{"id":64940,"date":"2023-08-08T08:34:28","date_gmt":"2023-08-08T11:34:28","guid":{"rendered":"https:\/\/abes.org.br\/?p=64940"},"modified":"2023-07-31T05:42:07","modified_gmt":"2023-07-31T08:42:07","slug":"insights-de-dados-precisam-de-conexao-com-a-seguranca-cibernetica-alerta-estudo-da-trend-micro","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/insights-de-dados-precisam-de-conexao-com-a-seguranca-cibernetica-alerta-estudo-da-trend-micro\/","title":{"rendered":"Data insights need connection to cybersecurity, Trend Micro study warns"},"content":{"rendered":"<p style=\"text-align: center\"><em>Study commissioned from Sapio Research heard more than 2700 executives in 25 countries<\/em><\/p>\n<p>Research commissioned by Trend Micro, the world leader in cybersecurity solutions, from Sapio Research reveals that many business leaders do not see the link between digital security and data insight, while recognizing that effective security can accelerate digitalization.<\/p>\n<p>For Jon Clay, Vice President of Threat Intelligence at Trend Micro, \u201cData-driven insights are increasingly critical to sustainable business growth. But unless that data is properly protected, such initiatives will be built on sand. It&#039;s time for business leaders to recognize the importance of security to growth plans and for CISOs to make a more compelling case.\u201d<\/p>\n<p>Trend Micro&#039;s interviews with global business decision makers showed that in the face of an uncertain macroeconomic and geopolitical landscape, 61% of organizations agree that there is an urgent need to diversify revenue streams. They also revealed that 68% believe that access to data will be fundamental to unlock these new sources of income. For the vast majority (91%), better data usage is also an alternative to lower costs.<\/p>\n<p>Data analytics and predictive tools can ensure greater business agility by helping organizations anticipate market trends, execute financial forecasting scenarios, and much more. However,\u00a0<strong>more than a third of business leaders\u00a0<a name=\"m_4384818836138613326__Hlk138775141\"><\/a>ears declared not to understand the connection between cybersecurity and data insights.\u00a0<\/strong>Furthermore:<strong>\u00a048% do not link security with generating new revenue streams\u00a0<\/strong>and<strong>\u00a055% do not see the potential for cost savings.<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-64941 aligncenter\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/07\/unnamed-1.jpg\" alt=\"\" width=\"601\" height=\"242\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/07\/unnamed-1.jpg 601w, https:\/\/abes.org.br\/wp-content\/uploads\/2023\/07\/unnamed-1-480x193.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 601px, 100vw\" \/><\/p>\n<p>Also worrisome is the fact that more than half of respondents said their company&#039;s current security policies and processes create information silos. This can actively undermine data insights projects and reinforces the need for more cohesive and platform-based approaches to security.<br \/>\nWhile some business leaders are still not convinced,\u00a0<strong>nearly two-thirds believe security policy can increase scanning speed<\/strong>.<\/p>\n<p>The survey also revealed evidence of maturing security posture. Almost\u00a0<strong>three bedrooms<\/strong>\u00a0of IT decision makers interviewed\u00a0<strong>said the organization tracks and reports cyber risk levels<\/strong>, with a third reporting this to senior management as a measure of business risk. Others\u00a0<strong>79% have assured that their company has a Cyber Improvement Program<\/strong>\u00a0to help achieve digital transformation goals.<\/p>\n<p>To read a full copy of the report\u00a0<em>\u201cRisk and reward: bridging the dots between security and data-driven insights for sustainable growth\u201d<\/em>, click\u00a0<a href=\"https:\/\/www.trendmicro.com\/explore\/riskrewarddatainsights\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/u32992647.ct.sendgrid.net\/ls\/click?upn%3DBhuLd6MW35nqlouZAU26oyTxRotHB6Xk9CbfrEhYbTwFbxEbIxYR4P-2BrqNH7YXDw2w96ZatPBSmY6b2t4khhlervKbf-2BD91cHObrhY7Hg7U-3Df3mN_YMJdYxCsbA3IVx986czIdcxVDbRuuRZKdewNY-2FQm19TcCIjr8F1Prs1zqZ2Sj9xbx0Km14RMTV8u0cGZfug-2BlJYlgWqg3IKUifzB-2FG1PMM5B0mKjtBHFJynxZQpQp224r9DsBpv4NlQxT8fFKuTKEb6LbJ2vUTUhycAgsG6FTfQ4ZoZ1XGwQANR2nS2d72ylfgnHj5fLRdrEylS2qfXJss1LJ-2FZ-2BYRKfVSKhtvPa4N0-3D&amp;source=gmail&amp;ust=1690877998524000&amp;usg=AOvVaw2u6S4LozzPfuyhM8Y9CDws\">ON HERE<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Estudo encomendado \u00e0 Sapio Research ouviu mais de 2700 executivos em 25 pa\u00edses Pesquisa encomendada pela\u00a0Trend Micro, l\u00edder mundial em solu\u00e7\u00f5es