{"id":20231,"date":"2022-12-01T15:27:49","date_gmt":"2022-12-01T15:27:49","guid":{"rendered":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/01\/growing-threats-bring-key-cybersecurity-themes-into-sharper-focus\/"},"modified":"2022-12-01T15:27:49","modified_gmt":"2022-12-01T15:27:49","slug":"growing-threats-bring-key-cybersecurity-themes-into-sharper-focus","status":"publish","type":"post","link":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/01\/growing-threats-bring-key-cybersecurity-themes-into-sharper-focus\/","title":{"rendered":"Growing threats bring key cybersecurity themes into sharper focus"},"content":{"rendered":"<p> <a href=\"https:\/\/go.fiverr.com\/visit\/?bta=1052423&nci=17043\" Target=\"_Top\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/fiverr.ck-cdn.com\/tn\/serve\/?cid=40081059\"  width=\"601\" height=\"201\"><\/a>\n<br \/><img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/d15shllkswkct0.cloudfront.net\/wp-content\/blogs.dir\/1\/files\/2022\/11\/Dell-Intrusion-detected.jpg\" \/><\/p>\n<div>\n<p>When Congress declared in 2004 that October would be <a href=\"https:\/\/www.cisa.gov\/cybersecurity-awareness-month\">Cybersecurity Awareness Month<\/a>, it likely could not have anticipated the global threat landscape online users face today.<\/p>\n<p>A new <a href=\"https:\/\/surfshark.com\/blog\/data-breach-statistics-2022-q3\">study<\/a> released in October by cybersecurity firm Surfshark Inc. reported that there were 108 million accounts breached worldwide in the third quarter of 2022 alone, a 70% increase over the second quarter. Although Russia encountered the most breaches of any country so far in 2022, the report noted that the U.S. remained the single most breached country over the last 10 years. And that\u2019s despite rising numbers elsewhere, such as in France which is now averaging 212 leaked accounts per 1,000 people.<\/p>\n<p>It has been a busy year. Over the past few months, a Russian hacker group <a href=\"https:\/\/siliconangle.com\/2022\/05\/20\/costa-ricas-president-says-country-war-conti-ransomware-gang\/\">crippled banking operations<\/a> in Costa Rica, a new <a href=\"https:\/\/stinet.pl\/en\/anatomy-of-an-attack-4-top-5-malware-in-2022\/\">ransomware variant<\/a> demonstrated the capability to stop 600 Windows processes, and a <a href=\"https:\/\/siliconangle.com\/2022\/06\/29\/california-firearms-registration-website-exposes-personal-information\/\">data breach<\/a> exposed the personal information of every California citizen who registered for a concealed-carry gun permit over the past 10 years. And that was before hackers <a href=\"https:\/\/www.cnbc.com\/2022\/11\/21\/ftx-theft-hackers-start-to-launder-477-million-of-stolen-crypto.html\">looted nearly $500 million<\/a> in assets from the now-bankrupt FTX cryptocurrency firm a few weeks ago.<\/p>\n<p>This has made the focus on cybersecurity all the more timely. The threats are real and rising, as malicious actors become savvy and bold in their attacks. Enterprise IT organizations must now manage risk at a level that was certainly not seen when Congress passed its \u201cawareness\u201d act 18 years ago.<\/p>\n<p>\u201cThere is no neutral IT decision with respect to risk,\u201d said <a href=\"https:\/\/www.linkedin.com\/in\/johnroese\/\">John Roese<\/a>, global chief technology officer of products and operations at Dell Technologies Inc., in a <a href=\"https:\/\/www.dell.com\/en-us\/dt\/solutions\/security\/cybersecuritymonth\/index.htm#tab0=0&amp;video-overlay=6312703164112\">video<\/a> posted in the company\u2019s website for Cybersecurity Awareness Month. \u201cEvery IT decision you make will either be additive to your security posture or will introduce risk in your security posture. It\u2019s not about security outside of the IT decision, it\u2019s about security that is intrinsic and tied to every IT decision, every vendor selection, every architectural decision.\u201d<\/p>\n<p>TheCUBE, SiliconANGLE Media\u2019s livestreaming studio, explored the latest Dell product news and data protection vision in a special launch event, <a href=\"https:\/\/www.thecube.net\/events\/dell\/the-future-of-multicloud-data-protection-is-here\">\u201cThe Future of Multicloud Data Protection Is Here.