{"id":48103,"date":"2022-07-25T13:45:03","date_gmt":"2022-07-25T16:45:03","guid":{"rendered":"https:\/\/abes.org.br\/?p=48103"},"modified":"2022-07-12T20:51:54","modified_gmt":"2022-07-12T23:51:54","slug":"pesquisa-revela-que-75-dos-cisos-estao-preocupados-com-o-vazamento-de-vulnerabilidades-no-desenvolvimento-de-aplicacoes","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/pesquisa-revela-que-75-dos-cisos-estao-preocupados-com-o-vazamento-de-vulnerabilidades-no-desenvolvimento-de-aplicacoes\/","title":{"rendered":"Survey reveals 75% of CISOs are concerned about leaking vulnerabilities in application development"},"content":{"rendered":"<p style=\"text-align: center\"><i>79% from CISOs say ongoing runtime vulnerability management is a key capability to keep up with the increasing complexity of multicloud environments\u00a0<\/i><\/p>\n<p style=\"font-weight: 400\">Dynatrace, the benchmark in Software Intelligence, announces the results of its latest independent global survey of 1,300 chief information security officers (CISOs) in large organizations. Research reveals that the speed and complexity brought by using multicloud environments, multiple coding languages and open source software libraries are making vulnerability management difficult. The 75% study indicates that CISOs say that despite having a multi-layered security posture, persistent gaps in coverage allow for vulnerabilities in software production.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-38614\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/08\/Seguran\u00e7a-TI-93472-scaled.jpg\" alt=\"\" width=\"369\" height=\"246\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/08\/Seguran\u00e7a-TI-93472-scaled.jpg 2560w, https:\/\/abes.org.br\/wp-content\/uploads\/2021\/08\/Seguran\u00e7a-TI-93472-300x200.jpg 300w, https:\/\/abes.org.br\/wp-content\/uploads\/2021\/08\/Seguran\u00e7a-TI-93472-1024x683.jpg 1024w, https:\/\/abes.org.br\/wp-content\/uploads\/2021\/08\/Seguran\u00e7a-TI-93472-768x512.jpg 768w, https:\/\/abes.org.br\/wp-content\/uploads\/2021\/08\/Seguran\u00e7a-TI-93472-391x260.jpg 391w, https:\/\/abes.org.br\/wp-content\/uploads\/2021\/08\/Seguran\u00e7a-TI-93472-1536x1024.jpg 1536w, https:\/\/abes.org.br\/wp-content\/uploads\/2021\/08\/Seguran\u00e7a-TI-93472-2048x1366.jpg 2048w, https:\/\/abes.org.br\/wp-content\/uploads\/2021\/08\/Seguran\u00e7a-TI-93472-18x12.jpg 18w, https:\/\/abes.org.br\/wp-content\/uploads\/2021\/08\/Seguran\u00e7a-TI-93472-1080x720.jpg 1080w, https:\/\/abes.org.br\/wp-content\/uploads\/2021\/08\/Seguran\u00e7a-TI-93472-1280x854.jpg 1280w, https:\/\/abes.org.br\/wp-content\/uploads\/2021\/08\/Seguran\u00e7a-TI-93472-980x653.jpg 980w, https:\/\/abes.org.br\/wp-content\/uploads\/2021\/08\/Seguran\u00e7a-TI-93472-480x320.jpg 480w\" sizes=\"(max-width: 369px) 100vw, 369px\" \/><\/p>\n<p style=\"font-weight: 400\">As a consequence, the research highlights the growing need for observability and security convergence, paving the way for AISecDevOps practices. This will empower organizations with a more effective way to manage runtime vulnerabilities and the ability to detect and block attacks in real time. The report states that observability and security must converge to enable effective vulnerability management.<\/p>\n<p style=\"font-weight: 400\">The search results include important points such as:<\/p>\n<p style=\"font-weight: 400\"><strong>\u2013<\/strong>\u00a069% from CISOs say vulnerability management has become more difficult as the need to accelerate digital transformation has increased.<\/p>\n<p style=\"font-weight: 400\"><strong>\u2013<\/strong>\u00a0More than three-quarters (79%) of CISOs say that automatic and continuous management of vulnerabilities at runtime is critical to filling the gap in capabilities of existing security solutions. However, only 4% of organizations have real-time visibility into runtime vulnerabilities in containerized production environments.<\/p>\n<p style=\"font-weight: 400\"><strong>\u2013\u00a0<\/strong>Only 25%&#039;s security teams can access a fully accurate and continuously updated report of every application and code library running in real-time production.