de ciberseguran\u00e7a, \u00e0 Sapio Research, revela que muitos l\u00edderes empresariais n\u00e3o veem a liga\u00e7\u00e3o entre a seguran\u00e7a digital e a percep\u00e7\u00e3o de dados, embora reconhe\u00e7am que uma seguran\u00e7a eficaz pode acelerar a digitaliza\u00e7\u00e3o. Para [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":64941,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[4395,3852,270],"class_list":["post-64940","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-coluna-4","category-ultimas-noticias","tag-reducao-de-riscos","tag-risco-cibernetico","tag-seguranca-cibernetica"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Insights de dados precisam de conex\u00e3o com a seguran\u00e7a cibern\u00e9tica, alerta estudo da Trend Micro - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/insights-de-dados-precisam-de-conexao-com-a-seguranca-cibernetica-alerta-estudo-da-trend-micro\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Insights de dados precisam de conex\u00e3o com a seguran\u00e7a cibern\u00e9tica, alerta estudo da Trend Micro - ABES\" \/>\n<meta property=\"og:description\" content=\"Estudo encomendado \u00e0 Sapio Research ouviu mais de 2700 executivos em 25 pa\u00edses Pesquisa encomendada pela\u00a0Trend Micro, l\u00edder mundial em solu\u00e7\u00f5es de ciberseguran\u00e7a, \u00e0 Sapio Research, revela que muitos l\u00edderes empresariais n\u00e3o veem a liga\u00e7\u00e3o entre a seguran\u00e7a digital e a percep\u00e7\u00e3o de dados, embora reconhe\u00e7am que uma seguran\u00e7a eficaz pode acelerar a digitaliza\u00e7\u00e3o. Para [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/insights-de-dados-precisam-de-conexao-com-a-seguranca-cibernetica-alerta-estudo-da-trend-micro\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-08T11:34:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/07\/unnamed-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"601\" \/>\n\t<meta property=\"og:image:height\" content=\"242\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/insights-de-dados-precisam-de-conexao-com-a-seguranca-cibernetica-alerta-estudo-da-trend-micro\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/insights-de-dados-precisam-de-conexao-com-a-seguranca-cibernetica-alerta-estudo-da-trend-micro\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\"},\"headline\":\"Insights de dados precisam de conex\u00e3o com a seguran\u00e7a cibern\u00e9tica, alerta estudo da Trend Micro\",\"datePublished\":\"2023-08-08T11:34:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/insights-de-dados-precisam-de-conexao-com-a-seguranca-cibernetica-alerta-estudo-da-trend-micro\\\/\"},\"wordCount\":521,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/insights-de-dados-precisam-de-conexao-com-a-seguranca-cibernetica-alerta-estudo-da-trend-micro\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/unnamed-1.jpg\",\"keywords\":[\"redu\u00e7\u00e3o de riscos\",\"risco cibern\u00e9tico\",\"seguran\u00e7a cibern\u00e9tica\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/insights-de-dados-precisam-de-conexao-com-a-seguranca-cibernetica-alerta-estudo-da-trend-micro\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/insights-de-dados-precisam-de-conexao-com-a-seguranca-cibernetica-alerta-estudo-da-trend-micro\\\/\",\"name\":\"Insights de dados precisam de conex\u00e3o com a seguran\u00e7a cibern\u00e9tica, alerta estudo da Trend Micro - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/insights-de-dados-precisam-de-conexao-com-a-seguranca-cibernetica-alerta-estudo-da-trend-micro\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/insights-de-dados-precisam-de-conexao-com-a-seguranca-cibernetica-alerta-estudo-da-trend-micro\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/unnamed-1.jpg\",\"datePublished\":\"2023-08-08T11:34:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/insights-de-dados-precisam-de-conexao-com-a-seguranca-cibernetica-alerta-estudo-da-trend-micro\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/insights-de-dados-precisam-de-conexao-com-a-seguranca-cibernetica-alerta-estudo-da-trend-micro\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/insights-de-dados-precisam-de-conexao-com-a-seguranca-cibernetica-alerta-estudo-da-trend-micro\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/unnamed-1.jpg\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/unnamed-1.jpg\",\"width\":601,\"height\":242},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/insights-de-dados-precisam-de-conexao-com-a-seguranca-cibernetica-alerta-estudo-da-trend-micro\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Insights de dados precisam de conex\u00e3o com a seguran\u00e7a