{"id":102782,"date":"2026-04-06T18:07:32","date_gmt":"2026-04-06T21:07:32","guid":{"rendered":"https:\/\/abes.org.br\/?p=102782"},"modified":"2026-04-06T18:07:32","modified_gmt":"2026-04-06T21:07:32","slug":"a-nova-fronteira-da-ciberseguranca-microsoft-consolida-protecao-para-a-era-da-ia-agentica","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/a-nova-fronteira-da-ciberseguranca-microsoft-consolida-protecao-para-a-era-da-ia-agentica\/","title":{"rendered":"The new frontier of cybersecurity: Microsoft consolidates protection for the Age of Agency AI."},"content":{"rendered":"<p data-olk-copy-source=\"MessageBody\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-102783 aligncenter\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2026\/04\/MICROSOFT-IA-CIBERSEGURANCA-1024x576.jpg\" alt=\"\" width=\"576\" height=\"324\" \/><\/p>\n<p class=\"x_MsoNormal\" data-olk-copy-source=\"MessageBody\">As organizations abandon simple chatbot models in favor of \u201cagent AI\u201d\u2014systems capable of making decisions and performing complex tasks autonomously\u2014a critical new challenge emerges: how to maintain control and security over these \u201cdigital employees\u201d? In a recent announcement, Microsoft detailed its end-to-end security vision for this transformation, presenting tools that promise to give IT and security managers the visibility needed to prevent productive agents from becoming vulnerabilities.<\/p>\n<p class=\"x_MsoNormal\"><b>\u00a0<\/b><b>The Emergence of the &quot;Double Agent&quot;\u201c<\/b><\/p>\n<p class=\"x_MsoNormal\">The concept of agentic AI brings a paradigm shift. Unlike traditional generative AI, which only responds to commands, agents interact with databases, send emails, and access corporate systems. Without proper governance, these systems risk becoming &quot;double agents&quot;: tools that, due to misconfiguration or external attacks (such as prompt injection), can leak sensitive data or perform unauthorized actions.<\/p>\n<p class=\"x_MsoNormal\">To mitigate these risks, Microsoft introduced the\u00a0<b>Agent 365<\/b>, A unified control plan. The idea is simple, yet powerful: to offer a dashboard where CIOs and CISOs can monitor, in real time, which agents are active, who created them, what data they have access to, and what actions they are performing.<\/p>\n<p class=\"x_MsoNormal\"><b>\u00a0<\/b><b>End-to-end security: identity and data<\/b><\/p>\n<p class=\"x_MsoNormal\">The company&#039;s security strategy is based on extending the model.\u00a0<i>Zero Trust<\/i>\u00a0(Zero Trust) for machines. One of the highlights is the\u00a0<b>Microsoft Login Agent ID<\/b>, This assigns unique identities to AI agents. Just as a human employee needs credentials to access the network, the agent has a traceable identity, allowing security teams to apply conditional access policies and identify anomalous behavior immediately.<\/p>\n<p class=\"x_MsoNormal\">In the data protection pillar, the\u00a0<b>Microsoft Purview<\/b>\u00a0It has been updated to cover the agent workforce. The tool now allows you to identify if an agent is handling classified or sensitive information, applying retention labels and automatically blocking data exfiltration.<\/p>\n<p class=\"x_MsoNormal\"><b>\u00a0<\/b><b>The role of defenders<\/b><\/p>\n<p class=\"x_MsoNormal\">Microsoft also reinforced the role of\u00a0<b>Security Copilot<\/b>\u00a0It&#039;s from\u00a0<b>Microsoft Sentinel<\/b>\u00a0like the eyes of the defenders. With the increasing speed of attacks\u2014which today use AI to automate phishing and malware\u2014the defense needs to act on the same scale. The new resources allow security analysts to perform rapid triage of incidents caused or detected by agents, using AI itself to interpret complex logs and suggest remediations with a single click.<\/p>\n<p class=\"x_MsoNormal\">The company&#039;s message is clear: &quot;Frontier Transformation&quot; will only be successful if it is built on a foundation of trust. With the launch of Microsoft 365 Enterprise 7 and the new agency security ecosystem, the company seeks to ensure that the productivity brought by AI is not accompanied by uncontrollable risks. For businesses, the message is direct: the era of autonomous AI has arrived, and security must now be as intelligent as the tools it protects.