\u201d<\/a> As part of follow-up coverage from that event, SiliconANGLE took a closer look at the key themes and messages surrounding Dell\u2019s cybersecurity awareness initiative in October. <em>(* Disclosure below.)<\/em><\/p>\n<h3>Implementing zero trust<\/h3>\n<p>In recent weeks Dell has doubled down on discussing a <a href=\"https:\/\/www.dell.com\/en-us\/dt\/solutions\/security\/cybersecuritymonth\/index.htm#tab0=0\">wide range of security issues<\/a>, from protecting critical data and applications using zero trust to minimizing the impact of a cyberattack. The premise behind the company\u2019s approach is that modern cybersecurity should be intelligent, scalable and automated.<\/p>\n<p>A central theme revolved around the concept of zero trust. Practices such as multifactor authentication and role based-access control, which validate and limit who can use systems at any given time, support the zero-trust concept.<\/p>\n<p>\u201cZero trust has been a big buzzword of late,\u201d said <a href=\"https:\/\/www.linkedin.com\/in\/skenniston\/\">Steve Kenniston<\/a>, senior cybersecurity consultant at Dell, in a recent\u00a0<a href=\"https:\/\/podcasts.apple.com\/sg\/podcast\/ep080-enhance-your-cyber-resilience\/id1498505973?i=1000584005193\">podcast<\/a>. \u201cIt\u2019s ensuring that you trust no one and authenticate everyone to make sure that the right folks have access to your data. Zero trust isn\u2019t something that you buy, it\u2019s something you implement as an actual solution.\u201d<\/p>\n<p>While Dell provides technology, such as <a href=\"https:\/\/siliconangle.com\/2022\/11\/17\/dell-stakes-claim-data-protection-market-major-powerprotect-apex-google-cloud-announcements-delldataprotection\/\">PowerProtect Data Manager<\/a> for consistent backup and restore functionality, the company\u2019s cybersecurity experts note that businesses need to think about critical data rather than simply backing everything up as a whole.<\/p>\n<p>\u201cI tell clients to stop thinking about designing for backup,\u201d said Kenniston in a separate <a href=\"https:\/\/podcasts.apple.com\/sg\/podcast\/ep079-protect-systems-and-data\/id1498505973?i=1000583181555\">podcast episode<\/a>. \u201cBackup of a petabyte of information in an evening used to be a great thing, but ultimately it\u2019s: \u2018Can I recover the amount of data that I need to meet the service level agreement?\u2019 It comes down to classifying your data and choosing the right technology.\u201d<\/p>\n<h3>Automation offers promise<\/h3>\n<p>The process of <a href=\"https:\/\/techgenix.com\/what-is-data-classification\/\">data classification<\/a> can be daunting, particularly given the rising amount of information which enterprises need to manage. Advances in artificial intelligence and machine learning have enabled organizations to gain a measure of control by leveraging automated solutions that can link effectively to backup and recovery services.<\/p>\n<p>\u201cThere\u2019s just too much data for anyone to manage and protect manually,\u201d said <a href=\"https:\/\/www.linkedin.com\/in\/petergerr\/\">Peter Gerr<\/a>, senior consultant, Cybersecurity Portfolio Marketing at Dell in a recent <a href=\"https:\/\/podcasts.apple.com\/sg\/podcast\/ep080-enhance-your-cyber-resilience\/id1498505973?i=1000584005193\">podcast<\/a>. \u201cThat brings in automation. Machine learning and AI have really become the most effective ways to protect large quantities of data. The new modern data protection solutions are in response to needing a better way to protect our most valuable asset and be able to recover that if we have an attack so we can get back to work.\u201d<\/p>\n<p>The use of AI and machine learning tools offers an additional advantage which involves building a cybersecurity model and that can streamline processes and reduce inefficiency. One example of this in practice can be seen in the case of the <a href=\"https:\/\/www.dell.com\/en-us\/dt\/solutions\/security\/cybersecuritymonth\/index.htm#tab0=3&amp;pdf-overlay=\/\/www.delltechnologies.com\/asset\/en-us\/products\/data-protection\/customer-stories-case-studies\/dt-illinois-state-treasurer-case-study.pdf\">Illinois State Treasurer\u2019s Office<\/a> which must safeguard $50 billion worth of assets and a massive volume of sensitive financial data.