{"id":9890,"date":"2016-11-11T18:18:00","date_gmt":"2016-11-12T01:18:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/two-2017-cyber-security-trends\/"},"modified":"2025-01-10T10:38:19","modified_gmt":"2025-01-10T17:38:19","slug":"duas-tendencias-de-ciberseguranca-de-2017","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/pt\/blog\/two-2017-cyber-security-trends\/","title":{"rendered":"Duas tend\u00eancias de ciberseguran\u00e7a de 2017 que todo profissional de opera\u00e7\u00f5es de seguran\u00e7a deve conhecer."},"content":{"rendered":"<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner\"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end\"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/08.07.18-Benefits-of-Automation-2.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Sala de controle vazia, repleta de monitores exibindo transmiss\u00f5es de dados ao vivo.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/08.07.18-Benefits-of-Automation-2.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/08.07.18-Benefits-of-Automation-2-300x186.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/08.07.18-Benefits-of-Automation-2-1024x636.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/08.07.18-Benefits-of-Automation-2-768x477.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column\"><div class=\"wp-block-post-date\"><time datetime=\"2016-11-11T18:18:00-07:00\">11 de novembro de 2016<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Duas tend\u00eancias de ciberseguran\u00e7a de 2017 que todo profissional de opera\u00e7\u00f5es de seguran\u00e7a deve conhecer.<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center\">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/pt\/author\/Katie_Bykowski\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Katie_Bykowski.jpg\" alt=\"avatar de utilizador\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tKatie Bykowski\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">2 <\/span> Minutos de leitura\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents\"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default\"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/pt\/blog\/two-2017-cyber-security-trends\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Correio eletr\u00f3nico\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/pt\/blog\/two-2017-cyber-security-trends\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Two%202017%20cybersecurity%20trends%20every%20security%20operations%20professional%20should%20know').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Ftwo-2017-cyber-security-trends%2F', '_blank')\" title=\"Correio eletr\u00f3nico\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Two%202017%20cybersecurity%20trends%20every%20security%20operations%20professional%20should%20know&url=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Ftwo-2017-cyber-security-trends%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Ftwo-2017-cyber-security-trends%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Ftwo-2017-cyber-security-trends%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents\">\n<h2>\u00a0<\/h2>\n<h2>Principais conclus\u00f5es do relat\u00f3rio &quot;Estado Global da Seguran\u00e7a da Informa\u00e7\u00e3o 2017&quot; da PwC<\/h2>\n<p>Todos os anos, um pequeno n\u00famero de pesquisas de refer\u00eancia oferece insights e conhecimentos que permitem uma prote\u00e7\u00e3o de ciberseguran\u00e7a mais eficaz. O relat\u00f3rio &quot;Estado Global da Seguran\u00e7a da Informa\u00e7\u00e3o&quot; de 2017 da PwC \u00e9 um desses estudos, baseado em entrevistas com mais de <strong>10,000<\/strong> Executivos de neg\u00f3cios e de TI. Embora seja um estudo abrangente, duas descobertas principais se destacam como contribui\u00e7\u00f5es essenciais para uma equipe de seguran\u00e7a cibern\u00e9tica.<\/p>\n<h3>Descoberta principal #1: Os processos de ciberseguran\u00e7a exigem integra\u00e7\u00e3o, gest\u00e3o e melhoria cont\u00ednua \u2014 a orquestra\u00e7\u00e3o da seguran\u00e7a e o aumento da automa\u00e7\u00e3o s\u00e3o essenciais.<\/h3>\n<p>Com o surgimento de novas amea\u00e7as mais virulentas, a integra\u00e7\u00e3o eficaz e o uso eficiente de todas as suas ferramentas de seguran\u00e7a tornam-se cruciais. <a href=\"https:\/\/swimlane.com\/pt\/solucoes\/orquestracao-de-seguranca\/\">Orquestra\u00e7\u00e3o de seguran\u00e7a<\/a> Proporciona sinergia entre ferramentas de seguran\u00e7a individuais para uma melhor prote\u00e7\u00e3o.\u00a0<\/p>\n<p>A automa\u00e7\u00e3o da ciberseguran\u00e7a melhora continuamente a produtividade e o sucesso da equipe de ciberseguran\u00e7a existente. Utilizando APIs e m\u00e9todos de seguran\u00e7a definidos por software (SDSec), <a href=\"https:\/\/swimlane.com\/pt\/blogue\/automacao-de-seguranca\/\">automa\u00e7\u00e3o de seguran\u00e7a<\/a> Permite que a equipe de SecOps opere com mais efici\u00eancia e investigue um volume maior de alarmes, reduzindo significativamente o tempo m\u00e9dio de resposta. \u00c9 uma prioridade cr\u00edtica, dada a escassez de pessoal treinado para lidar com o volume avassalador de amea\u00e7as. Mas, de acordo com uma pesquisa da AlgoSec, apenas 151.000 dos entrevistados tinham processos de seguran\u00e7a altamente automatizados e 331.000 tinham pouca ou nenhuma automa\u00e7\u00e3o.<\/p>\n<h3>Descoberta principal #2: Aumento do uso de an\u00e1lises e intelig\u00eancia de amea\u00e7as.