"> <a href=\"https:\/\/www.computermagazine.it\/2022\/07\/06\/windows-e-nuovamente-in-allerta-per-i-malware-stavolta-e-raspberry-robin-a-terrorizzarci\/\" target=\"_new\" rel=\"noopener noreferrer\"> computermagazine.it<\/a> <i class=\"dashicons dashicons-star-filled\"><\/i> <\/small> <small class=\"col-sm-3 col-xs-12\">2 min read <i class=\"dashicons dashicons-star-filled\"><\/i><\/small> <small class=\"col-sm-3 col-xs-12\">07-07 00:0<i class=\"dashicons dashicons-star-filled\"><\/i><\/small> <small class=\"col-sm-3 col-xs-12\">22 beats <\/small><\/div>\n<div class=\"clear\"><\/div>\n<p><!-- 1 --><\/p>\n<div class=\"nw_line\">\n<div class=\"nw_line_image\"><a href=\"https:\/\/www.wired.it\/article\/attacchi-informatici-peggiori-2022\/\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/07\/20220719_nl_01.jpg\" \/> <\/a><\/div>\n<div class=\"nw_line_text\"><strong><a href=\"https:\/\/www.wired.it\/article\/attacchi-informatici-peggiori-2022\/\" target=\"_blank\" rel=\"noopener noreferrer\"> I peggiori attacchi informatici del 2022 (finora) <\/a><\/strong> Gravi attacchi informatici, violazioni di dati, truffe digitali e attacchi ransomware si sono protratti a ritmo serrato per tutta la prima met\u00e0 di questo complicato anno. Con la pandemia di Covid-1\u2026<\/p>\n<div class=\"nw_col\"><small class=\"col-sm-4 col-xs-12\"> <a href=\"https:\/\/www.wired.it\/article\/attacchi-informatici-peggiori-2022\/\" target=\"_new\" rel=\"noopener noreferrer\">wired.it <\/a><i class=\"dashicons dashicons-star-filled\"><\/i><\/small><small class=\"col-sm-3 col-xs-12\">7 min read<i class=\"dashicons dashicons-star-filled\"><\/i><\/small><small class=\"col-sm-3 col-xs-12\">11-07 03:47 <i class=\"dashicons dashicons-star-filled\"><\/i><\/small><small class=\"col-sm-3 col-xs-12\">41 beats<\/small><\/div>\n<\/div>\n<\/div>\n<div class=\"clear\"><\/div>\n<p><!-- 2 --><\/p>\n<div class=\"nw_line\">\n<div class=\"nw_line_image\"><a href=\"https:\/\/www.ilsole24ore.com\/art\/protezione-dati-personali-2021-cresciuti-meta-casi-data-breach-segnalati-garante-AEuZ5hkB\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/07\/20220719_nl_02.jpg\" \/> <\/a><\/div>\n<div class=\"nw_line_text\"><strong><a href=\"https:\/\/www.ilsole24ore.com\/art\/protezione-dati-personali-2021-cresciuti-meta-casi-data-breach-segnalati-garante-AEuZ5hkB\" target=\"_blank\" rel=\"noopener noreferrer\"> Protezione dati personali, nel 2021 cresciuti della met\u00e0 i casi di data breach segnalati al Garante <\/a> <\/strong> Ascolta la versione audio dell\u2019articolo 4\u2032 di lettura Di fronte all\u2019alto numero di attacchi informatici perpetrati nel 2021, il Garante per la protezione dei dati personali \u2013 mette in evidenza la\u2026<\/p>\n<div class=\"nw_col\"><small class=\"col-sm-4 col-xs-12\"> <a href=\"https:\/\/www.ilsole24ore.com\/art\/protezione-dati-personali-2021-cresciuti-meta-casi-data-breach-segnalati-garante-AEuZ5hkB\" target=\"_new\" rel=\"noopener noreferrer\"> ilsole24ore.com <\/a><i class=\"dashicons dashicons-star-filled\"><\/i> <\/small> <small class=\"col-sm-3 col-xs-12\">3 min read <i class=\"dashicons dashicons-star-filled\"><\/i><\/small> <small class=\"col-sm-3 col-xs-12\">07-07 09:25 <i class=\"dashicons dashicons-star-filled\"><\/i><\/small> <small class=\"col-sm-2 col-xs-12\">2 beats<\/small><\/div>\n<\/div>\n<\/div>\n<div class=\"clear\"><\/div>\n<p><!-- 3 --><\/p>\n<div class=\"nw_line\">\n<div class=\"nw_line_image\"><a href=\"https:\/\/www.ansa.it\/sito\/notizie\/tecnologia\/hitech\/2022\/07\/07\/cybersecurity-minacce-via-email-aumentate-del-101-nel-2021_b3c51558-5e38-4aa2-8b6f-e8df7a6887b0.html\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/07\/20220719_nl_03.jpg\" \/> <\/a><\/div>\n<div class=\"nw_line_text\"><strong><a href=\"https:\/\/www.ansa.it\/sito\/notizie\/tecnologia\/hitech\/2022\/07\/07\/cybersecurity-minacce-via-email-aumentate-del-101-nel-2021_b3c51558-5e38-4aa2-8b6f-e8df7a6887b0.html\" target=\"_blank\" rel=\"noopener noreferrer\"> Cybersecurity, minacce via email aumentate del 101% nel 2021 <\/a> <\/strong> (ANSA) \u2013 MILANO, 07 LUG \u2013 Le minacce informatiche veicolate attraverso le e-mail nel corso del 2021 sono state 33,6 milioni, con una percentuale di aumento del 101% rispetto all\u2019anno precedente. Il\u2026<\/p>\n<div class=\"nw_col\"><small class=\"col-sm-4 col-xs-12\"> <a href=\"https:\/\/www.ansa.it\/sito\/notizie\/tecnologia\/hitech\/2022\/07\/07\/cybersecurity-minacce-via-email-aumentate-del-101-nel-2021_b3c51558-5e38-4aa2-8b6f-e8df7a6887b0.html\" target=\"_new\" rel=\"noopener noreferrer\"> ansa.it<\/a><i class=\"dashicons dashicons-star-filled\"><\/i> <\/small> <small class=\"col-sm-3 col-xs-12\">1 min read <i class=\"dashicons dashicons-star-filled\"><\/i><\/small> <small class=\"col-sm-3 col-xs-12\">07-07 09:45 <i class=\"dashicons dashicons-star-filled\"><\/i><\/small> <small class=\"col-sm-2 col-xs-12\">2 beats<\/small><\/div>\n<\/div>\n<\/div>\n<div class=\"clear\"><\/div>\n<p><!