{"id":17157,"date":"2021-03-11T14:00:49","date_gmt":"2021-03-11T17:00:49","guid":{"rendered":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/?p=17157"},"modified":"2021-03-11T12:27:52","modified_gmt":"2021-03-11T15:27:52","slug":"2020-global-threat-intelligence-report","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/livros\/2020-global-threat-intelligence-report\/","title":{"rendered":"2020 Global Threat Intelligence Report"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-17158\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2021\/03\/2020-global-threat-intelligence-report.jpg\" alt=\"2020 Global Threat Intelligence Report\" width=\"145\" height=\"205\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2021\/03\/2020-global-threat-intelligence-report.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2021\/03\/2020-global-threat-intelligence-report-106x150.jpg 106w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>NTT<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>R\u00e9cum\u00e9:<\/strong><\/span> As the world unites and draws on all available resources to contain the global coronavirus (COVID-19) pandemic, unfortunately, there will be those who\u2019ll try to take advantage of the crisis for nefarious purposes.<br \/>\nAs organizations continue to drive business practices through digital transformation, the challenges they face evolve as well. Cybercriminals are among this group. With large numbers of employees and students working from home, businesses are facing increasing risk of becoming victims of cybercrime. Every organization should go the extra mile to protect their customers, partners and employees during these unprecedented and uncertain times.<br \/>\nNTT Ltd. provides solutions for challenges impacting clients across many industries globally.<br \/>\nIn our 2020 Global Threat Intelligence Report, we identify the unique challenges regions and industries face, and the operational, tactical and strategic considerations organizations should leverage to manage risk.<br \/>\nOur report identifies modern and emerging trends observed across many industries and regions. Armed with this knowledge, cybersecurity leaders will gain greater situational awareness allowing them to guide investments and support decisions to aid in improving their security posture.<br \/>\nAdditionally, cybersecurity defenders should leverage this information to assess identified threats against their own risk profile and technology footprint to bolster targeted threat detection and response efforts.<\/p>\n<p><a href=\"https:\/\/www.bibliotecadeseguranca.com.br\/wp-content\/uploads\/2021\/03\/2020-global-threat-intelligence-report.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-12143 size-full\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2015\/03\/download_fr.gif\" alt=\"T\u00e9l\u00e9charger\" width=\"107\" height=\"25\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>NTT R\u00e9cum\u00e9: As the world unites and draws on all available resources to contain the global coronavirus (COVID-19) pandemic, unfortunately, there will be those who\u2019ll try to take advantage of the crisis for nefarious purposes. As organizations continue to drive business practices through digital transformation, the challenges they face evolve as well. Cybercriminals are among this group. With large numbers of employees and students working from home, businesses are facing&hellip; <\/p>\n","protected":false},"author":3,"featured_media":17158,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51,6,20,112],"tags":[],"class_list":["post-17157","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-english","category-livros","category-seguranca-da-informacao","category-download"],"views":236,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/17157","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/comments?post=17157"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/17157\/revisions"}],"predecessor-version":[{"id":17159,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/17157\/revisions\/17159"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media\/17158"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media?parent=17157"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/categories?post=17157"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/tags?post=17157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}