{"id":55897,"date":"2023-01-25T08:39:25","date_gmt":"2023-01-25T11:39:25","guid":{"rendered":"https:\/\/abes.org.br\/?p=55897"},"modified":"2023-01-18T14:11:57","modified_gmt":"2023-01-18T17:11:57","slug":"trend-micro-aponta-as-principais-vulnerabilidades-ciberneticas-para-2023","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/trend-micro-aponta-as-principais-vulnerabilidades-ciberneticas-para-2023\/","title":{"rendered":"Trend Micro points out the main cyber vulnerabilities for 2023"},"content":{"rendered":"<p style=\"text-align: center\"><em>Hybrid Workers, Connected Cars and Managed Service Providers (MSP) will be top targets for attacks in the coming year, according to Trend Micro report<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-55904 aligncenter\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/01\/Pesquisa-Trend-Micro.jpg\" alt=\"\" width=\"579\" height=\"230\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/01\/Pesquisa-Trend-Micro.jpg 579w, https:\/\/abes.org.br\/wp-content\/uploads\/2023\/01\/Pesquisa-Trend-Micro-480x191.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 579px, 100vw\" \/><\/p>\n<p style=\"font-weight: 400\">According to the Trend Micro study,\u00a0<strong>\u201cTight future: security predictions for 2023\u201d<\/strong>, cybercriminals will target the security blind spots of home offices and the cloud and software supply chain in the coming year. The report points to VPNs as a particularly attractive target, as a single solution can be exploited to reach multiple corporate networks, and highlights the fragility of home routers, which are often not patched or managed by central IT.<\/p>\n<p>\u201cThe pandemic may be passing, but remote work is here to stay,\u201d said Jon Clay, vice president of Threat Intelligence at Trend Micro. \u201cThis means a renewed focus by threat actors in 2023 on unpatched VPNs, connected SOHO (Small Office\/Home Office Routers) devices, and the\u00a0<em>backend<\/em>\u00a0of cloud infrastructure. In response, organizations will need to focus on helping already stretched security teams by consolidating attack surface management and detection and response with a single, more cost-effective platform.\u201d<\/p>\n<p>Along with the threat of hybrid work, the report anticipates several trends for IT security leaders, including:<\/p>\n<p>\u2013 The growing threat to\u00a0<strong>Managed Service Providers (MSPs) supply chain<\/strong>, which will be hit because they provide access to a high volume of customer activity, maximizing ROI from ransomware, data theft and other attacks;<\/p>\n<p>\u2013 The techniques of<strong>live off the cloud\u201d may become the norm for groups attacking cloud infrastructure<\/strong>, with the aim of remaining hidden from conventional security tools. An example is the use of a victim&#039;s backup solutions to download the stolen data to the attacker&#039;s storage location;<br \/>\n\u2013\u00a0<strong>Threat to connected cars<\/strong>, targeting cloud APIs that sit between the eSIMs embedded in the vehicle (electronic chips) and the backend application servers. In the worst case scenario (i.e. on Tesla&#039;s API) attacks could be used to gain access to vehicles. The auto industry can also be affected by malware lurking in open source repositories;<\/p>\n<p>- You\u00a0<strong>\u201cRansomware as a Service\u201d (RaaS) groups can rethink their business<\/strong>\u00a0as the impact of double extortion fades away. Some may focus on the cloud, while others may abandon ransomware and try to profit from other forms of extortion such as data theft;<\/p>\n<p>\u2013 Social engineering will be boosted with offers of\u00a0<strong>Corporate Email Compromise (BEC) as a Service<\/strong>\u00a0and the emergence of\u00a0<strong>BEC based on deepfake<\/strong>;<\/p>\n<p>\u2013 Companies will also have to pay attention to the\u00a0<strong>attacks targeting OT (Operational technology) systems\u00a0<\/strong>that control industrial equipment.<\/p>\n<p>Blockchain-powered virtual assets such as cryptocurrencies will continue to pique the interest of malicious actors, who like to act with freedom and anonymity, although actions against non-fungible tokens (NFTs) and the metaverse are expected to remain stagnant.