<\/p>\n<p>The state agency used Dell\u2019s APEX Backup Services as a SaaS-based data protection solution to control costs without increasing complexity. The Illinois Treasurer\u2019s office used APEX to create a new copy of its data, and every text or digitized document was safely stored and secured in the cloud.<\/p>\n<p>\u201cSimplifying security operations means removing costly inefficiencies and automating whenever possible,\u201d said <a href=\"https:\/\/www.linkedin.com\/in\/jason-rosselot-a7140a8\/\">Jason Rosselot<\/a>, vice president and business unit security officer at Dell, in a <a href=\"https:\/\/www.linkedin.com\/posts\/delltechnologies_cybersecurity-awareness-month-activity-6990389843570618368-7lCw\/?originalSubdomain=ar\">presentation<\/a> as part of Cybersecurity Awareness Month. \u201cUsing technologies like AI and machine learning can limit complexity too. It also means reducing redundancies and streamlining vendor relationships.\u201d<\/p>\n<h3>The human element<\/h3>\n<p>Despite the significant advances in automation and streamlined processes, there still remains one weak link in any cybersecurity strategy: human nature. Cybercriminals are <a href=\"https:\/\/siliconangle.com\/2022\/10\/26\/slashnext-report-finds-phishing-attacks-risen-61-year\/\">increasingly using phishing attacks<\/a>, luring a user into clicking on a seemingly innocuous link and downloading malware to gain entry into enterprise systems.<\/p>\n<p>Criminals do this because it works. A <a href=\"https:\/\/www.slashnext.com\/the-state-of-phishing-2022\/\">\u201cState of Phishing\u201d report<\/a> released in October by SlashNext Inc. uncovered more than <a href=\"https:\/\/www.prnewswire.com\/news-releases\/slashnexts-state-of-phishing-report-reveals-more-than-255-million-attacks-in-2022-signaling-a-61-increase-in-phishing-year-over-year-301659518.html\">255 million phishing attacks<\/a> in the first half of 2022, a 61% increase over the previous year. The top three attack sectors were healthcare, professional and scientific services, and IT.<\/p>\n<p>In an effort to help users avoid the pitfalls of phishing exploits, Dell prepared and posted an online quiz \u2013 <a href=\"https:\/\/www.dell.com\/en-us\/dt\/solutions\/security\/cybersecuritymonth\/index.htm#tab0=0&amp;pdf-overlay=\/\/www.delltechnologies.com\/asset\/en-us\/solutions\/business-solutions\/technical-support\/dell-cybersecurity-quiz.pdf\">\u201cAre You Smarter Than Your Cyber Attacker?\u201d<\/a> \u2013 with potential scenarios that might be encountered and how best to deal with them.<\/p>\n<p>A panel of IT industry professionals assembled for Cybersecurity Awareness Month noted that there was still a great deal of work to do in educating system users and the public in general about best practices.<\/p>\n<p>\u201cIt\u2018s about empowering individuals to make good decisions that bring risk down and start to bring trust up,\u201d said <a href=\"https:\/\/www.linkedin.com\/in\/josh-jaffe-5b8b794b\/\">Josh Jaffe<\/a>, vice president of cybersecurity at Dell, during the <a href=\"https:\/\/www.crn.com\/news\/security\/experts-from-amazon-google-dell-nortonlifelock-cybersecurity-begins-at-home\">panel discussion<\/a>.<\/p>\n<p>The information <a href=\"https:\/\/www.dell.com\/en-us\/dt\/solutions\/security\/cybersecuritymonth\/index.htm#tab0=0\">generated by Dell<\/a> and other organizations during October should raise awareness that today\u2019s cyberthreats are real and persistent. This is the digital world\u2019s reality in 2022, and the threat of a compromise will likely be just as high when Cybersecurity Awareness Month rolls around again next fall.<\/p>\n<p>\u201cAn attack can happen at any time of day, so the best is to be prepared,\u201d said Dell\u2019s Kenniston. \u201cStart thinking about all the things that are necessary to protect your environment.