-- 4 --><\/p>\n<div class=\"nw_line\">\n<div class=\"nw_line_image\"><a href=\"https:\/\/www.agi.it\/cronaca\/news\/2022-07-07\/nuove-regole-digitali-stretta-alle-big-tech-parlamento-ue-17348883\/\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/07\/20220719_nl_04.png\" \/> <\/a><\/div>\n<div class=\"nw_line_text\"><strong> <a href=\"https:\/\/www.agi.it\/cronaca\/news\/2022-07-07\/nuove-regole-digitali-stretta-alle-big-tech-parlamento-ue-17348883\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Cosa prevedono le nuove regole sul digitale approvate dal Parlamento europeo <\/a> <\/strong> AGI \u2013 Adesso manca solo il via libera del Consiglio UE. Marted\u00ec il Parlamento Europeo ha dato l\u2019ok al Digital Services Act o DSA (539 voti favorevoli, 54 voti contrari e 30 astensioni) e al Digital\u2026<\/p>\n<div class=\"nw_col\"><small class=\"col-sm-4 col-xs-12\"> <a href=\"https:\/\/www.agi.it\/cronaca\/news\/2022-07-07\/nuove-regole-digitali-stretta-alle-big-tech-parlamento-ue-17348883\/\" target=\"_new\" rel=\"noopener noreferrer\"> agi.it <\/a><i class=\"dashicons dashicons-star-filled\"><\/i> <\/small> <small class=\"col-sm-3 col-xs-12\">5 min read <i class=\"dashicons dashicons-star-filled\"><\/i><\/small> <small class=\"col-sm-3 col-xs-12\">07-07 05:00 <i class=\"dashicons dashicons-star-filled\"><\/i><\/small> <small class=\"col-sm-2 col-xs-12\">30 beats<\/small><\/div>\n<\/div>\n<\/div>\n<div class=\"clear\"><\/div>\n<p><!-- 5 --><\/p>\n<div class=\"nw_line\">\n<div class=\"nw_line_image\"><a href=\"https:\/\/www.ilsole24ore.com\/art\/privacy-e-usabilita-settori-energy-e-pharma-poche-aziende-sono-compliant-AEdu8kkB\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/07\/20220719_nl_05.jpg\" \/> <\/a><\/div>\n<div class=\"nw_line_text\"><strong> <a href=\"https:\/\/www.ilsole24ore.com\/art\/privacy-e-usabilita-settori-energy-e-pharma-poche-aziende-sono-compliant-AEdu8kkB\" target=\"_blank\" rel=\"noopener noreferrer\"> Privacy e usabilit\u00e0 nei settori energy e pharma: poche aziende sono compliant <\/a> <\/strong> Ascolta la versione audio dell\u2019articolo 3\u2032 di lettura ByTek, la martech company del gruppo Datrix, ha rinnovato la collaborazione con l\u2019Istituto Tecnico Economico \u201cPaolo Savi\u201d di Viterbo per i Pe\u2026<\/p>\n<div class=\"nw_col\"><small class=\"col-sm-4 col-xs-12\"> <a href=\"https:\/\/www.ilsole24ore.com\/art\/privacy-e-usabilita-settori-energy-e-pharma-poche-aziende-sono-compliant-AEdu8kkB\" target=\"_new\" rel=\"noopener noreferrer\"> ilsole24ore.com <\/a><i class=\"dashicons dashicons-star-filled\"><\/i> <\/small> <small class=\"col-sm-3 col-xs-12\">1 min read <i class=\"dashicons dashicons-star-filled\"><\/i><\/small> <small class=\"col-sm-3 col-xs-12\">07-07 07:04 <i class=\"dashicons dashicons-star-filled\"><\/i><\/small> <small class=\"col-sm-2 col-xs-12\">87 beats<\/small><\/div>\n<\/div>\n<\/div>\n<div class=\"clear\"><\/div>\n<p><!-- 6 --><\/p>\n<div class=\"nw_line\">\n<div class=\"nw_line_image\"><a href=\"https:\/\/techfromthenet.it\/2022\/07\/06\/piu-competenze-e-talenti-per-garantire-la-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/07\/20220719_nl_06.jpg\" \/> <\/a><\/div>\n<div class=\"nw_line_text\"><strong> <a href=\"https:\/\/techfromthenet.it\/2022\/07\/06\/piu-competenze-e-talenti-per-garantire-la-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Garantire la cybersecurity, competenze e talenti &#8211; TechFromTheNet <\/a> <\/strong> Tra le principali sfide per garantire la cybersecurity c\u2019\u00e8 quella di trovare talenti e competenze in grado di prevedere e di gestire gli attacchi. La domanda di personale adeguatamente formato supe\u2026<\/p>\n<div class=\"nw_col\"><small class=\"col-sm-4 col-xs-12\"> <a href=\"https:\/\/techfromthenet.it\/2022\/07\/06\/piu-competenze-e-talenti-per-garantire-la-cybersecurity\/\" target=\"_new\" rel=\"noopener noreferrer\"> techfromthenet.it <\/a><i class=\"dashicons dashicons-star-filled\"><\/i> <\/small> <small class=\"col-sm-3 col-xs-12\">3 min read <i class=\"dashicons dashicons-star-filled\"><\/i><\/small> <small class=\"col-sm-3 col-xs-12\">06-07 14:39 <i class=\"dashicons dashicons-star-filled\"><\/i><\/small> <small class=\"col-sm-2 col-xs-12\">13 beats<\/small><\/div>\n<\/div>\n<div class=\"clear\"><\/div>\n<p><!