{"id":42401,"date":"2021-12-22T14:05:42","date_gmt":"2021-12-22T17:05:42","guid":{"rendered":"https:\/\/abes.org.br\/?p=42401"},"modified":"2021-12-17T17:43:59","modified_gmt":"2021-12-17T20:43:59","slug":"blockbit-destaca-tendencias-e-ameacas-para-a-ciberseguranca-em-2022","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/blockbit-destaca-tendencias-e-ameacas-para-a-ciberseguranca-em-2022\/","title":{"rendered":"Blockbit highlights trends and threats to cybersecurity in 2022"},"content":{"rendered":"<p style=\"text-align: center\"><i>Topics such as Fake News, Deep Fakes, Phishing and data hijacking via ransomware should continue to dominate discussions on Information Security<\/i><\/p>\n<p class=\"m_4770210714528591108xxmsonospacing\">To keep pace with the digital transformation, companies from all segments are increasingly investing in connectivity, expanding the use of mobile devices and teleworking. As this new model advances, however, cyber threats are also expected to become more common. In this scenario, the\u00a0<span class=\"m_4770210714528591108xxinternetlink\">Blockbit<\/span>, a global cybersecurity products company, warns that attacks driven by\u00a0<i>fake news<\/i>, fake bots on social networks, mobile malware and data hijacking via Ransomwares should be closely watched as the top cybersecurity threats for 2022. \u00a0<u><\/u><u><\/u><\/p>\n<div id=\"attachment_39009\" style=\"width: 315px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-39009\" class=\"wp-image-39009\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/09\/Data-Drive-Wavy_Tech-10_Single-06.jpg\" alt=\"\" width=\"305\" height=\"305\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/09\/Data-Drive-Wavy_Tech-10_Single-06.jpg 7730w, https:\/\/abes.org.br\/wp-content\/uploads\/2021\/09\/Data-Drive-Wavy_Tech-10_Single-06-300x300.jpg 300w, https:\/\/abes.org.br\/wp-content\/uploads\/2021\/09\/Data-Drive-Wavy_Tech-10_Single-06-768x768.jpg 768w, https:\/\/abes.org.br\/wp-content\/uploads\/2021\/09\/Data-Drive-Wavy_Tech-10_Single-06-12x12.jpg 12w\" sizes=\"(max-width: 305px) 100vw, 305px\" \/><p id=\"caption-attachment-39009\" class=\"wp-caption-text\">Data driven marketing abstract concept vector illustration. Data-driven strategy, consumer behavior analysis, digital marketing trend, campaign, user data, customer information abstract metaphor.<\/p><\/div>\n<p class=\"m_4770210714528591108xxmsonospacing\">\u201cWe are living in a period of rapid and constant changes, with digital dominating even more our work, consumption and entertainment relationships. However, at the same time that innovations are happening, cybercriminals are also working to make their traps more sophisticated\u201d, highlights Cleber Ribas, CEO of Blockbit. \u201cTo overcome these challenges, leaders must first understand the importance of optimizing the information security infrastructure, minimizing any and all gaps that may exist.\u201d\u00a0<u><\/u><u><\/u><\/p>\n<p class=\"m_4770210714528591108xxmsonospacing\">\u00a0Ribas reinforces that the expansion of remote work models will require organizations to fully adapt their information security policies, migrating ever faster from traditional data protection models to the adoption of more flexible digital security solutions. \u201cThe cybersecurity structure now needs to be extended to cover activities that are often outside the internal perimeter of operations, which will demand the construction of partnerships and projects that bring a holistic approach to the entire context of the organization\u201d, he assesses. \u00a0<u><\/u><u><\/u><\/p>\n<p class=\"m_4770210714528591108xxmsonospacing\">It&#039;s worth noting that, according to Gartner&#039;s analysis, approximately two-fifths of professionals worldwide are working from home. The consultancy points out that the move towards hybrid working (or remote 100%) is a seemingly enduring trend, with more than 75% of workers expecting hybrid working environments in the future. \u201cWith this, companies must invest in smarter cybersecurity meshes, with resources that use Zero Trust methodologies and content analysis outside the perimeter of the networks as additional security measures\u201d, observes Ribas.\u00a0<u><\/u><u><\/u><\/p>\n<p class=\"m_4770210714528591108xxmsonospacing\">The executive also emphasizes that cybersecurity perspectives for 2022 should further reinforce the importance of developing more rigid security plans and policies, with long-term initiatives. \u201cWithout a doubt, the Fakes News and Deep Fakes campaigns (videos and montages made via Artificial Intelligence) are increasingly bold and present in our lives. Regardless of the misinformation they carry, companies must pay attention to the participation of people in these contaminations&quot;, he observes. According to Ponemon studies, around 60% of data theft incidents start with human action.