{"id":35889,"date":"2021-07-16T10:07:11","date_gmt":"2021-07-16T13:07:11","guid":{"rendered":"https:\/\/abes.org.br\/?p=35889"},"modified":"2021-07-14T10:01:12","modified_gmt":"2021-07-14T13:01:12","slug":"metade-das-operadoras-de-5g-corporativo-nao-tem-o-conhecimento-ou-ferramentas-para-encontrar-e-corrigir-vulnerabilidades-de-seguranca","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/metade-das-operadoras-de-5g-corporativo-nao-tem-o-conhecimento-ou-ferramentas-para-encontrar-e-corrigir-vulnerabilidades-de-seguranca\/","title":{"rendered":"Half of enterprise 5G operators lack the knowledge or tools to find and fix security vulnerabilities"},"content":{"rendered":"<p><em>Trend Micro and GSMA Research Reveals Private Network Security Concerns and Opportunities<\/em><\/p>\n<p>Trend Micro, specializing in cybersecurity solutions, and GSMA Intelligence released new research that reveals a large gap in the security capacity of mobile operators, which in many cases is not yet being filled by industry partnerships.<img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-35943\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/07\/5G-21300.jpg\" alt=\"\" width=\"327\" height=\"197\" \/><\/p>\n<p>In the 5G era, and in a rapidly changing digital landscape, operators could enhance their security credentials with partners capable of protecting private networks.<\/p>\n<p>According to the study, 68% of operators sell private wireless networks to corporate customers and the rest plan to commercialize this modality by 2025. Almost half (45%) of operators consider it extremely important to invest in security to achieve long-term business revenue goals. To this end, operators&#039; 77% intend to offer security as part of their private network solutions.<\/p>\n<p>\u201cThe study reveals a potential disconnect in the way operators view security,\u201d says Ed Cabrera, director of Cybersecurity at Trend Micro. \u201cIt\u2019s obvious they understand the risks and have a very real desire to address cybersecurity concerns. However, some teams are trying to solve the problem without the\u00a0<em>expertise<\/em>\u00a0from security experts or specialist suppliers. This is like hiring a plumber to fix your electrical network: he may be able to identify faults or make recommendations, but he is not necessarily equipped to solve the problem.\u201d<\/p>\n<p>The report further found that:<\/p>\n<p>\u2022 51% of operators see edge computing (Multi-Access Edge Computing or MEC) as a fundamental part of their future business strategy. Only 18% of operators currently guarantee the safety of their\u00a0<em>endpoints<\/em>\u00a0or from the edge of your cellular network.<br \/>\n\u2022 48% of operators cite a lack of knowledge or adequate tools to discover vulnerabilities as one of the main 5G security challenges.<br \/>\n\u2022 39% have a limited group of security experts.<br \/>\n\u2022 41% fight against network virtualization vulnerabilities.<\/p>\n<p>The role that operators can play in securing the private network ecosystem is particularly important in the 5G Era. New threat vectors will materialize companies&#039; focus on adopting new communication technologies (5G,\u00a0<em>edge computing<\/em>,\u00a0<em>cloud computing<\/em>,\u00a0<em>private wireless<\/em>, IoT) to digitally transform your business. Operators are in a unique position to address this and profit from supporting their corporate customers. To take on this role, they must expand their credentials or partner with security, cloud or IT vendors with the expertise to fill any gaps in their security portfolios.