<\/p>\n<p>Trend Micro recommends that organizations mitigate these emerging threats in 2023 by:<\/p>\n<ul style=\"font-weight: 400\">\n<li>Zero Trust strategies built on the \u201cnever trust, always verify\u201d mantra, to minimize damage without sacrificing user productivity;<\/li>\n<li>Employee training and awareness to strengthen weak links in the security chain;<\/li>\n<li>Consolidation of all attack surface monitoring and threat detection and response into a single security platform. This will improve the company&#039;s ability to catch suspicious activity on its networks, reduce the burden on security teams and keep defenders sharp;<\/li>\n<li>IT stress testing infrastructures to ensure readiness for attacks in different scenarios, especially those where a perimeter gateway has already been breached;<\/li>\n<li>Inventory of software for each application (<em>Bill of Materials Software<\/em>\u00a0\u2013 SBOM), to accelerate and improve vulnerability management by providing visibility into in-house developed code, what was purchased from commercial sources, and\/or created from third-party sources.<\/li>\n<\/ul>\n<p style=\"font-weight: 400\">To read a full copy of the\u00a0<strong>Trend Micro Predictions for 2023<\/strong>, click\u00a0<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/predictions\/2023\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/nam12.safelinks.protection.outlook.com\/?url%3Dhttps%253A%252F%252Fwww.trendmicro.com%252Fvinfo%252Fus%252Fsecurity%252Fresearch-and-analysis%252Fpredictions%252F2023%26data%3D05%257C01%257C%257Ceb56f0f1462f435ad1b108daed80dce8%257C84df9e7fe9f640afb435aaaaaaaaaaaa%257C1%257C0%257C638083434985107273%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C3000%257C%257C%257C%26sdata%3DhzmDIMbO9MmLnvCm33Rw9FTUea3%252Bmr0MV7xYKiQ65dw%253D%26reserved%3D0&amp;source=gmail&amp;ust=1673395617621000&amp;usg=AOvVaw3w5awlJfoJ4TSCUOb_te6T\">ON HERE<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Os trabalhadores h\u00edbridos, os carros conectados e os provedores de servi\u00e7os gerenciados (MSP) ser\u00e3o os principais alvos de ataques no pr\u00f3ximo ano, segundo relat\u00f3rio da Trend Micro Segundo o estudo da\u00a0Trend Micro,\u00a0\u201cFuturo tenso: previs\u00f5es de seguran\u00e7a para 2023\u201d, os criminosos cibern\u00e9ticos v\u00e3o direcionar os ataques, no pr\u00f3ximo ano, aos pontos cegos de seguran\u00e7a dos escrit\u00f3rios [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[],"class_list":["post-55897","post","type-post","status-publish","format-standard","hentry","category-coluna-4","category-ultimas-noticias"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Trend Micro aponta as principais vulnerabilidades cibern\u00e9ticas para 2023 - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/trend-micro-aponta-as-principais-vulnerabilidades-ciberneticas-para-2023\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trend Micro aponta as principais vulnerabilidades cibern\u00e9ticas para 2023 - ABES\" \/>\n<meta property=\"og:description\" content=\"Os trabalhadores h\u00edbridos, os carros conectados e os provedores de servi\u00e7os gerenciados (MSP) ser\u00e3o os principais alvos de ataques no pr\u00f3ximo ano, segundo relat\u00f3rio da Trend Micro Segundo o estudo da\u00a0Trend Micro,\u00a0\u201cFuturo tenso: previs\u00f5es de seguran\u00e7a para 2023\u201d, os criminosos cibern\u00e9ticos v\u00e3o direcionar os ataques, no pr\u00f3ximo ano, aos pontos cegos de seguran\u00e7a dos escrit\u00f3rios [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/trend-micro-aponta-as-principais-vulnerabilidades-ciberneticas-para-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-25T11:39:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/01\/Pesquisa-Trend-Micro.jpg\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-aponta-as-principais-vulnerabilidades-ciberneticas-para-2023\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-aponta-as-principais-vulnerabilidades-ciberneticas-para-2023\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\"},\"headline\":\"Trend Micro aponta as principais vulnerabilidades cibern\u00e9ticas para 2023\",\"datePublished\":\"2023-01-25T11:39:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-aponta-as-principais-vulnerabilidades-ciberneticas-para-2023\\\/\"},\"wordCount\":800,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-aponta-as-principais-vulnerabilidades-ciberneticas-para-2023\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Pesquisa-Trend-Micro.jpg\",\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-aponta-as-principais-vulnerabilidades-ciberneticas-para-2023\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-aponta-as-principais-vulnerabilidades-ciberneticas-para-2023\\\/\",\"name\":\"Trend Micro aponta as principais vulnerabilidades cibern\u00e9ticas para 2023 - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-aponta-as-principais-vulnerabilidades-ciberneticas-para-2023\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-aponta-as-principais-vulnerabilidades-ciberneticas-para-2023\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Pesquisa-Trend-Micro.jpg\",\"datePublished\":\"2023-01-25T11:39:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-aponta-as-principais-vulnerabilidades-ciberneticas-para-2023\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/trend-micro-aponta-as-principais-vulnerabilidades-ciberneticas-para-2023\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-aponta-as-principais-vulnerabilidades-ciberneticas-para-2023\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Pesquisa-Trend-Micro.jpg\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Pesquisa-Trend-Micro.