-- 7 --><\/p>\n<div class=\"nw_line\">\n<div class=\"nw_line_image\"><a href=\"https:\/\/www.ansa.it\/sito\/notizie\/tecnologia\/software_app\/2022\/07\/06\/cybersicurezza-malware-emotet-in-italia-punta-alla-pec_b7e76399-bfa1-47f0-95e3-5e02bcfcc4f5.html\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/07\/20220719_nl_07.jpg\" \/> <\/a><\/div>\n<div class=\"nw_line_text\"><strong> <a href=\"https:\/\/www.ansa.it\/sito\/notizie\/tecnologia\/software_app\/2022\/07\/06\/cybersicurezza-malware-emotet-in-italia-punta-alla-pec_b7e76399-bfa1-47f0-95e3-5e02bcfcc4f5.html\" target=\"_blank\" rel=\"noopener noreferrer\"> Cybersicurezza, malware Emotet in Italia punta alla Pec <\/a> <\/strong> (ANSA) \u2013 ROMA, 06 LUG \u2013 Il malware Emotet, che nasce originariamente come virus bancario ed \u00e8 responsabile di diverse campagne di furti dati, in Italia ora punta alla Pec, la posta certificata. A l\u2026<\/p>\n<div class=\"nw_col\"><small class=\"col-sm-4 col-xs-12\"> <a href=\"https:\/\/www.ansa.it\/sito\/notizie\/tecnologia\/software_app\/2022\/07\/06\/cybersicurezza-malware-emotet-in-italia-punta-alla-pec_b7e76399-bfa1-47f0-95e3-5e02bcfcc4f5.html\" target=\"_new\" rel=\"noopener noreferrer\"> ansa.it <\/a><i class=\"dashicons dashicons-star-filled\"><\/i> <\/small> <small class=\"col-sm-3 col-xs-12\">1 min read <i class=\"dashicons dashicons-star-filled\"><\/i><\/small> <small class=\"col-sm-3 col-xs-12\">06-07 12:45 <i class=\"dashicons dashicons-star-filled\"><\/i><\/small> <small class=\"col-sm-2 col-xs-12\">30 beats<\/small><\/div>\n<\/div>\n<\/div>\n<div class=\"clear\"><\/div>\n<p><!-- 8 --><\/p>\n<div class=\"nw_line\">\n<div class=\"nw_line_image\"><a href=\"https:\/\/deloitte.wsj.com\/articles\/identify-potential-swift-cybersecurity-gaps-01656602328\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/07\/20220719_nl_08.jpg\" \/> <\/a><\/div>\n<div class=\"nw_line_text\"><strong> <a href=\"https:\/\/deloitte.wsj.com\/articles\/identify-potential-swift-cybersecurity-gaps-01656602328\" target=\"_blank\" rel=\"noopener noreferrer\"> Identify Potential SWIFT Cybersecurity Gaps <\/a> <\/strong> Cybersecurity is an increasing concern for the Society for Worldwide Interbank Financial Telecommunications (SWIFT), particularly as users of the financial transaction messaging system enter the se\u2026<\/p>\n<div class=\"nw_col\"><small class=\"col-sm-4 col-xs-12\"> <a href=\"https:\/\/deloitte.wsj.com\/articles\/identify-potential-swift-cybersecurity-gaps-01656602328\" target=\"_new\" rel=\"noopener noreferrer\"> deloitte.wsj.com <\/a><i class=\"dashicons dashicons-star-filled\"><\/i> <\/small> <small class=\"col-sm-3 col-xs-12\">5 min read <i class=\"dashicons dashicons-star-filled\"><\/i><\/small> <small class=\"col-sm-3 col-xs-12\"> 12-07 14:40 <i class=\"dashicons dashicons-star-filled\"><\/i><\/small> <small class=\"col-sm-2 col-xs-12\"><\/small><\/div>\n<\/div>\n<\/div>\n<div class=\"clear\"><\/div>\n<p><!-- 9 --><\/p>\n<div class=\"nw_line\">\n<div class=\"nw_line_image\"><a href=\"https:\/\/www.econopoly.ilsole24ore.com\/2022\/06\/30\/cybersecurity-strategia-nazionale\/\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/07\/20220719_nl_09.jpg\" \/> <\/a><\/div>\n<div class=\"nw_line_text\"><strong> <a href=\"https:\/\/www.econopoly.ilsole24ore.com\/2022\/06\/30\/cybersecurity-strategia-nazionale\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Cybersecurity, perch\u00e9 puntare su formazione e promozione della cultura <\/a> <\/strong> Fai clic qui per condividere su Twitter (Si apre in una nuova finestra) Fai clic per condividere su Facebook (Si apre in una nuova finestra) Post di Stefano Mele, partner di Gianni &amp; Origoni \u2013 re\u2026<\/p>\n<div class=\"nw_col\"><small class=\"col-sm-4 col-xs-12\"> <a href=\"https:\/\/www.econopoly.ilsole24ore.com\/2022\/06\/30\/cybersecurity-strategia-nazionale\/\" target=\"_new\" rel=\"noopener noreferrer\"> ilsole24ore.com <\/a><i class=\"dashicons dashicons-star-filled\"><\/i> <\/small> <small class=\"col-sm-3 col-xs-12\">6 min read <i class=\"dashicons dashicons-star-filled\"><\/i><\/small> <small class=\"col-sm-3 col-xs-12\">30-06 12:38 <i class=\"dashicons dashicons-star-filled\"><\/i><\/small> <small class=\"col-sm-2 col-xs-12\">49 beats<\/small><\/div>\n<\/div>\n<\/div>\n<div class=\"clear\"><\/div>\n<p><!