{"id":86307,"date":"2019-01-01T11:02:27","date_gmt":"2019-01-01T19:02:27","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2019\/01\/60-cybersecurity-predictions-for-2019"},"modified":"2019-01-01T11:02:27","modified_gmt":"2019-01-01T19:02:27","slug":"60-cybersecurity-predictions-for-2019","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2019\/01\/60-cybersecurity-predictions-for-2019","title":{"rendered":"60 Cybersecurity Predictions For 2019"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/60-cybersecurity-predictions-for-2019.jpg\"><\/a><\/p>\n<p>Just like last year, this year\u2019s 60 predictions reveal the state-of-mind of key participants in the cybersecurity industry (on the defense team, of course) and cover all that\u2019s hot today. Topics include the use and misuse of data; artificial intelligence (AI) and machine learning as a double-edge sword helping both attackers and defenders; whether we are going to finally \u201cget over privacy\u201d or see our data finally being treated as a private and protected asset; how the cloud changes everything and how connected and moving devices add numerous security risks; the emerging global cyber war conducted by terrorists, criminals, and countries; and the changing skills and landscape of cybersecurity.<\/p>\n<p><!-- Link: <a href=\"https:\/\/www.forbes.com\/sites\/gilpress\/2018\/12\/03\/60-cybersecurity-predictions-for-2019\/?utm_source=TWITTER&utm_medium=social&utm_content=2046087193&utm_campaign=sprinklrForbesTechTwitter#68ad6b743528\">https:\/\/www.forbes.com\/sites\/gilpress\/2018\/12\/03\/60-cybersec...ad6b743528<\/a> --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Just like last year, this year\u2019s 60 predictions reveal the state-of-mind of key participants in the cybersecurity industry (on the defense team, of course) and cover all that\u2019s hot today. Topics include the use and misuse of data; artificial intelligence (AI) and machine learning as a double-edge sword helping both attackers and defenders; whether we [\u2026]<\/p>\n","protected":false},"author":354,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,6],"tags":[],"class_list":["post-86307","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-robotics-ai"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/86307","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/354"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=86307"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/86307\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=86307"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=86307"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=86307"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}