<\/p>\n<p style=\"font-weight: 400\">\u201cThese findings underscore that it is always possible for vulnerabilities to go unnoticed by security teams, regardless of how robust their defenses are. Both new applications and stable legacy software are prone to vulnerabilities that are most reliably detected in the production and analysis stages. Log4Shell was the poster child for this issue and there will undoubtedly be other scenarios like this in the future,\u201d says Bernd Greifeneder, Chief Technology Officer at Dynatrace.<\/p>\n<p style=\"font-weight: 400\">The executive also highlights that most organizations still do not have real-time visibility into runtime vulnerabilities. \u201cThe issue stems from the increasing use of cloud-native delivery practices, which enable greater business agility but also introduce new complexity for vulnerability management, attack detection and blocking. The rapid pace of digital transformation means that already overworked teams are bombarded by thousands of security alerts that make it impossible to see through the noise and focus on what matters. Teams find it impossible to manually respond to all alerts and organizations are exposed to unnecessary risk by allowing vulnerabilities to escape into production.\u201d<\/p>\n<p style=\"font-weight: 400\">The report with the CISOs also includes findings such as:<\/p>\n<p style=\"font-weight: 400\"><strong>\u2013<\/strong>\u00a0On average, organizations receive 2,027 alerts of potential application security vulnerabilities each month.<\/p>\n<p style=\"font-weight: 400\"><strong>\u2013<\/strong>\u00a0Less than a third (32%) of the application security vulnerability alerts organizations receive each day require action, compared to 42% last year.<\/p>\n<p style=\"font-weight: 400\"><strong>\u2013<\/strong>\u00a0On average, application security teams waste 28% of their time on vulnerability management tasks that can be automated.<\/p>\n<p style=\"font-weight: 400\">\u201cOrganizations realize that to effectively manage vulnerabilities in the age of the Cloud, security must become a shared responsibility. Convergence between observability and security is critical to giving development, operations, and security teams the context they need to understand how applications are connected, where vulnerabilities are, and what actions need to be prioritized. This accelerates risk management and incident response\u201d, reinforces Greifeneder.<\/p>\n<p style=\"font-weight: 400\">\u201cTo be truly effective, organizations must look for solutions that have AI and automation capabilities at their core, enabling the evolution of AISecDevOps. These solutions empower your teams to quickly identify and prioritize vulnerabilities at runtime, block attacks in real-time, and fix software flaws before they can be exploited. This means teams can stop wasting time in war rooms or chasing false positives and potential vulnerabilities that will never make it to production. Instead, they confidently deliver better, more secure software faster.\u201d<\/p>\n<p style=\"font-weight: 400\">The report is based on a global survey of 1,300 CISOs in large organizations with more than 1,000 employees and was conducted by consultancy Coleman Parkes and commissioned by Dynatrace in April 2022. The sample included 200 respondents in the United States, 100 leaders from each country in the UK, France, Germany, Spain, Italy, Nordic countries, the Middle East, Australia and India, and 50 information security officers from each country in Singapore, Malaysia, Brazil and Mexico.