<\/p>","protected":false},"excerpt":{"rendered":"<p>\u00c0 medida que as organiza\u00e7\u00f5es abandonam os modelos simples de chatbots para adotar a &#8220;IA ag\u00eantica&#8221; \u2014 sistemas capazes de tomar decis\u00f5es e executar tarefas complexas de forma aut\u00f4noma \u2014, surge um novo desafio cr\u00edtico: como manter o controle e a seguran\u00e7a sobre esses &#8220;funcion\u00e1rios digitais&#8221;? Em comunicado recente, a Microsoft detalhou sua vis\u00e3o de [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":102783,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[9582,108,8331],"class_list":["post-102782","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-coluna-4","category-ultimas-noticias","tag-agent-365","tag-ciberseguranca","tag-ia-agentica"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A nova fronteira da ciberseguran\u00e7a: Microsoft consolida prote\u00e7\u00e3o para a Era da IA Ag\u00eantica - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/a-nova-fronteira-da-ciberseguranca-microsoft-consolida-protecao-para-a-era-da-ia-agentica\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A nova fronteira da ciberseguran\u00e7a: Microsoft consolida prote\u00e7\u00e3o para a Era da IA Ag\u00eantica - ABES\" \/>\n<meta property=\"og:description\" content=\"\u00c0 medida que as organiza\u00e7\u00f5es abandonam os modelos simples de chatbots para adotar a &#8220;IA ag\u00eantica&#8221; \u2014 sistemas capazes de tomar decis\u00f5es e executar tarefas complexas de forma aut\u00f4noma \u2014, surge um novo desafio cr\u00edtico: como manter o controle e a seguran\u00e7a sobre esses &#8220;funcion\u00e1rios digitais&#8221;? Em comunicado recente, a Microsoft detalhou sua vis\u00e3o de [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/a-nova-fronteira-da-ciberseguranca-microsoft-consolida-protecao-para-a-era-da-ia-agentica\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-06T21:07:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2026\/04\/MICROSOFT-IA-CIBERSEGURANCA.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/a-nova-fronteira-da-ciberseguranca-microsoft-consolida-protecao-para-a-era-da-ia-agentica\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/a-nova-fronteira-da-ciberseguranca-microsoft-consolida-protecao-para-a-era-da-ia-agentica\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/dcf8e65fad7e59750ce485162b9368e1\"},\"headline\":\"A nova fronteira da ciberseguran\u00e7a: Microsoft consolida prote\u00e7\u00e3o para a Era da IA Ag\u00eantica\",\"datePublished\":\"2026-04-06T21:07:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/a-nova-fronteira-da-ciberseguranca-microsoft-consolida-protecao-para-a-era-da-ia-agentica\\\/\"},\"wordCount\":558,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/a-nova-fronteira-da-ciberseguranca-microsoft-consolida-protecao-para-a-era-da-ia-agentica\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/MICROSOFT-IA-CIBERSEGURANCA.jpg\",\"keywords\":[\"Agent 365\",\"ciberseguran\u00e7a\",\"IA ag\u00eantica\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/a-nova-fronteira-da-ciberseguranca-microsoft-consolida-protecao-para-a-era-da-ia-agentica\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/a-nova-fronteira-da-ciberseguranca-microsoft-consolida-protecao-para-a-era-da-ia-agentica\\\/\",\"name\":\"A nova fronteira da ciberseguran\u00e7a: Microsoft consolida prote\u00e7\u00e3o para a Era da IA Ag\u00eantica - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/a-nova-fronteira-da-ciberseguranca-microsoft-consolida-protecao-para-a-era-da-ia-agentica\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/a-nova-fronteira-da-ciberseguranca-microsoft-consolida-protecao-para-a-era-da-ia-agentica\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/MICROSOFT-IA-CIBERSEGURANCA.jpg\",\"datePublished\":\"2026-04-06T21:07:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/a-nova-fronteira-da-ciberseguranca-microsoft-consolida-protecao-para-a-era-da-ia-agentica\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/a-nova-fronteira-da-ciberseguranca-microsoft-consolida-protecao-para-a-era-da-ia-agentica\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/a-nova-fronteira-da-ciberseguranca-microsoft-consolida-protecao-para-a-era-da-ia-agentica\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/MICROSOFT-IA-CIBERSEGURANCA.jpg\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/MICROSOFT-IA-CIBERSEGURANCA.