\u201d<\/p>\n<p><em>(* Disclosure: TheCUBE is a paid media partner for the <a href=\"https:\/\/www.thecube.net\/events\/dell\/the-future-of-multicloud-data-protection-is-here\">\u201cThe Future of Multicloud Data Protection Is Here\u201d<\/a> event. Neither Dell Technologies Inc., the sponsor of theCUBE\u2019s event coverage, nor other sponsors have editorial control over content on theCUBE or SiliconANGLE.)<\/em><\/p>\n<h5>Image: Dell EMC<\/h5>\n<div class=\"silic-after-content\" id=\"silic-225907346\">\n<hr style=\"border: 1px solid; color: #d8d8d8; height: 0px; margin-top: 20px;\"\/>\n<h3><span style=\"font-size: 16px;\">Show your support for our mission by joining our Cube Club and Cube Event Community of experts. Join the community that includes Amazon Web Services and Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger and many more luminaries and experts.<\/span><\/h3>\n<\/div><\/div>\n<iframe data-lazy=\"true\" data-src=\"https:\/\/www.fiverr.com\/gig_widgets?id=U2FsdGVkX18x7XQvttUTrv1oEqmGNGTgvvCUiUoJ\/AP4z\/UyMz8lXGOLpu15jIMxBbTR0gmD5uBoFvhC4KWeALQRp3h\/X\/AwcVD0K8Wj9H\/ZzYKzcCNHosB9oS4SCJJFWiN85P9ICAc4OgCoE\/wHKIY7CDkf2\/DQ1vqGvk4smVe5cRDEmrLPCWi4FC8p40VUhSmWQ5udCm0zoJtorgWv3vbDQw0kKYkwn39ozAnQXDe+YvWMxkLFWA+O3TFwkJvdkIK+\/AUSnRssPKt5WHY0FhNOxnSPcLslEL4G4\/RfP95ve99U+kRnDy3X+KtzdQLY+u935ghON\/o3UE4IMv9oN6JX9RnxzL\/LRcOgnHigxStSGPKsZYtnz8RWNVT\/rOLAibqiWJadC5MYHRbekF3eg6FOGrQGkXYbsn0+a5aovnlLCbLwIqY9fcS17UX8J235iQ6cdmHNbrPeS84CMm34RA==&affiliate_id=1052423&strip_google_tagmanager=true\" loading=\"lazy\" data-with-title=\"true\" class=\"fiverr_nga_frame\" frameborder=\"0\" height=\"350\" width=\"100%\" referrerpolicy=\"no-referrer-when-downgrade\" data-mode=\"random_gigs\" onload=\" var frame = this; var script = document.createElement('script'); script.addEventListener('load', function() { window.FW_SDK.register(frame); }); script.setAttribute('src', 'https:\/\/www.fiverr.com\/gig_widgets\/sdk'); document.body.appendChild(script); \" ><\/iframe>\n<br \/><a href=\"https:\/\/siliconangle.com\/2022\/12\/01\/growing-threats-bring-key-cybersecurity-themes-sharper-focus-delldataprotection\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When Congress declared in 2004 that October would be Cybersecurity Awareness Month, it likely could not have anticipated the global threat landscape online users face&#8230;<\/p>\n","protected":false},"author":1,"featured_media":20232,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-20231","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-universe"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Growing threats bring key cybersecurity themes into sharper focus - mailinvest.blog<\/title>\n<meta name=\"description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailinvest.blog\/index.php\/2022\/12\/01\/growing-threats-bring-key-cybersecurity-themes-into-sharper-focus\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Growing threats bring key cybersecurity themes into sharper focus - mailinvest.blog\" \/>\n<meta property=\"og:description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailinvest.blog\/index.php\/2022\/12\/01\/growing-threats-bring-key-cybersecurity-themes-into-sharper-focus\/\" \/>\n<meta property=\"og:site_name\" content=\"mailinvest.blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/freelanceracademic\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-01T15:27:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/12\/Dell-Intrusion-detected.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"768\" \/>\n\t<meta property=\"og:image:height\" content=\"461\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin@mailinvest.blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin@mailinvest.blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/01\\\/growing-threats-bring-key-cybersecurity-themes-into-sharper-focus\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/01\\\/growing-threats-bring-key-cybersecurity-themes-into-sharper-focus\\\/\"},\"author\":{\"name\":\"admin@mailinvest.blog\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\"},\"headline\":\"Growing threats