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-aponta-as-principais-vulnerabilidades-ciberneticas-para-2023\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro aponta as principais vulnerabilidades cibern\u00e9ticas para 2023\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Trend Micro aponta as principais vulnerabilidades cibern\u00e9ticas para 2023 - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/trend-micro-aponta-as-principais-vulnerabilidades-ciberneticas-para-2023\/","og_locale":"en_US","og_type":"article","og_title":"Trend Micro aponta as principais vulnerabilidades cibern\u00e9ticas para 2023 - ABES","og_description":"Os trabalhadores h\u00edbridos, os carros conectados e os provedores de servi\u00e7os gerenciados (MSP) ser\u00e3o os principais alvos de ataques no pr\u00f3ximo ano, segundo relat\u00f3rio da Trend Micro Segundo o estudo da\u00a0Trend Micro,\u00a0\u201cFuturo tenso: previs\u00f5es de seguran\u00e7a para 2023\u201d, os criminosos cibern\u00e9ticos v\u00e3o direcionar os ataques, no pr\u00f3ximo ano, aos pontos cegos de seguran\u00e7a dos escrit\u00f3rios [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/trend-micro-aponta-as-principais-vulnerabilidades-ciberneticas-para-2023\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2023-01-25T11:39:25+00:00","og_image":[{"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/01\/Pesquisa-Trend-Micro.jpg","type":"","width":"","height":""}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/trend-micro-aponta-as-principais-vulnerabilidades-ciberneticas-para-2023\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/trend-micro-aponta-as-principais-vulnerabilidades-ciberneticas-para-2023\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3"},"headline":"Trend Micro aponta as principais vulnerabilidades cibern\u00e9ticas para 2023","datePublished":"2023-01-25T11:39:25+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/trend-micro-aponta-as-principais-vulnerabilidades-ciberneticas-para-2023\/"},"wordCount":800,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/trend-micro-aponta-as-principais-vulnerabilidades-ciberneticas-para-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/01\/Pesquisa-Trend-Micro.jpg","articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/trend-micro-aponta-as-principais-vulnerabilidades-ciberneticas-para-2023\/","url":"https:\/\/abes.org.br\/trend-micro-aponta-as-principais-vulnerabilidades-ciberneticas-para-2023\/","name":"Trend Micro aponta as principais vulnerabilidades cibern\u00e9ticas para 2023 - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/trend-micro-aponta-as-principais-vulnerabilidades-ciberneticas-para-2023\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/trend-micro-aponta-as-principais-vulnerabilidades-ciberneticas-para-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/01\/Pesquisa-Trend-Micro.jpg","datePublished":"2023-01-25T11:39:25+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/trend-micro-aponta-as-principais-vulnerabilidades-ciberneticas-para-2023\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/trend-micro-aponta-as-principais-vulnerabilidades-ciberneticas-para-2023\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/trend-micro-aponta-as-principais-vulnerabilidades-ciberneticas-para-2023\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/01\/Pesquisa-Trend-Micro.jpg","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/01\/Pesquisa-Trend-Micro.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/trend-micro-aponta-as-principais-vulnerabilidades-ciberneticas-para-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Trend Micro aponta as principais vulnerabilidades cibern\u00e9ticas para 2023"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-19 11:13:43","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/55897","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=55897"}],"version-history":[{"count":2,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/55897\/revisions"}],"predecessor-version":[{"id":56390,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/55897\/revisions\/56390"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=55897"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=55897"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=55897"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}