{"id":99773,"date":"2026-01-28T08:00:24","date_gmt":"2026-01-28T11:00:24","guid":{"rendered":"https:\/\/abes.org.br\/?p=99773"},"modified":"2026-01-27T17:00:59","modified_gmt":"2026-01-27T20:00:59","slug":"e-safer-realiza-a-identificacao-de-falhas-de-seguranca-em-sistemas-de-terceiros-para-as-empresas-de-varios-segmentos","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/e-safer-realiza-a-identificacao-de-falhas-de-seguranca-em-sistemas-de-terceiros-para-as-empresas-de-varios-segmentos\/","title":{"rendered":"e-Safer performs security flaw identification in third-party systems for companies in various sectors."},"content":{"rendered":"<p align=\"center\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-99776 aligncenter\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2026\/01\/E-SAFER-SOLUCAO-SEGURANCA-1024x576.jpg\" alt=\"\" width=\"708\" height=\"398\" \/><\/p>\n<p align=\"center\"><i><span data-olk-copy-source=\"MessageBody\">Organizations connected to vendors that have already suffered system intrusions are the primary victims of vulnerabilities in third-party software, which ultimately expose corporate networks.<\/span><\/i><\/p>\n<p><span data-olk-copy-source=\"MessageBody\">e-Safer starts 2026 by strengthening its application security analysis services offering, a solution that helps companies validate the security of applications developed internally or by third parties.<\/span><\/p>\n<p>The initiative aims to help companies in all sectors respond to threats of malicious code entering their computer networks, originating from software that promises protection but may lack the necessary code validation.<\/p>\n<p>Marcelo Duarte, executive product manager at e-Safer, cites recent events to reinforce the need for this type of service offered by his company:<\/p>\n<p>In January 2026, the\u00a0<b>Betterment<\/b>, A US-based automated investment advisory firm, [Company Name], suffered an attack on its contracted third-party systems used for marketing and operations. The attacker sent a cryptocurrency-related message to some of the company&#039;s clients, impersonating the company to trick users into sending funds.<\/p>\n<p>Last year, the\u00a0<b>Marks &amp; Spencer Services<\/b>, A British retailer suffered a breach when the Scattered Spider hacking group attacked the systems of its technical support service desk application provider.<\/p>\n<p>The Japanese retailer Muji suspended online sales in 2025 after a ransomware attack hit its logistics software, disabling essential ordering and delivery services.<\/p>\n<p>According to the executive, vulnerabilities in widely used platforms can spread rapidly across computer networks. Attacks occur even in large companies with strong internal controls, but which can still be affected by third-party flaws.<\/p>\n<p>Marcelo Duarte points to a report released by the Cynthia Institute, which shows that 981,300 organizations worldwide have integrations with at least one third-party vendor that suffered a security breach in the last two years. &quot;Our work here at e-Safer is to help companies avoid this serious inconvenience, which can affect the entire business operation and even tarnish the image of brands,&quot; emphasizes the executive product manager at e-Safer.<\/p>\n<p><b>e-Safer Application Security Verification<\/b><\/p>\n<p>e-Safer&#039;s service utilizes advanced techniques and market frameworks, supported by its own risk and vulnerability management tool. Verification is performed continuously, from the planning phase through development, testing, and deployment of the application in production.<\/p>\n<p>Validation involves integration with third-party systems and the API ecosystem, a resource used to promote data communication between applications from various sources and manufacturers.<\/p>\n<p>The service offered by e-Safer meets the main safety standards \u2013 ABNT, NBR, ISO 27002, OWASP, PCI-DSS and WASC.<\/p>\n<p>More information:\u00a0<a title=\"http:\/\/www.e-safer.com.br\/\" href=\"http:\/\/www.e-safer.com.br\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\" data-linkindex=\"2\">www.e-safer.com.br<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>As organiza\u00e7\u00f5es conectadas a fornecedores que j\u00e1 sofreram invas\u00f5es em seus sistemas s\u00e3o as principais v\u00edtimas das falhas em software de terceiros, que acabam expondo redes corporativas. A e-Safer inicia 2026 fortalecendo a sua oferta de servi\u00e7os de an\u00e1lise de seguran\u00e7a de aplica\u00e7\u00f5es, uma solu\u00e7\u00e3o que ajuda as empresas a validar a seguran\u00e7a das aplica\u00e7\u00f5es [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":99776,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[9048,9047,9046],"class_list":["post-99773","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-coluna-4","category-ultimas-noticias","tag-analise-de-seguranca-de-aplicacoes","tag-identificacao-de-falhas-de-seguranca","tag-software-de-terceiros"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>e-Safer