<\/h3>\n<p>O estudo da PwC tamb\u00e9m destaca a necessidade de usar an\u00e1lises avan\u00e7adas e intelig\u00eancia de amea\u00e7as em tempo real para desenvolver um contexto para a compreens\u00e3o dos riscos. A vers\u00e3o de 2016 do mesmo relat\u00f3rio constatou que 591 mil dos entrevistados j\u00e1 utilizam Big Data Analytics para modelar amea\u00e7as \u00e0 seguran\u00e7a, demonstrando que as opera\u00e7\u00f5es de seguran\u00e7a est\u00e3o caminhando nessa dire\u00e7\u00e3o. Esse contexto \u00e9 crucial para responder a amea\u00e7as de forma eficaz com seguran\u00e7a automatizada. Al\u00e9m disso, a combina\u00e7\u00e3o do hist\u00f3rico de casos com o conhecimento situacional em tempo real de novas ou exclusivas amea\u00e7as cibern\u00e9ticas permite determinar se eventos isolados fazem parte de um ataque cibern\u00e9tico de maior escala e ajuda a orquestrar uma resposta a incidentes mais r\u00e1pida.<\/p>\n<p>Essas duas descobertas importantes refor\u00e7am a necessidade de as equipes de ciberseguran\u00e7a continuarem evoluindo para se defenderem contra as amea\u00e7as mais recentes. A orquestra\u00e7\u00e3o e o uso eficaz de intelig\u00eancia de amea\u00e7as s\u00e3o agora t\u00e1ticas indispens\u00e1veis para proteger sua organiza\u00e7\u00e3o. Voc\u00ea pode obter mais informa\u00e7\u00f5es sobre como implantar a orquestra\u00e7\u00e3o de seguran\u00e7a de forma eficaz neste Swimlane. <a href=\"https:\/\/swimlane.com\/pt\/solucoes\/casos-de-uso\/\">caso de uso<\/a>.<\/p>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default\">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Etiquetas<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/pt\/tag\/research\/'><span class='tag-content'>Pesquisar<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Posts relacionados<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69f88e0f698de bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/blog\/10-facts-every-cyber-security-professional-should-know\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>19 de abril de 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Dez fatos que todo profissional de ciberseguran\u00e7a deve saber.<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Ler mais<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69f88e0f6ab6e bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/blog\/cybersecurity-statistics-2017\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>30 de agosto de 2017<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Estat\u00edsticas de ciberseguran\u00e7a de 2017: uma an\u00e1lise aprofundada dos fatos e do futuro.<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Ler mais<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69f88e0f6bb37 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/blog\/black-hat-keynote-2019\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>1 de agosto de 2019<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Hoje em dia, toda equipe de seguran\u00e7a \u00e9 uma equipe de software: Por que voc\u00ea deve participar da palestra principal da Black Hat?<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Ler mais<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns\"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-interested-in-learning-more\">Interessado em saber mais?<\/h2>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<p class=\"has-white-color has-text-color\">Assine hoje mesmo para ficar por dentro das novidades e receber atualiza\u00e7\u00f5es regulares da Swimlane.<\/p>\n\n\n\n\n<div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/2022\/11\/newsletter-bg.svg' class='img-fluid'   alt='Contexto moderno de SecOps: Um gr\u00e1fico geom\u00e9trico com gradiente representando o fluxo fluido de dados e a agilidade nativa da nuvem.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1042\" action=\"\"><input type=\"hidden\" name=\"trp-form-language\" value=\"pt\"\/><\/form>\n<script>\n    var embeddedFormId = '5b371f4d0405e451c20535f8f66c5f8427779d2a';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1042';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1042\"><\/div>\n<!-- Incluing form response options -->\n<\/div>\n<\/div>\n<\/div><\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":9891,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[86],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[70],"class_list":["post-9890","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-research","resource-type-blogs","blog-category-secops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>2017 Cybersecurity Trends for SOC Professionals | Swimlane<\/title>\n<meta name=\"description\" content=\"The 2017 PwC \u201cGlobal State of Information Security\u201d report helps provide insight and understanding to enable more effective cyber security protection.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/pt\/blogue\/duas-tendencias-de-ciberseguranca-de-2017\/\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Two 2017 cybersecurity trends every security operations professional should know\" \/>\n<meta property=\"og:description\" content=\"The 2017 PwC \u201cGlobal State of Information Security\u201d report helps provide insight and understanding to enable more effective cyber security protection.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/pt\/blogue\/duas-tendencias-de-ciberseguranca-de-2017\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-10T17:38:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/08.07.18-Benefits-of-Automation-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"696\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo estimado de leitura\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/blog\\\/two-2017-cyber-security-trends\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/blog\\\/two-2017-cyber-security-trends\\\/\",\"name\":\"2017 Cybersecurity Trends for SOC Professionals | Swimlane\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/blog\\\/two-2017-cyber-security-trends\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/blog\\\/two-2017-cyber-security-trends\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/08.07.18-Benefits-of-Automation-2.png\",\"datePublished\":\"2016-11-12T01:18:00+00:00\",\"dateModified\":\"2025-01-10T17:38:19+00:00\",\"description\":\"The 2017 PwC \u201cGlobal State of Information Security\u201d report helps provide insight and understanding to enable more effective cyber security protection.