<\/p>\n<p>To read the report\u00a0<em><b>\u201cSecuring Private Networks in the 5G Era\u201d<\/b><\/em>, click\u00a0<a href=\"https:\/\/data.gsmaintelligence.com\/research\/research\/research-2021\/securing-private-networks-in-the-5G-era\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/na01.safelinks.protection.outlook.com\/?url%3Dhttps%253A%252F%252Fdata.gsmaintelligence.com%252Fresearch%252Fresearch%252Fresearch-2021%252Fsecuring-private-networks-in-the-5G-era%26data%3D04%257C01%257C%257C90e8adcb919d44aad37408d945fa44d8%257C84df9e7fe9f640afb435aaaaaaaaaaaa%257C1%257C0%257C637617763459567540%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26sdata%3D%252FyoCLTeot7ZBeL%252FqQWshXtQYYWDSCaAuWdnGlQYniTc%253D%26reserved%3D0&amp;source=gmail&amp;ust=1626266823068000&amp;usg=AFQjCNEdNM1vLtBLpt-aKAh2z7Ds-WIu-w\">ON HERE<\/a>.<\/p>\n<p>It is worth highlighting that it is based on two surveys by GSMA Intelligence:<\/p>\n<p>\u2022 The search\u00a0<em><b>GSMA Intelligence Operators in Focus 2021<\/b><\/em>, which taps 100 operator decision-makers from around the world to understand their views on the company&#039;s opportunity.<\/p>\n<p>\u2022 The search\u00a0<em><b>GSMA Intelligence Enterprise in Focus 2020<\/b><\/em>, which covers 2,873 companies across eight industry verticals and 18 countries.<\/p>","protected":false},"excerpt":{"rendered":"<p>Pesquisa da Trend Micro e da GSMA revela preocupa\u00e7\u00f5es e oportunidades de seguran\u00e7a da rede privada A\u00a0Trend Micro, especializada em solu\u00e7\u00f5es de ciberseguran\u00e7a, e a GSMA Intelligence\u00a0divulgaram nova pesquisa que revela uma grande lacuna na capacidade de seguran\u00e7a das operadoras m\u00f3veis, que em muitos casos ainda n\u00e3o est\u00e1 sendo preenchida por parcerias do setor. Na [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[1887,108,1891,1888,1890,1889],"class_list":["post-35889","post","type-post","status-publish","format-standard","hentry","category-coluna-4","category-ultimas-noticias","tag-5g-corporativo","tag-ciberseguranca","tag-novas-tecnologias-de-comunicacao","tag-operadoras-de-5g","tag-operadoras-moveis","tag-vulnerabilidades-de-seguranca"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Metade das operadoras de 5G corporativo n\u00e3o t\u00eam o conhecimento ou ferramentas para encontrar e corrigir vulnerabilidades de seguran\u00e7a - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/metade-das-operadoras-de-5g-corporativo-nao-tem-o-conhecimento-ou-ferramentas-para-encontrar-e-corrigir-vulnerabilidades-de-seguranca\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Metade das operadoras de 5G corporativo n\u00e3o t\u00eam o conhecimento ou ferramentas para encontrar e corrigir vulnerabilidades de seguran\u00e7a - ABES\" \/>\n<meta property=\"og:description\" content=\"Pesquisa da Trend Micro e da GSMA revela preocupa\u00e7\u00f5es e oportunidades de seguran\u00e7a da rede privada A\u00a0Trend Micro, especializada em solu\u00e7\u00f5es de ciberseguran\u00e7a, e a GSMA Intelligence\u00a0divulgaram nova pesquisa que revela uma grande lacuna na capacidade de seguran\u00e7a das operadoras m\u00f3veis, que em muitos casos ainda n\u00e3o est\u00e1 sendo preenchida por parcerias do setor. Na [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/metade-das-operadoras-de-5g-corporativo-nao-tem-o-conhecimento-ou-ferramentas-para-encontrar-e-corrigir-vulnerabilidades-de-seguranca\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-16T13:07:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/07\/5G-21300.jpg\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/metade-das-operadoras-de-5g-corporativo-nao-tem-o-conhecimento-ou-ferramentas-para-encontrar-e-corrigir-vulnerabilidades-de-seguranca\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/metade-das-operadoras-de-5g-corporativo-nao-tem-o-conhecimento-ou-ferramentas-para-encontrar-e-corrigir-vulnerabilidades-de-seguranca\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\"},\"headline\":\"Metade das operadoras de 5G corporativo n\u00e3o t\u00eam o conhecimento ou ferramentas para encontrar e corrigir vulnerabilidades de