<\/p>","protected":false},"excerpt":{"rendered":"<p>79% dos CISOs dizem que o gerenciamento cont\u00ednuo de vulnerabilidades em tempo de execu\u00e7\u00e3o \u00e9 um recurso essencial para acompanhar a crescente complexidade dos ambientes Multicloud\u00a0 A\u00a0Dynatrace,\u00a0refer\u00eancia\u00a0em Intelig\u00eancia de Software, anuncia os resultados de sua mais recente pesquisa global independente com 1.300 diretores de seguran\u00e7a da informa\u00e7\u00e3o (CISOs) em organiza\u00e7\u00f5es de grande porte. A pesquisa [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[3101,360,3100,525,2350],"class_list":["post-48103","post","type-post","status-publish","format-standard","hentry","category-coluna-4","category-ultimas-noticias","tag-ciso","tag-multicloud","tag-observalidade","tag-seguranca","tag-vulnerabilidades"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Pesquisa revela que 75% dos CISOs est\u00e3o preocupados com o vazamento de vulnerabilidades no desenvolvimento de aplica\u00e7\u00f5es - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/pesquisa-revela-que-75-dos-cisos-estao-preocupados-com-o-vazamento-de-vulnerabilidades-no-desenvolvimento-de-aplicacoes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pesquisa revela que 75% dos CISOs est\u00e3o preocupados com o vazamento de vulnerabilidades no desenvolvimento de aplica\u00e7\u00f5es - ABES\" \/>\n<meta property=\"og:description\" content=\"79% dos CISOs dizem que o gerenciamento cont\u00ednuo de vulnerabilidades em tempo de execu\u00e7\u00e3o \u00e9 um recurso essencial para acompanhar a crescente complexidade dos ambientes Multicloud\u00a0 A\u00a0Dynatrace,\u00a0refer\u00eancia\u00a0em Intelig\u00eancia de Software, anuncia os resultados de sua mais recente pesquisa global independente com 1.300 diretores de seguran\u00e7a da informa\u00e7\u00e3o (CISOs) em organiza\u00e7\u00f5es de grande porte. A pesquisa [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/pesquisa-revela-que-75-dos-cisos-estao-preocupados-com-o-vazamento-de-vulnerabilidades-no-desenvolvimento-de-aplicacoes\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-25T16:45:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/01\/logo_abes_marca_tagline_horizontal_colorido_rgb.png\" \/>\n\t<meta property=\"og:image:width\" content=\"3509\" \/>\n\t<meta property=\"og:image:height\" content=\"2482\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/pesquisa-revela-que-75-dos-cisos-estao-preocupados-com-o-vazamento-de-vulnerabilidades-no-desenvolvimento-de-aplicacoes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/pesquisa-revela-que-75-dos-cisos-estao-preocupados-com-o-vazamento-de-vulnerabilidades-no-desenvolvimento-de-aplicacoes\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\"},\"headline\":\"Pesquisa revela que 75% dos CISOs est\u00e3o preocupados com o vazamento de vulnerabilidades no desenvolvimento de aplica\u00e7\u00f5es\",\"datePublished\":\"2022-07-25T16:45:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/pesquisa-revela-que-75-dos-cisos-estao-preocupados-com-o-vazamento-de-vulnerabilidades-no-desenvolvimento-de-aplicacoes\\\/\"},\"wordCount\":943,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"keywords\":[\"ciso\",\"Multicloud\",\"observalidade\",\"seguran\u00e7a\",\"vulnerabilidades\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/pesquisa-revela-que-75-dos-cisos-estao-preocupados-com-o-vazamento-de-vulnerabilidades-no-desenvolvimento-de-aplicacoes\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/pesquisa-revela-que-75-dos-cisos-estao-preocupados-com-o-vazamento-de-vulnerabilidades-no-desenvolvimento-de-aplicacoes\\\/\",\"name\":\"Pesquisa revela que 75% dos CISOs est\u00e3o preocupados com o vazamento de vulnerabilidades no desenvolvimento de aplica\u00e7\u00f5es - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"datePublished\":\"2022-07-25T16:45:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/pesquisa-revela-que-75-dos-cisos-estao-preocupados-com-o-vazamento-de-vulnerabilidades-no-desenvolvimento-de-aplicacoes\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/pesquisa-revela-que-75-dos-cisos-estao-preocupados-com-o-vazamento-de-vulnerabilidades-no-desenvolvimento-de-aplicacoes\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/pesquisa-revela-que-75-dos-cisos-estao-preocupados-com-o-vazamento-de-vulnerabilidades-no-desenvolvimento-de-aplicacoes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pesquisa revela que 75% dos CISOs est\u00e3o preocupados com o vazamento de vulnerabilidades no desenvolvimento de aplica\u00e7\u00f5es\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pesquisa revela que 75% dos CISOs est\u00e3o preocupados com o vazamento de vulnerabilidades