cibern\u00e9tica, alerta estudo da Trend Micro\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data insights need to be connected to cybersecurity, warns Trend Micro study - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/insights-de-dados-precisam-de-conexao-com-a-seguranca-cibernetica-alerta-estudo-da-trend-micro\/","og_locale":"en_US","og_type":"article","og_title":"Insights de dados precisam de conex\u00e3o com a seguran\u00e7a cibern\u00e9tica, alerta estudo da Trend Micro - ABES","og_description":"Estudo encomendado \u00e0 Sapio Research ouviu mais de 2700 executivos em 25 pa\u00edses Pesquisa encomendada pela\u00a0Trend Micro, l\u00edder mundial em solu\u00e7\u00f5es de ciberseguran\u00e7a, \u00e0 Sapio Research, revela que muitos l\u00edderes empresariais n\u00e3o veem a liga\u00e7\u00e3o entre a seguran\u00e7a digital e a percep\u00e7\u00e3o de dados, embora reconhe\u00e7am que uma seguran\u00e7a eficaz pode acelerar a digitaliza\u00e7\u00e3o. Para [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/insights-de-dados-precisam-de-conexao-com-a-seguranca-cibernetica-alerta-estudo-da-trend-micro\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2023-08-08T11:34:28+00:00","og_image":[{"width":601,"height":242,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/07\/unnamed-1.jpg","type":"image\/jpeg"}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/insights-de-dados-precisam-de-conexao-com-a-seguranca-cibernetica-alerta-estudo-da-trend-micro\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/insights-de-dados-precisam-de-conexao-com-a-seguranca-cibernetica-alerta-estudo-da-trend-micro\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3"},"headline":"Insights de dados precisam de conex\u00e3o com a seguran\u00e7a cibern\u00e9tica, alerta estudo da Trend Micro","datePublished":"2023-08-08T11:34:28+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/insights-de-dados-precisam-de-conexao-com-a-seguranca-cibernetica-alerta-estudo-da-trend-micro\/"},"wordCount":521,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/insights-de-dados-precisam-de-conexao-com-a-seguranca-cibernetica-alerta-estudo-da-trend-micro\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/07\/unnamed-1.jpg","keywords":["redu\u00e7\u00e3o de riscos","risco cibern\u00e9tico","seguran\u00e7a cibern\u00e9tica"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/insights-de-dados-precisam-de-conexao-com-a-seguranca-cibernetica-alerta-estudo-da-trend-micro\/","url":"https:\/\/abes.org.br\/insights-de-dados-precisam-de-conexao-com-a-seguranca-cibernetica-alerta-estudo-da-trend-micro\/","name":"Data insights need to be connected to cybersecurity, warns Trend Micro study - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/insights-de-dados-precisam-de-conexao-com-a-seguranca-cibernetica-alerta-estudo-da-trend-micro\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/insights-de-dados-precisam-de-conexao-com-a-seguranca-cibernetica-alerta-estudo-da-trend-micro\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/07\/unnamed-1.jpg","datePublished":"2023-08-08T11:34:28+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/insights-de-dados-precisam-de-conexao-com-a-seguranca-cibernetica-alerta-estudo-da-trend-micro\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/insights-de-dados-precisam-de-conexao-com-a-seguranca-cibernetica-alerta-estudo-da-trend-micro\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/insights-de-dados-precisam-de-conexao-com-a-seguranca-cibernetica-alerta-estudo-da-trend-micro\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/07\/unnamed-1.jpg","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/07\/unnamed-1.jpg","width":601,"height":242},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/insights-de-dados-precisam-de-conexao-com-a-seguranca-cibernetica-alerta-estudo-da-trend-micro\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Insights de dados precisam de conex\u00e3o com a seguran\u00e7a cibern\u00e9tica, alerta estudo da Trend Micro"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-26 18:16:25","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/64940","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=64940"}],"version-history":[{"count":2,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/64940\/revisions"}],"predecessor-version":[{"id":64943,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/64940\/revisions\/64943"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media\/64941"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=64940"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=64940"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=64940"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}