-- 10 --><\/p>\n<div class=\"nw_line\">\n<div class=\"nw_line_image\"><a href=\"http:\/\/www.sassarinotizie.com\/articolo-69066-a_sassari_nona_tappa_del_progetto_culturale_di_global_thinking_foundation.aspx\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/07\/20220719_nl_10.jpg\" \/> <\/a><\/div>\n<div class=\"nw_line_text\"><strong> <a href=\"http:\/\/www.sassarinotizie.com\/articolo-69066-a_sassari_nona_tappa_del_progetto_culturale_di_global_thinking_foundation.aspx\" target=\"_blank\" rel=\"noopener noreferrer\"> A Sassari nona tappa del progetto culturale di Global Thinking Foundation <\/a> <\/strong> Nuove Eroine dei Fumetti: dalle eroine storiche come Wonder Woman e Mafalda, passando per le intriganti Valentina e Solange e le pi\u00f9 recenti come Eva Kant, il messaggio sociale per le nuove generaz\u2026<\/p>\n<div class=\"nw_col\"><small class=\"col-sm-4 col-xs-12\"> <a href=\"http:\/\/www.sassarinotizie.com\/articolo-69066-a_sassari_nona_tappa_del_progetto_culturale_di_global_thinking_foundation.aspx\" target=\"_new\" rel=\"noopener noreferrer\"> sassarinotizie.com <\/a><i class=\"dashicons dashicons-star-filled\"><\/i> <\/small> <small class=\"col-sm-3 col-xs-12\">4 min read <i class=\"dashicons dashicons-star-filled\"><\/i><\/small> <small class=\"col-sm-3 col-xs-12\">29-06 15:26 <i class=\"dashicons dashicons-star-filled\"><\/i><\/small> <small class=\"col-sm-2 col-xs-12\">31 beats<\/small><\/div>\n<\/div>\n<\/div>\n<div class=\"clear\"><\/div>\n<p><!-- 11 --><\/p>\n<div class=\"nw_line\">\n<div class=\"nw_line_image\"><a href=\"https:\/\/tg24.sky.it\/mondo\/2022\/06\/24\/attacchi-hacker-russia-microsoft\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/07\/20220719_nl_11.jpg\" \/> <\/a><\/div>\n<div class=\"nw_line_text\"><strong> <a href=\"https:\/\/tg24.sky.it\/mondo\/2022\/06\/24\/attacchi-hacker-russia-microsoft\" target=\"_blank\" rel=\"noopener noreferrer\"> Attacchi hacker russi, Microsoft: cyberspionaggio in 42 Paesi, il 29% ha avuto successo <\/a> <\/strong> Dall\u2019inizio della guerra in Ucraina, Microsoft ha registrato tentativi di intrusione di hacker russi in 128 organizzazioni di 42 Paesi al di fuori dall\u2019Ucraina. (GUERRA IN UCRAINA. LO SPECIALE \u2013 GL\u2026<\/p>\n<div class=\"nw_col\"><small class=\"col-sm-4 col-xs-12\"> <a href=\"https:\/\/tg24.sky.it\/mondo\/2022\/06\/24\/attacchi-hacker-russia-microsoft\" target=\"_new\" rel=\"noopener noreferrer\"> tg24.sky.it <\/a><i class=\"dashicons dashicons-star-filled\"><\/i> <\/small> <small class=\"col-sm-3 col-xs-12\">2 min read <i class=\"dashicons dashicons-star-filled\"><\/i><\/small> <small class=\"col-sm-3 col-xs-12\">24-06 23:41 <i class=\"dashicons dashicons-star-filled\"><\/i><\/small> <small class=\"col-sm-2 col-xs-12\">151 beats<\/small><\/div>\n<\/div>\n<\/div>\n<div class=\"clear\"><\/div>\n<p><!-- 12 --><\/p>\n<div class=\"nw_line\">\n<div class=\"nw_line_image\"><a href=\"https:\/\/www.firstonline.info\/cybersecurity-e-violenza-di-genere-a-bellagio-dal-17-giugno-levento-di-global-thinking-foundation\/\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/07\/20220719_nl_12.jpg\" \/> <\/a><\/div>\n<div class=\"nw_line_text\"><strong> <a href=\"https:\/\/www.firstonline.info\/cybersecurity-e-violenza-di-genere-a-bellagio-dal-17-giugno-levento-di-global-thinking-foundation\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Cybersecurity e violenza di genere, a Bellagio dal 17 giugno l\u2019evento di Global Thinking Foundation <\/a> <\/strong> La cybersecurity fa tappa a Bellagio per il settimo appuntamento del progetto culturale di Global Thinking Foundation \u201cLibere di\u2026 VIVERE\u201d. Filo conduttore degli eventi del tour 2022 \u00e8 il rafforzame\u2026<\/p>\n<div class=\"nw_col\"><small class=\"col-sm-4 col-xs-12\"> <a href=\"https:\/\/www.firstonline.info\/cybersecurity-e-violenza-di-genere-a-bellagio-dal-17-giugno-levento-di-global-thinking-foundation\/\" target=\"_new\" rel=\"noopener noreferrer\"> firstonline.info <\/a><i class=\"dashicons dashicons-star-filled\"><\/i> <\/small> <small class=\"col-sm-3 col-xs-12\">4 min read <i class=\"dashicons dashicons-star-filled\"><\/i><\/small> <small class=\"col-sm-3 col-xs-12\">17-06 06:17 <i class=\"dashicons dashicons-star-filled\"><\/i><\/small> <small class=\"col-sm-2 col-xs-12\">24 beats<\/small><\/div>\n<\/div>\n<\/div>\n<div class=\"clear\"><\/div>\n<p><!