no desenvolvimento de aplica\u00e7\u00f5es - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/pesquisa-revela-que-75-dos-cisos-estao-preocupados-com-o-vazamento-de-vulnerabilidades-no-desenvolvimento-de-aplicacoes\/","og_locale":"en_US","og_type":"article","og_title":"Pesquisa revela que 75% dos CISOs est\u00e3o preocupados com o vazamento de vulnerabilidades no desenvolvimento de aplica\u00e7\u00f5es - ABES","og_description":"79% dos CISOs dizem que o gerenciamento cont\u00ednuo de vulnerabilidades em tempo de execu\u00e7\u00e3o \u00e9 um recurso essencial para acompanhar a crescente complexidade dos ambientes Multicloud\u00a0 A\u00a0Dynatrace,\u00a0refer\u00eancia\u00a0em Intelig\u00eancia de Software, anuncia os resultados de sua mais recente pesquisa global independente com 1.300 diretores de seguran\u00e7a da informa\u00e7\u00e3o (CISOs) em organiza\u00e7\u00f5es de grande porte. A pesquisa [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/pesquisa-revela-que-75-dos-cisos-estao-preocupados-com-o-vazamento-de-vulnerabilidades-no-desenvolvimento-de-aplicacoes\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2022-07-25T16:45:03+00:00","og_image":[{"width":3509,"height":2482,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/01\/logo_abes_marca_tagline_horizontal_colorido_rgb.png","type":"image\/png"}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/pesquisa-revela-que-75-dos-cisos-estao-preocupados-com-o-vazamento-de-vulnerabilidades-no-desenvolvimento-de-aplicacoes\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/pesquisa-revela-que-75-dos-cisos-estao-preocupados-com-o-vazamento-de-vulnerabilidades-no-desenvolvimento-de-aplicacoes\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3"},"headline":"Pesquisa revela que 75% dos CISOs est\u00e3o preocupados com o vazamento de vulnerabilidades no desenvolvimento de aplica\u00e7\u00f5es","datePublished":"2022-07-25T16:45:03+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/pesquisa-revela-que-75-dos-cisos-estao-preocupados-com-o-vazamento-de-vulnerabilidades-no-desenvolvimento-de-aplicacoes\/"},"wordCount":943,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"keywords":["ciso","Multicloud","observalidade","seguran\u00e7a","vulnerabilidades"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/pesquisa-revela-que-75-dos-cisos-estao-preocupados-com-o-vazamento-de-vulnerabilidades-no-desenvolvimento-de-aplicacoes\/","url":"https:\/\/abes.org.br\/pesquisa-revela-que-75-dos-cisos-estao-preocupados-com-o-vazamento-de-vulnerabilidades-no-desenvolvimento-de-aplicacoes\/","name":"Pesquisa revela que 75% dos CISOs est\u00e3o preocupados com o vazamento de vulnerabilidades no desenvolvimento de aplica\u00e7\u00f5es - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"datePublished":"2022-07-25T16:45:03+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/pesquisa-revela-que-75-dos-cisos-estao-preocupados-com-o-vazamento-de-vulnerabilidades-no-desenvolvimento-de-aplicacoes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/pesquisa-revela-que-75-dos-cisos-estao-preocupados-com-o-vazamento-de-vulnerabilidades-no-desenvolvimento-de-aplicacoes\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/pesquisa-revela-que-75-dos-cisos-estao-preocupados-com-o-vazamento-de-vulnerabilidades-no-desenvolvimento-de-aplicacoes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Pesquisa revela que 75% dos CISOs est\u00e3o preocupados com o vazamento de vulnerabilidades no desenvolvimento de aplica\u00e7\u00f5es"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-28 06:51:53","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/48103","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=48103"}],"version-history":[{"count":1,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/48103\/revisions"}],"predecessor-version":[{"id":48104,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/48103\/revisions\/48104"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=48103"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=48103"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=48103"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}