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/a-nova-fronteira-da-ciberseguranca-microsoft-consolida-protecao-para-a-era-da-ia-agentica\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A nova fronteira da ciberseguran\u00e7a: Microsoft consolida prote\u00e7\u00e3o para a Era da IA Ag\u00eantica\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/dcf8e65fad7e59750ce485162b9368e1\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A nova fronteira da ciberseguran\u00e7a: Microsoft consolida prote\u00e7\u00e3o para a Era da IA Ag\u00eantica - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/a-nova-fronteira-da-ciberseguranca-microsoft-consolida-protecao-para-a-era-da-ia-agentica\/","og_locale":"en_US","og_type":"article","og_title":"A nova fronteira da ciberseguran\u00e7a: Microsoft consolida prote\u00e7\u00e3o para a Era da IA Ag\u00eantica - ABES","og_description":"\u00c0 medida que as organiza\u00e7\u00f5es abandonam os modelos simples de chatbots para adotar a &#8220;IA ag\u00eantica&#8221; \u2014 sistemas capazes de tomar decis\u00f5es e executar tarefas complexas de forma aut\u00f4noma \u2014, surge um novo desafio cr\u00edtico: como manter o controle e a seguran\u00e7a sobre esses &#8220;funcion\u00e1rios digitais&#8221;? Em comunicado recente, a Microsoft detalhou sua vis\u00e3o de [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/a-nova-fronteira-da-ciberseguranca-microsoft-consolida-protecao-para-a-era-da-ia-agentica\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2026-04-06T21:07:32+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2026\/04\/MICROSOFT-IA-CIBERSEGURANCA.jpg","type":"image\/jpeg"}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/a-nova-fronteira-da-ciberseguranca-microsoft-consolida-protecao-para-a-era-da-ia-agentica\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/a-nova-fronteira-da-ciberseguranca-microsoft-consolida-protecao-para-a-era-da-ia-agentica\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/dcf8e65fad7e59750ce485162b9368e1"},"headline":"A nova fronteira da ciberseguran\u00e7a: Microsoft consolida prote\u00e7\u00e3o para a Era da IA Ag\u00eantica","datePublished":"2026-04-06T21:07:32+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/a-nova-fronteira-da-ciberseguranca-microsoft-consolida-protecao-para-a-era-da-ia-agentica\/"},"wordCount":558,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/a-nova-fronteira-da-ciberseguranca-microsoft-consolida-protecao-para-a-era-da-ia-agentica\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2026\/04\/MICROSOFT-IA-CIBERSEGURANCA.jpg","keywords":["Agent 365","ciberseguran\u00e7a","IA ag\u00eantica"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/a-nova-fronteira-da-ciberseguranca-microsoft-consolida-protecao-para-a-era-da-ia-agentica\/","url":"https:\/\/abes.org.br\/a-nova-fronteira-da-ciberseguranca-microsoft-consolida-protecao-para-a-era-da-ia-agentica\/","name":"A nova fronteira da ciberseguran\u00e7a: Microsoft consolida prote\u00e7\u00e3o para a Era da IA Ag\u00eantica - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/a-nova-fronteira-da-ciberseguranca-microsoft-consolida-protecao-para-a-era-da-ia-agentica\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/a-nova-fronteira-da-ciberseguranca-microsoft-consolida-protecao-para-a-era-da-ia-agentica\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2026\/04\/MICROSOFT-IA-CIBERSEGURANCA.jpg","datePublished":"2026-04-06T21:07:32+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/a-nova-fronteira-da-ciberseguranca-microsoft-consolida-protecao-para-a-era-da-ia-agentica\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/a-nova-fronteira-da-ciberseguranca-microsoft-consolida-protecao-para-a-era-da-ia-agentica\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/a-nova-fronteira-da-ciberseguranca-microsoft-consolida-protecao-para-a-era-da-ia-agentica\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2026\/04\/MICROSOFT-IA-CIBERSEGURANCA.jpg","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2026\/04\/MICROSOFT-IA-CIBERSEGURANCA.jpg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/a-nova-fronteira-da-ciberseguranca-microsoft-consolida-protecao-para-a-era-da-ia-agentica\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"A nova fronteira da ciberseguran\u00e7a: Microsoft consolida prote\u00e7\u00e3o para a Era da IA Ag\u00eantica"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/dcf8e65fad7e59750ce485162b9368e1","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes2\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-14 20:50:18","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/102782","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=102782"}],"version-history":[{"count":1,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/102782\/revisions"}],"predecessor-version":[{"id":102784,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/102782\/revisions\/102784"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media\/102783"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=102782"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=102782"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=102782"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}