realiza a identifica\u00e7\u00e3o de falhas de seguran\u00e7a em sistemas de terceiros para as empresas de v\u00e1rios segmentos - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/e-safer-realiza-a-identificacao-de-falhas-de-seguranca-em-sistemas-de-terceiros-para-as-empresas-de-varios-segmentos\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"e-Safer realiza a identifica\u00e7\u00e3o de falhas de seguran\u00e7a em sistemas de terceiros para as empresas de v\u00e1rios segmentos - ABES\" \/>\n<meta property=\"og:description\" content=\"As organiza\u00e7\u00f5es conectadas a fornecedores que j\u00e1 sofreram invas\u00f5es em seus sistemas s\u00e3o as principais v\u00edtimas das falhas em software de terceiros, que acabam expondo redes corporativas. A e-Safer inicia 2026 fortalecendo a sua oferta de servi\u00e7os de an\u00e1lise de seguran\u00e7a de aplica\u00e7\u00f5es, uma solu\u00e7\u00e3o que ajuda as empresas a validar a seguran\u00e7a das aplica\u00e7\u00f5es [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/e-safer-realiza-a-identificacao-de-falhas-de-seguranca-em-sistemas-de-terceiros-para-as-empresas-de-varios-segmentos\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-28T11:00:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2026\/01\/E-SAFER-SOLUCAO-SEGURANCA.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/e-safer-realiza-a-identificacao-de-falhas-de-seguranca-em-sistemas-de-terceiros-para-as-empresas-de-varios-segmentos\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/e-safer-realiza-a-identificacao-de-falhas-de-seguranca-em-sistemas-de-terceiros-para-as-empresas-de-varios-segmentos\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/dcf8e65fad7e59750ce485162b9368e1\"},\"headline\":\"e-Safer realiza a identifica\u00e7\u00e3o de falhas de seguran\u00e7a em sistemas de terceiros para as empresas de v\u00e1rios segmentos\",\"datePublished\":\"2026-01-28T11:00:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/e-safer-realiza-a-identificacao-de-falhas-de-seguranca-em-sistemas-de-terceiros-para-as-empresas-de-varios-segmentos\\\/\"},\"wordCount\":538,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/e-safer-realiza-a-identificacao-de-falhas-de-seguranca-em-sistemas-de-terceiros-para-as-empresas-de-varios-segmentos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/E-SAFER-SOLUCAO-SEGURANCA.jpg\",\"keywords\":[\"an\u00e1lise de seguran\u00e7a de aplica\u00e7\u00f5es\",\"identifica\u00e7\u00e3o de falhas de seguran\u00e7a\",\"software de terceiros\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/e-safer-realiza-a-identificacao-de-falhas-de-seguranca-em-sistemas-de-terceiros-para-as-empresas-de-varios-segmentos\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/e-safer-realiza-a-identificacao-de-falhas-de-seguranca-em-sistemas-de-terceiros-para-as-empresas-de-varios-segmentos\\\/\",\"name\":\"e-Safer realiza a identifica\u00e7\u00e3o de falhas de seguran\u00e7a em sistemas de terceiros para as empresas de v\u00e1rios segmentos - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/e-safer-realiza-a-identificacao-de-falhas-de-seguranca-em-sistemas-de-terceiros-para-as-empresas-de-varios-segmentos\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/e-safer-realiza-a-identificacao-de-falhas-de-seguranca-em-sistemas-de-terceiros-para-as-empresas-de-varios-segmentos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/E-SAFER-SOLUCAO-SEGURANCA.jpg\",\"datePublished\":\"2026-01-28T11:00:24+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/e-safer-realiza-a-identificacao-de-falhas-de-seguranca-em-sistemas-de-terceiros-para-as-empresas-de-varios-segmentos\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/e-safer-realiza-a-identificacao-de-falhas-de-seguranca-em-sistemas-de-terceiros-para-as-empresas-de-varios-segmentos\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/e-safer-realiza-a-identificacao-de-falhas-de-seguranca-em-sistemas-de-terceiros-para-as-empresas-de-varios-segmentos\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/E-SAFER-SOLUCAO-SEGURANCA.jpg\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/E-SAFER-SOLUCAO-SEGURANCA.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/e-safer-realiza-a-identificacao-de-falhas-de-seguranca-em-sistemas-de-terceiros-para-as-empresas-de-varios-segmentos\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"e-Safer realiza a identifica\u00e7\u00e3o de falhas de seguran\u00e7a em sistemas de terceiros para as empresas de v\u00e1rios segmentos\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/dcf8e65fad7e59750ce485162b9368e1\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"e-Safer realiza a identifica\u00e7\u00e3o de falhas de seguran\u00e7a em sistemas de terceiros para as empresas de v\u00e1rios segmentos - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/e-safer-realiza-a-identificacao-de-falhas-de-seguranca-em-sistemas-de-terceiros-para-as-empresas-de-varios-segmentos\/","og_locale":"en_US","og_type":"article","og_title":"e-Safer