\u00a0<u><\/u><u><\/u><\/p>\n<p class=\"m_4770210714528591108xxmsonospacing\">\u201cWe have to have content filtering tools, VPNs, next generation Firewalls and continuous monitoring systems always installed and updated. Parallel to this infrastructure, it is also necessary to guide employees to avoid questionable content and instruct more specific rules to combat virtual attacks, as well as fraud attempts and robots through open systems. Information security is the result of this set of work that includes technologies, people and processes in close synergy\u201d, highlights the CEO. \u00a0\u00a0\u00a0<u><\/u><u><\/u><\/p>\n<p class=\"m_4770210714528591108xxmsonospacing\">To address this context, Blockbit recently promoted the permanent opening of Blockbit University, the company&#039;s virtual training platform, which offers certifications for the use of the entire Blockbit solutions ecosystem and a series of technical content on cybersecurity, including webinars, theoretical pills and videos\u00a0<i>how am<\/i>. \u201cIn addition, we are preparing new features and analyzes to encourage the constant updating of all the ingredients of this broad area that is cybersecurity\u201d, says Ribas.<\/p>","protected":false},"excerpt":{"rendered":"<p>Temas como Fake News, Deep Fakes, Phishing e sequestro de dados via ransomware devem seguir dominando as discuss\u00f5es sobre Seguran\u00e7a da Informa\u00e7\u00e3o Para acompanhar a transforma\u00e7\u00e3o digital, empresas de todos os segmentos est\u00e3o investindo cada vez mais em conectividade, ampliando o uso de dispositivos m\u00f3veis e do trabalho remoto. \u00c0 medida que este novo modelo [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[],"class_list":["post-42401","post","type-post","status-publish","format-standard","hentry","category-coluna-4","category-ultimas-noticias"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Blockbit destaca tend\u00eancias e amea\u00e7as para a ciberseguran\u00e7a em 2022 - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/blockbit-destaca-tendencias-e-ameacas-para-a-ciberseguranca-em-2022\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Blockbit destaca tend\u00eancias e amea\u00e7as para a ciberseguran\u00e7a em 2022 - ABES\" \/>\n<meta property=\"og:description\" content=\"Temas como Fake News, Deep Fakes, Phishing e sequestro de dados via ransomware devem seguir dominando as discuss\u00f5es sobre Seguran\u00e7a da Informa\u00e7\u00e3o Para acompanhar a transforma\u00e7\u00e3o digital, empresas de todos os segmentos est\u00e3o investindo cada vez mais em conectividade, ampliando o uso de dispositivos m\u00f3veis e do trabalho remoto. \u00c0 medida que este novo modelo [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/blockbit-destaca-tendencias-e-ameacas-para-a-ciberseguranca-em-2022\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-22T17:05:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/09\/Data-Drive-Wavy_Tech-10_Single-06.jpg\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/blockbit-destaca-tendencias-e-ameacas-para-a-ciberseguranca-em-2022\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/blockbit-destaca-tendencias-e-ameacas-para-a-ciberseguranca-em-2022\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\"},\"headline\":\"Blockbit destaca tend\u00eancias e amea\u00e7as para a ciberseguran\u00e7a em 2022\",\"datePublished\":\"2021-12-22T17:05:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/blockbit-destaca-tendencias-e-ameacas-para-a-ciberseguranca-em-2022\\\/\"},\"wordCount\":747,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/blockbit-destaca-tendencias-e-ameacas-para-a-ciberseguranca-em-2022\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/Data-Drive-Wavy_Tech-10_Single-06.jpg\",\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/blockbit-destaca-tendencias-e-ameacas-para-a-ciberseguranca-em-2022\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/blockbit-destaca-tendencias-e-ameacas-para-a-ciberseguranca-em-2022\\\/\",\"name\":\"Blockbit destaca tend\u00eancias e amea\u00e7as para a ciberseguran\u00e7a em 2022 - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/blockbit-destaca-tendencias-e-ameacas-para-a-ciberseguranca-em-2022\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/blockbit-destaca-tendencias-e-ameacas-para-a-ciberseguranca-em-2022\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/Data-Drive-Wavy_Tech-10_Single-06.jpg\",\"datePublished\":\"2021-12-22T17:05:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/blockbit-destaca-tendencias-e-ameacas-para-a-ciberseguranca-em-2022\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/en\\\/blockbit-destaca-tendencias-e-ameacas-para-a-ciberseguranca-em-2022\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/blockbit-destaca-tendencias-e-ameacas-para-a-ciberseguranca-em-2022\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/Data-Drive-Wavy_Tech-10_Single-06.jpg\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/Data-Drive-Wavy_Tech-10_Single-06.