{"id":71549,"date":"2024-01-18T09:18:31","date_gmt":"2024-01-18T12:18:31","guid":{"rendered":"https:\/\/abes.org.br\/?p=71549"},"modified":"2024-01-16T15:24:03","modified_gmt":"2024-01-16T18:24:03","slug":"confira-as-principais-tendencias-de-ameacas-ciberneticas-para-2024-segundo-estudo-da-trend-micro","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/confira-as-principais-tendencias-de-ameacas-ciberneticas-para-2024-segundo-estudo-da-trend-micro\/","title":{"rendered":"Check out the main cyber threat trends for 2024, according to a Trend Micro study"},"content":{"rendered":"<p style=\"text-align: center;\"><em>The forecast is for an increase in criminal activity with the use of AI and Machine Learning tools; 2023 broke a record again and should surpass the mark of 150 billion attacks<\/em><\/p>\n<p>While companies have significantly increased investments in cybersecurity, the company&#039;s Security Forecasts report<strong>\u00a0<\/strong><strong>Trend Micro<\/strong>\u00a0for 2024 shows that technological advances and the boom in investments in machine learning and artificial intelligence will provoke even more complex and elaborate attacks. This is because these technologies will also be exploited and added to the arsenal of digital criminals.<\/p>\n<div id=\"attachment_71550\" style=\"width: 484px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-71550\" class=\"wp-image-71550\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/01\/Trend-Micro-1024x574.jpg\" alt=\"\" width=\"474\" height=\"266\" \/><p id=\"caption-attachment-71550\" class=\"wp-caption-text\">Credit: Trend Micro website<\/p><\/div>\n<p>The scenario is worrying considering that the number of cyber attacks again broke a record in 2023. From January to November alone, Trend Micro blocked more than 149 billion and 300 million threats, surpassing the total of 146 billion attacks registered in 2022, which had already been the largest in history.<\/p>\n<p>\u201cWith so many technological transformations, executives will not only need to demonstrate a willingness to adjust their cybersecurity strategies, but they will also need to reevaluate their workflows to accommodate growth in order to protect assets and sensitive data\u201d, highlights C\u00e9sar Candido , general director of Trend Micro Brazil.<\/p>\n<p>The report\u00a0<strong>\u201cCritical Scalability: Security Predictions for 2024<\/strong>\u201d by Trend Micro lists the main cyber threats for the year that is starting. Check out some highlights!<\/p>\n<p><strong>\u2013 Use of Generative AI for attacks:\u00a0<\/strong>With the advancement of Generative AI, along with the use of Generative Adversarial Networks (GANs) to create audio and video content, scammers will be able to imitate legitimate communication channels, posing as senior leaders to request money transfers , creating a new wave of Business Email Compromise (BEC) attacks, also known as \u201cCEO Fraud\u201d, in addition to other types of scams;<\/p>\n<p><strong>\u2013 Growth of attacks on private blockchains<\/strong>: Vulnerabilities in the implementation of a number of blockchains will allow evil hackers to take advantage of these weaknesses to modify, replace, or erase entries and then demand a ransom. They will also be able to encrypt the entire blockchain if they believe they will be able to take control of enough points;<\/p>\n<p><strong>\u2013 Cloud security<\/strong>: investing in this type of security is essential for companies to resolve security gaps, with emphasis on the vulnerability of cloud-native applications and protection from automated attacks. Proactive measures, including adopting robust defense mechanisms and thorough security audits, will be essential to mitigate risks;<\/p>\n<p><strong>\u2013 Increased supply chain attacks<\/strong>: not only Upstream (original) open source software components will be targets of attacks, but also telecommunications Security Management System (SIM) resources, essential for controlling fleets and inventories. Last year, 52% of global organizations had supply chains hit by ransomware. Among the main code injection attacks are credential harvesting, resource hijacking, cryptomining and distributed denial of service (DDoS) attacks.<u><\/u><u><\/u><\/p>\n<p>Cybercriminals are always looking for opportunities to optimize operations, magnify the impact of their breaches, and reinvent time-tested tactics to escalate vulnerabilities and automate attacks. Regardless of how advanced an organization is in its cloud migration journey, security teams must go beyond the usual malware and vulnerability analyzes to stay ahead of attackers.<u><\/u><u><\/u><\/p>\n<p>To read a full copy of the report \u201c<strong>Critical Scalability: Trend Micro Security Predictions for 2024\u00a0<\/strong>click<strong>\u00a0<\/strong><a href=\"https:\/\/resources.trendmicro.com\/Critical-Scalability-Trend-Micro-Security-Predictions-for-2024_PT.html\"><strong>ON HERE<\/strong><\/a><strong>.