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/blog\\\/two-2017-cyber-security-trends\\\/#breadcrumb\"},\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/swimlane.com\\\/pt\\\/blog\\\/two-2017-cyber-security-trends\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/blog\\\/two-2017-cyber-security-trends\\\/#primaryimage\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/08.07.18-Benefits-of-Automation-2.png\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/08.07.18-Benefits-of-Automation-2.png\",\"width\":1120,\"height\":696,\"caption\":\"Empty control room lined with monitors displaying live data feeds\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/blog\\\/two-2017-cyber-security-trends\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/swimlane.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Two 2017 cybersecurity trends every security operations professional should know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/#website\",\"url\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-PT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/swimlane\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/swimlane\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Tend\u00eancias de ciberseguran\u00e7a para profissionais de SOC em 2017 | Swimlane","description":"O relat\u00f3rio &quot;Estado Global da Seguran\u00e7a da Informa\u00e7\u00e3o&quot; de 2017 da PwC ajuda a fornecer informa\u00e7\u00f5es e compreens\u00e3o para permitir uma prote\u00e7\u00e3o de seguran\u00e7a cibern\u00e9tica mais eficaz.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/pt\/blogue\/duas-tendencias-de-ciberseguranca-de-2017\/","og_locale":"pt_PT","og_type":"article","og_title":"Two 2017 cybersecurity trends every security operations professional should know","og_description":"The 2017 PwC \u201cGlobal State of Information Security\u201d report helps provide insight and understanding to enable more effective cyber security protection.","og_url":"https:\/\/swimlane.com\/pt\/blogue\/duas-tendencias-de-ciberseguranca-de-2017\/","og_site_name":"AI Security Automation","article_modified_time":"2025-01-10T17:38:19+00:00","og_image":[{"width":1120,"height":696,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/08.07.18-Benefits-of-Automation-2.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Tempo estimado de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/pt\/blog\/two-2017-cyber-security-trends\/","url":"https:\/\/swimlane.com\/pt\/blog\/two-2017-cyber-security-trends\/","name":"Tend\u00eancias de ciberseguran\u00e7a para profissionais de SOC em 2017 | Swimlane","isPartOf":{"@id":"https:\/\/swimlane.com\/pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/pt\/blog\/two-2017-cyber-security-trends\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/pt\/blog\/two-2017-cyber-security-trends\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/08.07.18-Benefits-of-Automation-2.png","datePublished":"2016-11-12T01:18:00+00:00","dateModified":"2025-01-10T17:38:19+00:00","description":"O relat\u00f3rio &quot;Estado Global da Seguran\u00e7a da Informa\u00e7\u00e3o&quot; de 2017 da PwC ajuda a fornecer informa\u00e7\u00f5es e compreens\u00e3o para permitir uma prote\u00e7\u00e3o de seguran\u00e7a cibern\u00e9tica mais eficaz.","breadcrumb":{"@id":"https:\/\/swimlane.com\/pt\/blog\/two-2017-cyber-security-trends\/#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/pt\/blog\/two-2017-cyber-security-trends\/"]}]},{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/swimlane.com\/pt\/blog\/two-2017-cyber-security-trends\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/08.07.18-Benefits-of-Automation-2.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/08.07.18-Benefits-of-Automation-2.png","width":1120,"height":696,"caption":"Empty control room lined with monitors displaying live data feeds"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/pt\/blog\/two-2017-cyber-security-trends\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Two 2017 cybersecurity trends every security operations professional should know"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/pt\/#website","url":"https:\/\/swimlane.com\/pt\/","name":"Automa\u00e7\u00e3o de seguran\u00e7a de baixo c\u00f3digo e plataforma SOAR | Swimlane","description":"Automa\u00e7\u00e3o de IA ag\u00eantica para todas as fun\u00e7\u00f5es de seguran\u00e7a","publisher":{"@id":"https:\/\/swimlane.com\/pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-PT"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/pt\/#organization","name":"Automa\u00e7\u00e3o de seguran\u00e7a de baixo c\u00f3digo e plataforma SOAR | Swimlane","url":"https:\/\/swimlane.com\/pt\/","logo":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource\/9890","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource\/9890\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/media\/9891"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/media?parent=9890"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/tags?post=9890"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/resource-type?post=9890"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/resource-topic?post=9890"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/resource-industry?post=9890"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/blog-category?post=9890"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}