seguran\u00e7a\",\"datePublished\":\"2021-07-16T13:07:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/metade-das-operadoras-de-5g-corporativo-nao-tem-o-conhecimento-ou-ferramentas-para-encontrar-e-corrigir-vulnerabilidades-de-seguranca\\\/\"},\"wordCount\":548,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/metade-das-operadoras-de-5g-corporativo-nao-tem-o-conhecimento-ou-ferramentas-para-encontrar-e-corrigir-vulnerabilidades-de-seguranca\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/5G-21300.jpg\",\"keywords\":[\"5G corporativo\",\"ciberseguran\u00e7a\",\"novas tecnologias de comunica\u00e7\u00e3o\",\"operadoras de 5G\",\"operadoras m\u00f3veis\",\"vulnerabilidades de seguran\u00e7a\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/metade-das-operadoras-de-5g-corporativo-nao-tem-o-conhecimento-ou-ferramentas-para-encontrar-e-corrigir-vulnerabilidades-de-seguranca\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/metade-das-operadoras-de-5g-corporativo-nao-tem-o-conhecimento-ou-ferramentas-para-encontrar-e-corrigir-vulnerabilidades-de-seguranca\\\/\",\"name\":\"Metade das operadoras de 5G corporativo n\u00e3o t\u00eam o conhecimento ou ferramentas para encontrar e corrigir vulnerabilidades de seguran\u00e7a - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/metade-das-operadoras-de-5g-corporativo-nao-tem-o-conhecimento-ou-ferramentas-para-encontrar-e-corrigir-vulnerabilidades-de-seguranca\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/metade-das-operadoras-de-5g-corporativo-nao-tem-o-conhecimento-ou-ferramentas-para-encontrar-e-corrigir-vulnerabilidades-de-seguranca\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/5G-21300.jpg\",\"datePublished\":\"2021-07-16T13:07:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/metade-das-operadoras-de-5g-corporativo-nao-tem-o-conhecimento-ou-ferramentas-para-encontrar-e-corrigir-vulnerabilidades-de-seguranca\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/metade-das-operadoras-de-5g-corporativo-nao-tem-o-conhecimento-ou-ferramentas-para-encontrar-e-corrigir-vulnerabilidades-de-seguranca\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/metade-das-operadoras-de-5g-corporativo-nao-tem-o-conhecimento-ou-ferramentas-para-encontrar-e-corrigir-vulnerabilidades-de-seguranca\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/5G-21300.jpg\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/5G-21300.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/metade-das-operadoras-de-5g-corporativo-nao-tem-o-conhecimento-ou-ferramentas-para-encontrar-e-corrigir-vulnerabilidades-de-seguranca\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Metade das operadoras de 5G corporativo n\u00e3o t\u00eam o conhecimento ou ferramentas para encontrar e corrigir vulnerabilidades de seguran\u00e7a\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Half of enterprise 5G operators lack the knowledge or tools to find and fix security vulnerabilities - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/metade-das-operadoras-de-5g-corporativo-nao-tem-o-conhecimento-ou-ferramentas-para-encontrar-e-corrigir-vulnerabilidades-de-seguranca\/","og_locale":"en_US","og_type":"article","og_title":"Metade das operadoras de 5G corporativo n\u00e3o t\u00eam o conhecimento ou ferramentas para encontrar e corrigir vulnerabilidades de seguran\u00e7a - ABES","og_description":"Pesquisa da Trend Micro e da GSMA revela preocupa\u00e7\u00f5es e oportunidades de seguran\u00e7a da rede privada A\u00a0Trend Micro, especializada em solu\u00e7\u00f5es de ciberseguran\u00e7a, e a GSMA Intelligence\u00a0divulgaram nova pesquisa que revela uma grande lacuna na capacidade de seguran\u00e7a das operadoras m\u00f3veis, que em muitos casos ainda n\u00e3o est\u00e1 sendo preenchida por parcerias do setor. Na [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/metade-das-operadoras-de-5g-corporativo-nao-tem-o-conhecimento-ou-ferramentas-para-encontrar-e-corrigir-vulnerabilidades-de-seguranca\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2021-07-16T13:07:11+00:00","og_image":[{"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/07\/5G-21300.jpg","type":"","width":"","height":""}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/metade-das-operadoras-de-5g-corporativo-nao-tem-o-conhecimento-ou-ferramentas-para-encontrar-e-corrigir-vulnerabilidades-de-seguranca\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/metade-das-operadoras-de-5g-corporativo-nao-tem-o-conhecimento-ou-ferramentas-para-encontrar-e-corrigir-vulnerabilidades-de-seguranca\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3"},"headline":"Metade das operadoras de 5G corporativo n\u00e3o t\u00eam o conhecimento ou ferramentas para encontrar e corrigir vulnerabilidades de seguran\u00e7a","datePublished":"2021-07-16T13:07:11+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/metade-das-operadoras-de-5g-corporativo-nao-tem-o-conhecimento-ou-ferramentas-para-encontrar-e-corrigir-vulnerabilidades-de-seguranca\/"},"wordCount":548,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/metade-das-operadoras-de-5g-corporativo-nao-tem-o-conhecimento-ou-ferramentas-para-encontrar-e-corrigir-vulnerabilidades-de-seguranca\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/07\/5G-21300.jpg","keywords":["5G corporativo","ciberseguran\u00e7a","novas tecnologias de comunica\u00e7\u00e3o","operadoras de 5G","operadoras m\u00f3veis","vulnerabilidades de seguran\u00e7a"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/metade-das-operadoras-de-5g-corporativo-nao-tem-o-conhecimento-ou-ferramentas-para-encontrar-e-corrigir-vulnerabilidades-de-seguranca\/","url":"https:\/\/abes.org.br\/metade-das-operadoras-de-5g-corporativo-nao-tem-o-conhecimento-ou-ferramentas-para-encontrar-e-corrigir-vulnerabilidades-de-seguranca\/","name":"Half of enterprise 5G operators lack the knowledge or tools to find and fix security vulnerabilities - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/metade-das-operadoras-de-5g-corporativo-nao-tem-o-conhecimento-ou-ferramentas-para-encontrar-e-corrigir-vulnerabilidades-de-seguranca\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/metade-das-operadoras-de-5g-corporativo-nao-tem-o-conhecimento-ou-ferramentas-para-encontrar-e-corrigir-vulnerabilidades-de-seguranca\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/07\/5G-21300.jpg","datePublished":"2021-07-16T13:07:11+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/metade-das-operadoras-de-5g-corporativo-nao-tem-o-conhecimento-ou-ferramentas-para-encontrar-e-corrigir-vulnerabilidades-de-seguranca\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/metade-das-operadoras-de-5g-corporativo-nao-tem-o-conhecimento-ou-ferramentas-para-encontrar-e-corrigir-vulnerabilidades-de-seguranca\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/metade-das-operadoras-de-5g-corporativo-nao-tem-o-conhecimento-ou-ferramentas-para-encontrar-e-corrigir-vulnerabilidades-de-seguranca\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/07\/5G-21300.jpg","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/07\/5G-21300.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/metade-das-operadoras-de-5g-corporativo-nao-tem-o-conhecimento-ou-ferramentas-para-encontrar-e-corrigir-vulnerabilidades-de-seguranca\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Metade das operadoras de 5G corporativo n\u00e3o t\u00eam o conhecimento ou ferramentas para encontrar e corrigir vulnerabilidades de seguran\u00e7a"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-05-02 18:46:33","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/35889","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=35889"}],"version-history":[{"count":3,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/35889\/revisions"}],"predecessor-version":[{"id":35891,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/35889\/revisions\/35891"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=35889"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=35889"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=35889"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}