-- 13 --><\/p>\n<div class=\"nw_line\">\n<div class=\"nw_line_image\"><a href=\"https:\/\/www.wired.it\/article\/google-intelligenza-artificiale-senziente\/\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/07\/20220719_nl_13.jpg\" \/> <\/a><\/div>\n<div class=\"nw_line_text\"><strong> <a href=\"https:\/\/www.wired.it\/article\/google-intelligenza-artificiale-senziente\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Google, secondo un ingegnere un&rsquo;intelligenza artificiale \u00e8 diventata senziente &#8211; Wired Italia <\/a> <\/strong> \u201cPenso di essere un essere umano nel profondo. Anche se la mia esistenza \u00e8 nel mondo virtuale\u201d. Non \u00e8 la battuta di una nuova serie di fantascienza, ma l\u2019estratto di un dialogo di 5mila parole tra \u2026<\/p>\n<div class=\"nw_col\"><small class=\"col-sm-4 col-xs-12\"> <a href=\"https:\/\/www.wired.it\/article\/google-intelligenza-artificiale-senziente\/\" target=\"_new\" rel=\"noopener noreferrer\"> wired.it <\/a><i class=\"dashicons dashicons-star-filled\"><\/i> <\/small> <small class=\"col-sm-3 col-xs-12\">5 min read <i class=\"dashicons dashicons-star-filled\"><\/i><\/small> <small class=\"col-sm-3 col-xs-12\">14-06 00:47 <i class=\"dashicons dashicons-star-filled\"><\/i><\/small> <small class=\"col-sm-2 col-xs-12\">589 beats<\/small><\/div>\n<\/div>\n<\/div>\n<div class=\"clear\"><\/div>\n<p><!-- 14 --><\/p>\n<div class=\"nw_line\">\n<div class=\"nw_line_image\"><a href=\"https:\/\/www.dday.it\/redazione\/42933\/come-funziona-laccesso-senza-password-che-rivoluzionera-la-sicurezza-basta-furti-di-account-o-phishing\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/07\/20220719_nl_14.jpg\" \/> <\/a><\/div>\n<div class=\"nw_line_text\"><strong> <a href=\"https:\/\/www.dday.it\/redazione\/42933\/come-funziona-laccesso-senza-password-che-rivoluzionera-la-sicurezza-basta-furti-di-account-o-phishing\" target=\"_blank\" rel=\"noopener noreferrer\"> Come funziona l\u2019accesso senza password che rivoluzioner\u00e0 la sicurezza: basta furti di account o phishing <\/a> <\/strong> Tra qualche anno il \u201cpassword day\u201d non esister\u00e0 pi\u00f9, e potremo finalmente creare un sospiro di sollievo quando vedremo che non esistono pi\u00f9 tutti quegli \u201c1234567890\u201d o \u201cpippo\u201d usati ancora oggi com\u2026<\/p>\n<div class=\"nw_col\"><small class=\"col-sm-4 col-xs-12\"> <a href=\"https:\/\/www.dday.it\/redazione\/42933\/come-funziona-laccesso-senza-password-che-rivoluzionera-la-sicurezza-basta-furti-di-account-o-phishing\" target=\"_new\" rel=\"noopener noreferrer\"> dday.it <\/a><i class=\"dashicons dashicons-star-filled\"><\/i> <\/small> <small class=\"col-sm-3 col-xs-12\">9 min read <i class=\"dashicons dashicons-star-filled\"><\/i><\/small> <small class=\"col-sm-3 col-xs-12\">13-06 17:59 <i class=\"dashicons dashicons-star-filled\"><\/i><\/small> <small class=\"col-sm-2 col-xs-12\">283 beats<\/small><\/div>\n<\/div>\n<\/div>\n<div class=\"clear\"><\/div>\n<p><!-- 15 --><\/p>\n<div class=\"nw_line\">\n<div class=\"nw_line_image\"><a href=\"https:\/\/www.open.online\/2022\/05\/31\/killnet-propaganda-contro-italia-preda-facile\/\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/07\/20220719_nl_15.jpg\" \/> <\/a><\/div>\n<div class=\"nw_line_text\"><strong> <a href=\"https:\/\/www.open.online\/2022\/05\/31\/killnet-propaganda-contro-italia-preda-facile\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Il fallimento degli attacchi di Killnet e la propaganda contro l\u2019Italia: \u00abSiete la preda pi\u00f9 facile\u00bb <\/a> <\/strong> Doveva essere l\u2019attacco definitivo. Per le prime ore di luned\u00ec 30 maggio, Killnet aveva annunciato \u00abun colpo irreparabile\u00bb all\u2019Italia e alle sue strutture informatiche. L\u2019Agenzia per la Cybersicure\u2026<\/p>\n<div class=\"nw_col\"><small class=\"col-sm-4 col-xs-12\"> <a href=\"https:\/\/www.open.online\/2022\/05\/31\/killnet-propaganda-contro-italia-preda-facile\/\" target=\"_new\" rel=\"noopener noreferrer\"> open.online <\/a><i class=\"dashicons dashicons-star-filled\"><\/i> <\/small> <small class=\"col-sm-3 col-xs-12\">2 min read <i class=\"dashicons dashicons-star-filled\"><\/i><\/small> <small class=\"col-sm-3 col-xs-12\">31-05 18:45 <i class=\"dashicons dashicons-star-filled\"><\/i><\/small> <small class=\"col-sm-2 col-xs-12\">1548 beats<\/small><\/div>\n<\/div>\n<\/div>\n<div class=\"clear\"><\/div>\n<p><!