bring key cybersecurity themes into sharper focus\",\"datePublished\":\"2022-12-01T15:27:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/01\\\/growing-threats-bring-key-cybersecurity-themes-into-sharper-focus\\\/\"},\"wordCount\":1315,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/01\\\/growing-threats-bring-key-cybersecurity-themes-into-sharper-focus\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Dell-Intrusion-detected.jpg\",\"articleSection\":[\"Tech Universe\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/01\\\/growing-threats-bring-key-cybersecurity-themes-into-sharper-focus\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/01\\\/growing-threats-bring-key-cybersecurity-themes-into-sharper-focus\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/01\\\/growing-threats-bring-key-cybersecurity-themes-into-sharper-focus\\\/\",\"name\":\"Growing threats bring key cybersecurity themes into sharper focus - mailinvest.blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/01\\\/growing-threats-bring-key-cybersecurity-themes-into-sharper-focus\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/01\\\/growing-threats-bring-key-cybersecurity-themes-into-sharper-focus\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Dell-Intrusion-detected.jpg\",\"datePublished\":\"2022-12-01T15:27:49+00:00\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/01\\\/growing-threats-bring-key-cybersecurity-themes-into-sharper-focus\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/01\\\/growing-threats-bring-key-cybersecurity-themes-into-sharper-focus\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/01\\\/growing-threats-bring-key-cybersecurity-themes-into-sharper-focus\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Dell-Intrusion-detected.jpg\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Dell-Intrusion-detected.jpg\",\"width\":768,\"height\":461},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/01\\\/growing-threats-bring-key-cybersecurity-themes-into-sharper-focus\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mailinvest.blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Growing threats bring key cybersecurity themes into sharper focus\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"name\":\"mailinvest.blog\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mailinvest.blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\",\"name\":\"mailinvest\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"width\":1000,\"height\":1000,\"caption\":\"mailinvest\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/freelanceracademic\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\",\"name\":\"admin@mailinvest.blog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"caption\":\"admin@mailinvest.blog\"},\"sameAs\":[\"https:\\\/\\\/mailinvest.blog\",\"admin@mailinvest.blog\"],\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/author\\\/adminmailinvest-blog\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Growing threats bring key cybersecurity themes into sharper focus - mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/01\/growing-threats-bring-key-cybersecurity-themes-into-sharper-focus\/","og_locale":"en_US","og_type":"article","og_title":"Growing threats bring key cybersecurity themes into sharper focus - mailinvest.blog","og_description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","og_url":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/01\/growing-threats-bring-key-cybersecurity-themes-into-sharper-focus\/","og_site_name":"mailinvest.blog","article_publisher":"https:\/\/www.facebook.com\/freelanceracademic\/","article_published_time":"2022-12-01T15:27:49+00:00","og_image":[{"width":768,"height":461,"url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/12\/Dell-Intrusion-detected.jpg","type":"image\/jpeg"}],"author":"admin@mailinvest.blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin@mailinvest.blog","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/01\/growing-threats-bring-key-cybersecurity-themes-into-sharper-focus\/#article","isPartOf":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/01\/growing-threats-bring-key-cybersecurity-themes-into-sharper-focus\/"},"author":{"name":"admin@mailinvest.blog","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4"},"headline":"Growing