<\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>A previs\u00e3o \u00e9 de aumento da atividade criminosa com o uso de ferramentas de IA e Machine Learning; 2023 bateu novamente recorde e deve ultrapassar a marca de 150 bilh\u00f5es de ataques Embora as empresas tenham aumentado significativamente os investimentos em ciberseguran\u00e7a, o relat\u00f3rio de Previs\u00f5es de Seguran\u00e7a da\u00a0Trend Micro\u00a0para 2024 mostra que os avan\u00e7os [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":71550,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[623,5021,5020,5022],"class_list":["post-71549","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-coluna-4","category-ultimas-noticias","tag-ameacas-ciberneticas","tag-blockchains","tag-ferramentas-de-ia","tag-softwares-de-codigo"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Confira as principais tend\u00eancias de amea\u00e7as cibern\u00e9ticas para 2024, segundo estudo da Trend Micro - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/confira-as-principais-tendencias-de-ameacas-ciberneticas-para-2024-segundo-estudo-da-trend-micro\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Confira as principais tend\u00eancias de amea\u00e7as cibern\u00e9ticas para 2024, segundo estudo da Trend Micro - ABES\" \/>\n<meta property=\"og:description\" content=\"A previs\u00e3o \u00e9 de aumento da atividade criminosa com o uso de ferramentas de IA e Machine Learning; 2023 bateu novamente recorde e deve ultrapassar a marca de 150 bilh\u00f5es de ataques Embora as empresas tenham aumentado significativamente os investimentos em ciberseguran\u00e7a, o relat\u00f3rio de Previs\u00f5es de Seguran\u00e7a da\u00a0Trend Micro\u00a0para 2024 mostra que os avan\u00e7os [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/confira-as-principais-tendencias-de-ameacas-ciberneticas-para-2024-segundo-estudo-da-trend-micro\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-18T12:18:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/01\/Trend-Micro.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1026\" \/>\n\t<meta property=\"og:image:height\" content=\"575\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/confira-as-principais-tendencias-de-ameacas-ciberneticas-para-2024-segundo-estudo-da-trend-micro\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/confira-as-principais-tendencias-de-ameacas-ciberneticas-para-2024-segundo-estudo-da-trend-micro\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\"},\"headline\":\"Confira as principais tend\u00eancias de amea\u00e7as cibern\u00e9ticas para 2024, segundo estudo da Trend Micro\",\"datePublished\":\"2024-01-18T12:18:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/confira-as-principais-tendencias-de-ameacas-ciberneticas-para-2024-segundo-estudo-da-trend-micro\\\/\"},\"wordCount\":676,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/confira-as-principais-tendencias-de-ameacas-ciberneticas-para-2024-segundo-estudo-da-trend-micro\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/Trend-Micro.jpg\",\"keywords\":[\"amea\u00e7as cibern\u00e9ticas\",\"blockchains\",\"ferramentas de IA\",\"softwares de c\u00f3digo\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/confira-as-principais-tendencias-de-ameacas-ciberneticas-para-2024-segundo-estudo-da-trend-micro\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/confira-as-principais-tendencias-de-ameacas-ciberneticas-para-2024-segundo-estudo-da-trend-micro\\\/\",\"name\":\"Confira as principais tend\u00eancias de amea\u00e7as cibern\u00e9ticas para 2024, segundo estudo da Trend Micro - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/confira-as-principais-tendencias-de-ameacas-ciberneticas-para-2024-segundo-estudo-da-trend-micro\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/confira-as-principais-tendencias-de-ameacas-ciberneticas-para-2024-segundo-estudo-da-trend-micro\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/Trend-Micro.jpg\",\"datePublished\":\"2024-01-18T12:18:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/confira-as-principais-tendencias-de-ameacas-ciberneticas-para-2024-segundo-estudo-da-trend-micro\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/confira-as-principais-tendencias-de-ameacas-ciberneticas-para-2024-segundo-estudo-da-trend-micro\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/confira-as-principais-tendencias-de-ameacas-ciberneticas-para-2024-segundo-estudo-da-trend-micro\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/Trend-Micro.jpg\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/Trend-Micro.jpg\",\"width\":1026,\"height\":575},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/confira-as-principais-tendencias-de-ameacas-ciberneticas-para-2024-segundo-estudo-da-trend-micro\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Confira