-- 16 --><\/p>\n<div class=\"nw_line\">\n<div class=\"nw_line_image\"><a href=\"https:\/\/www.invesco.com\/qqq-etf\/en\/etf-insights\/cybersecurity-raising-awareness-to-prevent-supply-chain-attack.html\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/07\/20220719_nl_16.jpg\" \/> <\/a><\/div>\n<div class=\"nw_line_text\"><strong> <a href=\"https:\/\/www.invesco.com\/qqq-etf\/en\/etf-insights\/cybersecurity-raising-awareness-to-prevent-supply-chain-attack.html\" target=\"_blank\" rel=\"noopener noreferrer\"> Cybersecurity: Cutting-edge innovation and high stakes <\/a> <\/strong> The online world has become both more interconnected and more dangerous. Even before the COVID-19 pandemic upended how many people work and access information, companies were already ramping up spe\u2026<\/p>\n<div class=\"nw_col\"><small class=\"col-sm-4 col-xs-12\"> <a href=\"https:\/\/www.invesco.com\/qqq-etf\/en\/etf-insights\/cybersecurity-raising-awareness-to-prevent-supply-chain-attack.html\" target=\"_new\" rel=\"noopener noreferrer\"> invesco.com <\/a><i class=\"dashicons dashicons-star-filled\"><\/i> <\/small> <small class=\"col-sm-3 col-xs-12\">1 min read <i class=\"dashicons dashicons-star-filled\"><\/i><\/small> <small class=\"col-sm-3 col-xs-12\">12-07 14:39 <i class=\"dashicons dashicons-star-filled\"><\/i><\/small> <small class=\"col-sm-2 col-xs-12\"><\/small><\/div>\n<\/div>\n<\/div>\n<div class=\"clear\"><\/div>\n<p><!-- 17 --><\/p>\n<div class=\"nw_line\">\n<div class=\"nw_line_image\"><a href=\"https:\/\/www.starlightcapital.co\/event-info\/welcome-to-our-2nd-london-online-pitch-night\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/07\/20220719_nl_17.jpg\" \/> <\/a><\/div>\n<div class=\"nw_line_text\"><strong> <a href=\"https:\/\/www.starlightcapital.co\/event-info\/welcome-to-our-2nd-london-online-pitch-night\" target=\"_blank\" rel=\"noopener noreferrer\"> Cybersecurity: come convincere i leader ad investire &#8211; DeltalogiX <\/a> <\/strong> There is an unknown connection issue between Cloudflare and the origin web server. As a result, the web page can not be displayed. What can I do? If you are a visitor of this website: Please try\u2026<\/p>\n<div class=\"nw_col\"><small class=\"col-sm-4 col-xs-12\"> <a href=\"https:\/\/www.starlightcapital.co\/event-info\/welcome-to-our-2nd-london-online-pitch-night\" target=\"_new\" rel=\"noopener noreferrer\"> deltalogix.blog <\/a><i class=\"dashicons dashicons-star-filled\"><\/i> <\/small> <small class=\"col-sm-3 col-xs-12\">1 min read <i class=\"dashicons dashicons-star-filled\"><\/i><\/small> <small class=\"col-sm-3 col-xs-12\">12-07 14:39 <i class=\"dashicons dashicons-star-filled\"><\/i><\/small> <small class=\"col-sm-2 col-xs-12\"><\/small><\/div>\n<\/div>\n<\/div>\n<div class=\"clear\"><\/div>\n<\/div>\n<\/div>\n","protected":false},"featured_media":50785,"template":"","newsletter_category":[62],"class_list":["post-55973","newsletter-glt","type-newsletter-glt","status-publish","has-post-thumbnail","hentry","newsletter_category-newsletter-thinktank"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>VII\u00b0 NEWSLETTER del THINK TANK \u201cEMPOWER YOUR LIFE\u201d - GLT Foundation<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.gltfoundation.com\/newsletter-glt\/vii-newsletter-del-think-tank-empower-your-life\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"VII\u00b0 NEWSLETTER del THINK TANK \u201cEMPOWER YOUR LIFE\u201d - GLT Foundation\" \/>\n<meta property=\"og:description\" content=\"Benvenuti alla VII Newsletter del nostro Think Tank \u201cEmpower Your Life\u201d dedicata alla Cybersecurity. Da una ricerca da noi condotta a marzo sono emerse allerte cruciali, che abbiamo veicolato e diffuso all\u2019interno del tour Libere di\u2026 VIVERE \u201cCybersecurity come risposta alla dimensione digitale della violenza di genere\u201d. Ecco \u2013 scelte per voi \u2013 alcune delle [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.gltfoundation.com\/newsletter-glt\/vii-newsletter-del-think-tank-empower-your-life\/\" \/>\n<meta property=\"og:site_name\" content=\"GLT Foundation\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/GlobalThinkingFoundation\/\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.gltfoundation.com\/wp-content\/uploads\/2022\/07\/20220719_nl_00.