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/blockbit-destaca-tendencias-e-ameacas-para-a-ciberseguranca-em-2022\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blockbit destaca tend\u00eancias e amea\u00e7as para a ciberseguran\u00e7a em 2022\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Blockbit highlights trends and threats for cybersecurity in 2022 - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/blockbit-destaca-tendencias-e-ameacas-para-a-ciberseguranca-em-2022\/","og_locale":"en_US","og_type":"article","og_title":"Blockbit destaca tend\u00eancias e amea\u00e7as para a ciberseguran\u00e7a em 2022 - ABES","og_description":"Temas como Fake News, Deep Fakes, Phishing e sequestro de dados via ransomware devem seguir dominando as discuss\u00f5es sobre Seguran\u00e7a da Informa\u00e7\u00e3o Para acompanhar a transforma\u00e7\u00e3o digital, empresas de todos os segmentos est\u00e3o investindo cada vez mais em conectividade, ampliando o uso de dispositivos m\u00f3veis e do trabalho remoto. \u00c0 medida que este novo modelo [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/blockbit-destaca-tendencias-e-ameacas-para-a-ciberseguranca-em-2022\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2021-12-22T17:05:42+00:00","og_image":[{"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/09\/Data-Drive-Wavy_Tech-10_Single-06.jpg","type":"","width":"","height":""}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/en\/blockbit-destaca-tendencias-e-ameacas-para-a-ciberseguranca-em-2022\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/en\/blockbit-destaca-tendencias-e-ameacas-para-a-ciberseguranca-em-2022\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3"},"headline":"Blockbit destaca tend\u00eancias e amea\u00e7as para a ciberseguran\u00e7a em 2022","datePublished":"2021-12-22T17:05:42+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/en\/blockbit-destaca-tendencias-e-ameacas-para-a-ciberseguranca-em-2022\/"},"wordCount":747,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/en\/blockbit-destaca-tendencias-e-ameacas-para-a-ciberseguranca-em-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/09\/Data-Drive-Wavy_Tech-10_Single-06.jpg","articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/en\/blockbit-destaca-tendencias-e-ameacas-para-a-ciberseguranca-em-2022\/","url":"https:\/\/abes.org.br\/en\/blockbit-destaca-tendencias-e-ameacas-para-a-ciberseguranca-em-2022\/","name":"Blockbit highlights trends and threats for cybersecurity in 2022 - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/en\/blockbit-destaca-tendencias-e-ameacas-para-a-ciberseguranca-em-2022\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/en\/blockbit-destaca-tendencias-e-ameacas-para-a-ciberseguranca-em-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/09\/Data-Drive-Wavy_Tech-10_Single-06.jpg","datePublished":"2021-12-22T17:05:42+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/en\/blockbit-destaca-tendencias-e-ameacas-para-a-ciberseguranca-em-2022\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/en\/blockbit-destaca-tendencias-e-ameacas-para-a-ciberseguranca-em-2022\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/en\/blockbit-destaca-tendencias-e-ameacas-para-a-ciberseguranca-em-2022\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/09\/Data-Drive-Wavy_Tech-10_Single-06.jpg","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/09\/Data-Drive-Wavy_Tech-10_Single-06.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/en\/blockbit-destaca-tendencias-e-ameacas-para-a-ciberseguranca-em-2022\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Blockbit destaca tend\u00eancias e amea\u00e7as para a ciberseguran\u00e7a em 2022"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-30 20:20:12","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/42401","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=42401"}],"version-history":[{"count":1,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/42401\/revisions"}],"predecessor-version":[{"id":42402,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/42401\/revisions\/42402"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=42401"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=42401"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=42401"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}