{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.3,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"cybersecurity360.it","crawled_at":"2026-03-21T11:58:25.925307Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":49177,"rendered_text_length":49177,"ghost_ratio":0,"rendering_type":"SSR","word_count":2919,"li_count":231,"tr_count":0,"th_count":0,"structure_score":7.909999847412109,"has_org_schema":true,"has_product_schema":false,"schema_count":1,"tech_stack":"wordpress","server_header":"LiteSpeed","cdn":"","http_status":200,"load_time_ms":545,"total_html_bytes":334777,"useful_text_bytes":49177,"token_bloat_ratio":6.800000190734863,"images_total":47,"images_with_alt":46,"multimodal_pct":98,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":30221,"has_breadcrumb_schema":true,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":true,"page_title":"Cyber Security 360 - Sicurezza informatica, IT Security e Cyber Crime","meta_description":"Cybersecurity 360 è la testata editoriale di Digital360 con approfondimenti, guide e casi studio sulla cybersecurity e il cyber crime. Scopri come proteggere i dati della tua azienda.","logo_url":"https://dnewpydm90vfx.cloudfront.net/wp-content/uploads/2022/01/favicon.png","crawl_blocked":false,"ai_readiness_score":80,"sub_bot_access":100,"sub_rendering":100,"sub_structure":51,"sub_schema":42,"sub_tech_stack":85,"extractability_score":66,"crawl_cost_score":50,"crawl_cost_label":"Medium","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":66,"acri_extractability":85,"acri_semantic_structure":58,"acri_content_integrity":71,"acri_retrieval_robustness":46,"acri_grade":"C","h2_texts":"Altri canali | Oltre la trasmissione sicura: acceleratori crittografici per proteggere i dati in uso | LLM in guerra: il Pentagono aprirà alle aziende la possibilità di training AI con dati riservati | Faraday bag, a cosa servono per la privacy e la sicurezza su smartphone (e a cosa no) | Risolto bug Bluetooth di Windows 11: cosa insegna sulla sicurezza del wireless aziendale | L'AI nella kill chain: i vantaggi e le perplessità nella guerra in Iran | Apple corregge WebKit senza aggiornare iOS: debuttano i Background Security Improvements | Handala, cosa sapere del cyber gruppo iraniano che attacca l'Occidente | Storm-2561 e il SEO poisoning: così con falsi client VPN rubano credenziali | The Outlook","tranco_rank":266187,"category":"finance","title_length":69,"meta_desc_length":184,"has_canonical":true,"canonical_url":"https://www.cybersecurity360.it/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":0,"h2_count":36,"h2_before_h1":true,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"it-IT","og_title":"Cyber Security 360 - Sicurezza informatica, IT Security e Cyber Crime","og_description":"Cybersecurity 360 è la testata editoriale di Digital360 con approfondimenti, guide e casi studio sulla cybersecurity e il cyber crime. Scopri come proteggere i dati della tua azienda.","og_image":"https://dnewpydm90vfx.cloudfront.net/wp-content/uploads/2024/03/cybersecurity_logo.png","twitter_card":"summary_large_image","ttfb_ms":545,"dom_node_count":1913,"html_payload_kb":326.9,"has_hsts":true,"has_csp":false,"cache_control":"no-store, no-cache, must-revalidate,stale-while-revalidate=86400, stale-if-error=600","sitemap_declared":true,"sitemap_url":"https://www.cybersecurity360.it/sitemap_index.xml","internal_links":197,"external_links":71,"tracker_scripts":1,"tracker_domains":"js.hs-scripts.com","tracker_token_pct":0,"global_score":69,"seo_pillar":46,"geo_pillar":84,"perf_pillar":52,"arch_pillar":93,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":166936,"ai_trust_percentile":0,"inbound_ai_links":1,"outbound_ai_links":26,"llm_analyzed":true,"llm_analyzed_at":"2026-03-13T00:08:02.064478Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"Cyber Security 360 provides insights, guides, and case studies on cybersecurity and cybercrime.","target_audience":"Cybersecurity professionals, IT managers, legal teams, and businesses seeking cybersecurity expertise.","pricing_model":"SEMANTIC VOID","integration_partners":[],"compliance_standards":["GDPR"],"competitive_moat":"Comprehensive coverage of cybersecurity topics and legal guidance.","content_depth_score":5}},"percentile":94,"similar_domains":[{"domain":"trustonefinancial.org","acri_score":78,"ai_readiness_score":89,"tech_stack":"wordpress","category":"finance","token_bloat_ratio":7,"schema_count":1,"distance":1.8599999427795408,"page_title":"Home - TruStone Financial CU","h1_text":"Your Backyard: Upgraded."},{"domain":"digitalnewstoday.in","acri_score":78,"ai_readiness_score":82,"tech_stack":"wordpress","category":"finance","token_bloat_ratio":4.599999904632568,"schema_count":1,"distance":2.4600000858306883,"page_title":"Digital News Today – Breaking News, World Updates \u0026 Live Stories","h1_text":"digitalnewstoday"},{"domain":"vogate.com","acri_score":79,"ai_readiness_score":84,"tech_stack":"wordpress","category":"finance","token_bloat_ratio":3.299999952316284,"schema_count":1,"distance":3.000000071525574,"page_title":"Find a World of Knowledge and Learning with Vogate","h1_text":"Best Selling Products"},{"domain":"zogby.com","acri_score":78,"ai_readiness_score":87,"tech_stack":"wordpress","category":"finance","token_bloat_ratio":6,"schema_count":3,"distance":3.0400000572204586,"page_title":"Zogby - Make All the Right Money Moves | Compare Financial Products","h1_text":"We review financial products so you don't have to guess"},{"domain":"bankatfidelity.com","acri_score":80,"ai_readiness_score":89,"tech_stack":"wordpress","category":"finance","token_bloat_ratio":5.599999904632568,"schema_count":3,"distance":3.4600000858306887,"page_title":"Home | Fidelity Bank","h1_text":"Sign up for credit card processing and we’ll reward you for sales."}]}