as principais tend\u00eancias de amea\u00e7as cibern\u00e9ticas para 2024, segundo estudo da Trend Micro\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Confira as principais tend\u00eancias de amea\u00e7as cibern\u00e9ticas para 2024, segundo estudo da Trend Micro - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/confira-as-principais-tendencias-de-ameacas-ciberneticas-para-2024-segundo-estudo-da-trend-micro\/","og_locale":"en_US","og_type":"article","og_title":"Confira as principais tend\u00eancias de amea\u00e7as cibern\u00e9ticas para 2024, segundo estudo da Trend Micro - ABES","og_description":"A previs\u00e3o \u00e9 de aumento da atividade criminosa com o uso de ferramentas de IA e Machine Learning; 2023 bateu novamente recorde e deve ultrapassar a marca de 150 bilh\u00f5es de ataques Embora as empresas tenham aumentado significativamente os investimentos em ciberseguran\u00e7a, o relat\u00f3rio de Previs\u00f5es de Seguran\u00e7a da\u00a0Trend Micro\u00a0para 2024 mostra que os avan\u00e7os [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/confira-as-principais-tendencias-de-ameacas-ciberneticas-para-2024-segundo-estudo-da-trend-micro\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2024-01-18T12:18:31+00:00","og_image":[{"width":1026,"height":575,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/01\/Trend-Micro.jpg","type":"image\/jpeg"}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/confira-as-principais-tendencias-de-ameacas-ciberneticas-para-2024-segundo-estudo-da-trend-micro\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/confira-as-principais-tendencias-de-ameacas-ciberneticas-para-2024-segundo-estudo-da-trend-micro\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3"},"headline":"Confira as principais tend\u00eancias de amea\u00e7as cibern\u00e9ticas para 2024, segundo estudo da Trend Micro","datePublished":"2024-01-18T12:18:31+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/confira-as-principais-tendencias-de-ameacas-ciberneticas-para-2024-segundo-estudo-da-trend-micro\/"},"wordCount":676,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/confira-as-principais-tendencias-de-ameacas-ciberneticas-para-2024-segundo-estudo-da-trend-micro\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/01\/Trend-Micro.jpg","keywords":["amea\u00e7as cibern\u00e9ticas","blockchains","ferramentas de IA","softwares de c\u00f3digo"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/confira-as-principais-tendencias-de-ameacas-ciberneticas-para-2024-segundo-estudo-da-trend-micro\/","url":"https:\/\/abes.org.br\/confira-as-principais-tendencias-de-ameacas-ciberneticas-para-2024-segundo-estudo-da-trend-micro\/","name":"Confira as principais tend\u00eancias de amea\u00e7as cibern\u00e9ticas para 2024, segundo estudo da Trend Micro - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/confira-as-principais-tendencias-de-ameacas-ciberneticas-para-2024-segundo-estudo-da-trend-micro\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/confira-as-principais-tendencias-de-ameacas-ciberneticas-para-2024-segundo-estudo-da-trend-micro\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/01\/Trend-Micro.jpg","datePublished":"2024-01-18T12:18:31+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/confira-as-principais-tendencias-de-ameacas-ciberneticas-para-2024-segundo-estudo-da-trend-micro\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/confira-as-principais-tendencias-de-ameacas-ciberneticas-para-2024-segundo-estudo-da-trend-micro\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/confira-as-principais-tendencias-de-ameacas-ciberneticas-para-2024-segundo-estudo-da-trend-micro\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/01\/Trend-Micro.jpg","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/01\/Trend-Micro.jpg","width":1026,"height":575},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/confira-as-principais-tendencias-de-ameacas-ciberneticas-para-2024-segundo-estudo-da-trend-micro\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Confira as principais tend\u00eancias de amea\u00e7as cibern\u00e9ticas para 2024, segundo estudo da Trend Micro"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-13 12:11:29","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/71549","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=71549"}],"version-history":[{"count":1,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/71549\/revisions"}],"predecessor-version":[{"id":71551,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/71549\/revisions\/71551"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media\/71550"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=71549"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=71549"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=71549"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}