realiza a identifica\u00e7\u00e3o de falhas de seguran\u00e7a em sistemas de terceiros para as empresas de v\u00e1rios segmentos - ABES","og_description":"As organiza\u00e7\u00f5es conectadas a fornecedores que j\u00e1 sofreram invas\u00f5es em seus sistemas s\u00e3o as principais v\u00edtimas das falhas em software de terceiros, que acabam expondo redes corporativas. A e-Safer inicia 2026 fortalecendo a sua oferta de servi\u00e7os de an\u00e1lise de seguran\u00e7a de aplica\u00e7\u00f5es, uma solu\u00e7\u00e3o que ajuda as empresas a validar a seguran\u00e7a das aplica\u00e7\u00f5es [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/e-safer-realiza-a-identificacao-de-falhas-de-seguranca-em-sistemas-de-terceiros-para-as-empresas-de-varios-segmentos\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2026-01-28T11:00:24+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2026\/01\/E-SAFER-SOLUCAO-SEGURANCA.jpg","type":"image\/jpeg"}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/e-safer-realiza-a-identificacao-de-falhas-de-seguranca-em-sistemas-de-terceiros-para-as-empresas-de-varios-segmentos\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/e-safer-realiza-a-identificacao-de-falhas-de-seguranca-em-sistemas-de-terceiros-para-as-empresas-de-varios-segmentos\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/dcf8e65fad7e59750ce485162b9368e1"},"headline":"e-Safer realiza a identifica\u00e7\u00e3o de falhas de seguran\u00e7a em sistemas de terceiros para as empresas de v\u00e1rios segmentos","datePublished":"2026-01-28T11:00:24+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/e-safer-realiza-a-identificacao-de-falhas-de-seguranca-em-sistemas-de-terceiros-para-as-empresas-de-varios-segmentos\/"},"wordCount":538,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/e-safer-realiza-a-identificacao-de-falhas-de-seguranca-em-sistemas-de-terceiros-para-as-empresas-de-varios-segmentos\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2026\/01\/E-SAFER-SOLUCAO-SEGURANCA.jpg","keywords":["an\u00e1lise de seguran\u00e7a de aplica\u00e7\u00f5es","identifica\u00e7\u00e3o de falhas de seguran\u00e7a","software de terceiros"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/e-safer-realiza-a-identificacao-de-falhas-de-seguranca-em-sistemas-de-terceiros-para-as-empresas-de-varios-segmentos\/","url":"https:\/\/abes.org.br\/e-safer-realiza-a-identificacao-de-falhas-de-seguranca-em-sistemas-de-terceiros-para-as-empresas-de-varios-segmentos\/","name":"e-Safer realiza a identifica\u00e7\u00e3o de falhas de seguran\u00e7a em sistemas de terceiros para as empresas de v\u00e1rios segmentos - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/e-safer-realiza-a-identificacao-de-falhas-de-seguranca-em-sistemas-de-terceiros-para-as-empresas-de-varios-segmentos\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/e-safer-realiza-a-identificacao-de-falhas-de-seguranca-em-sistemas-de-terceiros-para-as-empresas-de-varios-segmentos\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2026\/01\/E-SAFER-SOLUCAO-SEGURANCA.jpg","datePublished":"2026-01-28T11:00:24+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/e-safer-realiza-a-identificacao-de-falhas-de-seguranca-em-sistemas-de-terceiros-para-as-empresas-de-varios-segmentos\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/e-safer-realiza-a-identificacao-de-falhas-de-seguranca-em-sistemas-de-terceiros-para-as-empresas-de-varios-segmentos\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/e-safer-realiza-a-identificacao-de-falhas-de-seguranca-em-sistemas-de-terceiros-para-as-empresas-de-varios-segmentos\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2026\/01\/E-SAFER-SOLUCAO-SEGURANCA.jpg","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2026\/01\/E-SAFER-SOLUCAO-SEGURANCA.jpg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/e-safer-realiza-a-identificacao-de-falhas-de-seguranca-em-sistemas-de-terceiros-para-as-empresas-de-varios-segmentos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"e-Safer realiza a identifica\u00e7\u00e3o de falhas de seguran\u00e7a em sistemas de terceiros para as empresas de v\u00e1rios segmentos"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/dcf8e65fad7e59750ce485162b9368e1","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes2\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-27 06:56:41","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/99773","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=99773"}],"version-history":[{"count":1,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/99773\/revisions"}],"predecessor-version":[{"id":99777,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/99773\/revisions\/99777"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media\/99776"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=99773"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=99773"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=99773"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}