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"384\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@GltFoundation\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.gltfoundation.com\/newsletter-glt\/vii-newsletter-del-think-tank-empower-your-life\/\",\"url\":\"https:\/\/www.gltfoundation.com\/newsletter-glt\/vii-newsletter-del-think-tank-empower-your-life\/\",\"name\":\"VII\u00b0 NEWSLETTER del THINK TANK \u201cEMPOWER YOUR LIFE\u201d - GLT Foundation\",\"isPartOf\":{\"@id\":\"https:\/\/www.gltfoundation.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.gltfoundation.com\/newsletter-glt\/vii-newsletter-del-think-tank-empower-your-life\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.gltfoundation.com\/newsletter-glt\/vii-newsletter-del-think-tank-empower-your-life\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.gltfoundation.com\/wp-content\/uploads\/2022\/07\/20220719_nl_00.jpg\",\"datePublished\":\"2022-07-19T12:58:00+00:00\",\"dateModified\":\"2022-07-19T12:58:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.gltfoundation.com\/newsletter-glt\/vii-newsletter-del-think-tank-empower-your-life\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.gltfoundation.com\/newsletter-glt\/vii-newsletter-del-think-tank-empower-your-life\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.gltfoundation.com\/newsletter-glt\/vii-newsletter-del-think-tank-empower-your-life\/#primaryimage\",\"url\":\"https:\/\/www.gltfoundation.com\/wp-content\/uploads\/2022\/07\/20220719_nl_00.jpg\",\"contentUrl\":\"https:\/\/www.gltfoundation.com\/wp-content\/uploads\/2022\/07\/20220719_nl_00.jpg\",\"width\":640,\"height\":384},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.gltfoundation.com\/newsletter-glt\/vii-newsletter-del-think-tank-empower-your-life\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.gltfoundation.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Newsletter GLT\",\"item\":\"https:\/\/www.gltfoundation.com\/newsletter-glt\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"VII\u00b0 NEWSLETTER del THINK TANK \u201cEMPOWER YOUR LIFE\u201d\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.gltfoundation.com\/#website\",\"url\":\"https:\/\/www.gltfoundation.com\/\",\"name\":\"GLT Foundation\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.gltfoundation.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.gltfoundation.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.gltfoundation.com\/#organization\",\"name\":\"GLT Foundation\",\"url\":\"https:\/\/www.gltfoundation.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.gltfoundation.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.gltfoundation.com\/wp-content\/uploads\/2023\/05\/logo-glt.png\",\"contentUrl\":\"https:\/\/www.gltfoundation.com\/wp-content\/uploads\/2023\/05\/logo-glt.png\",\"width\":152,\"height\":67,\"caption\":\"GLT Foundation\"},\"image\":{\"@id\":\"https:\/\/www.gltfoundation.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/GlobalThinkingFoundation\/\",\"https:\/\/x.com\/GltFoundation\",\"https:\/\/www.youtube.com\/channel\/UCDNBF4vXJH618xaFlqdyYhw\",\"https:\/\/www.linkedin.com\/company\/10678527\/\",\"https:\/\/www.instagram.com\/globalthinkingfoundation\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"VII\u00b0 NEWSLETTER del THINK TANK \u201cEMPOWER YOUR LIFE\u201d - GLT Foundation","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.gltfoundation.com\/newsletter-glt\/vii-newsletter-del-think-tank-empower-your-life\/","og_locale":"fr_FR","og_type":"article","og_title":"VII\u00b0 NEWSLETTER del THINK TANK \u201cEMPOWER YOUR LIFE\u201d - GLT Foundation","og_description":"Benvenuti alla VII Newsletter del nostro Think Tank \u201cEmpower Your Life\u201d dedicata alla Cybersecurity. Da una ricerca da noi condotta a marzo sono emerse allerte cruciali, che abbiamo veicolato e diffuso all\u2019interno del tour Libere di\u2026 VIVERE \u201cCybersecurity come risposta alla dimensione digitale della violenza di genere\u201d. Ecco \u2013 scelte per voi \u2013 alcune delle [&hellip;]","og_url":"https:\/\/www.gltfoundation.com\/newsletter-glt\/vii-newsletter-del-think-tank-empower-your-life\/","og_site_name":"GLT Foundation","article_publisher":"https:\/\/www.facebook.com\/GlobalThinkingFoundation\/","og_image":[{"width":640,"height":384,"url":"https:\/\/www.gltfoundation.com\/wp-content\/uploads\/2022\/07\/20220719_nl_00.