threats bring key cybersecurity themes into sharper focus","datePublished":"2022-12-01T15:27:49+00:00","mainEntityOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/01\/growing-threats-bring-key-cybersecurity-themes-into-sharper-focus\/"},"wordCount":1315,"commentCount":0,"publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/01\/growing-threats-bring-key-cybersecurity-themes-into-sharper-focus\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/12\/Dell-Intrusion-detected.jpg","articleSection":["Tech Universe"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mailinvest.blog\/index.php\/2022\/12\/01\/growing-threats-bring-key-cybersecurity-themes-into-sharper-focus\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/01\/growing-threats-bring-key-cybersecurity-themes-into-sharper-focus\/","url":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/01\/growing-threats-bring-key-cybersecurity-themes-into-sharper-focus\/","name":"Growing threats bring key cybersecurity themes into sharper focus - mailinvest.blog","isPartOf":{"@id":"https:\/\/mailinvest.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/01\/growing-threats-bring-key-cybersecurity-themes-into-sharper-focus\/#primaryimage"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/01\/growing-threats-bring-key-cybersecurity-themes-into-sharper-focus\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/12\/Dell-Intrusion-detected.jpg","datePublished":"2022-12-01T15:27:49+00:00","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","breadcrumb":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/01\/growing-threats-bring-key-cybersecurity-themes-into-sharper-focus\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailinvest.blog\/index.php\/2022\/12\/01\/growing-threats-bring-key-cybersecurity-themes-into-sharper-focus\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/01\/growing-threats-bring-key-cybersecurity-themes-into-sharper-focus\/#primaryimage","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/12\/Dell-Intrusion-detected.jpg","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/12\/Dell-Intrusion-detected.jpg","width":768,"height":461},{"@type":"BreadcrumbList","@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/01\/growing-threats-bring-key-cybersecurity-themes-into-sharper-focus\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailinvest.blog\/"},{"@type":"ListItem","position":2,"name":"Growing threats bring key cybersecurity themes into sharper focus"}]},{"@type":"WebSite","@id":"https:\/\/mailinvest.blog\/#website","url":"https:\/\/mailinvest.blog\/","name":"mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailinvest.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailinvest.blog\/#organization","name":"mailinvest","url":"https:\/\/mailinvest.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","width":1000,"height":1000,"caption":"mailinvest"},"image":{"@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/freelanceracademic\/"]},{"@type":"Person","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4","name":"admin@mailinvest.blog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","caption":"admin@mailinvest.blog"},"sameAs":["https:\/\/mailinvest.blog","admin@mailinvest.blog"],"url":"https:\/\/mailinvest.blog\/index.php\/author\/adminmailinvest-blog\/"}]}},"_links":{"self":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/20231","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/comments?post=20231"}],"version-history":[{"count":0,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/20231\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media\/20232"}],"wp:attachment":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media?parent=20231"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/categories?post=20231"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/tags?post=20231"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}