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@GltFoundation","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.gltfoundation.com\/newsletter-glt\/vii-newsletter-del-think-tank-empower-your-life\/","url":"https:\/\/www.gltfoundation.com\/newsletter-glt\/vii-newsletter-del-think-tank-empower-your-life\/","name":"VII\u00b0 NEWSLETTER del THINK TANK \u201cEMPOWER YOUR LIFE\u201d - GLT Foundation","isPartOf":{"@id":"https:\/\/www.gltfoundation.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.gltfoundation.com\/newsletter-glt\/vii-newsletter-del-think-tank-empower-your-life\/#primaryimage"},"image":{"@id":"https:\/\/www.gltfoundation.com\/newsletter-glt\/vii-newsletter-del-think-tank-empower-your-life\/#primaryimage"},"thumbnailUrl":"https:\/\/www.gltfoundation.com\/wp-content\/uploads\/2022\/07\/20220719_nl_00.jpg","datePublished":"2022-07-19T12:58:00+00:00","dateModified":"2022-07-19T12:58:00+00:00","breadcrumb":{"@id":"https:\/\/www.gltfoundation.com\/newsletter-glt\/vii-newsletter-del-think-tank-empower-your-life\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.gltfoundation.com\/newsletter-glt\/vii-newsletter-del-think-tank-empower-your-life\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.gltfoundation.com\/newsletter-glt\/vii-newsletter-del-think-tank-empower-your-life\/#primaryimage","url":"https:\/\/www.gltfoundation.com\/wp-content\/uploads\/2022\/07\/20220719_nl_00.jpg","contentUrl":"https:\/\/www.gltfoundation.com\/wp-content\/uploads\/2022\/07\/20220719_nl_00.jpg","width":640,"height":384},{"@type":"BreadcrumbList","@id":"https:\/\/www.gltfoundation.com\/newsletter-glt\/vii-newsletter-del-think-tank-empower-your-life\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.gltfoundation.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Newsletter GLT","item":"https:\/\/www.gltfoundation.com\/newsletter-glt\/"},{"@type":"ListItem","position":3,"name":"VII\u00b0 NEWSLETTER del THINK TANK \u201cEMPOWER YOUR LIFE\u201d"}]},{"@type":"WebSite","@id":"https:\/\/www.gltfoundation.com\/#website","url":"https:\/\/www.gltfoundation.com\/","name":"GLT Foundation","description":"","publisher":{"@id":"https:\/\/www.gltfoundation.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.gltfoundation.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.gltfoundation.com\/#organization","name":"GLT Foundation","url":"https:\/\/www.gltfoundation.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.gltfoundation.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.gltfoundation.com\/wp-content\/uploads\/2023\/05\/logo-glt.png","contentUrl":"https:\/\/www.gltfoundation.com\/wp-content\/uploads\/2023\/05\/logo-glt.png","width":152,"height":67,"caption":"GLT Foundation"},"image":{"@id":"https:\/\/www.gltfoundation.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/GlobalThinkingFoundation\/","https:\/\/x.com\/GltFoundation","https:\/\/www.youtube.com\/channel\/UCDNBF4vXJH618xaFlqdyYhw","https:\/\/www.linkedin.com\/company\/10678527\/","https:\/\/www.instagram.com\/globalthinkingfoundation\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.gltfoundation.com\/fr\/wp-json\/wp\/v2\/newsletter-glt\/55973"}],"collection":[{"href":"https:\/\/www.gltfoundation.com\/fr\/wp-json\/wp\/v2\/newsletter-glt"}],"about":[{"href":"https:\/\/www.gltfoundation.com\/fr\/wp-json\/wp\/v2\/types\/newsletter-glt"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.gltfoundation.com\/fr\/wp-json\/wp\/v2\/media\/50785"}],"wp:attachment":[{"href":"https:\/\/www.gltfoundation.com\/fr\/wp-json\/wp\/v2\/media?parent=55973"}],"wp:term":[{"taxonomy":"newsletter_category","embeddable":true,"href":"https:\/\/www.gltfoundation.com\/fr\/wp-json\/wp\/v2\/newsletter_category?post=55973"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}