{"id":46,"date":"2010-12-25T14:36:05","date_gmt":"2010-12-25T06:36:05","guid":{"rendered":"http:\/\/blog.esafeinfo.com\/?p=46"},"modified":"2010-12-25T14:36:20","modified_gmt":"2010-12-25T06:36:20","slug":"security-predictions-for-2011","status":"publish","type":"post","link":"https:\/\/blog.esafeinfo.com\/?p=46","title":{"rendered":"IT Security Predictions for 2011"},"content":{"rendered":"<p>Stephen Northcutt, president of <a href=\"http:\/\/www.sans.edu\">The SANS Technology Institute<\/a>, recently has published a forecast for emerging threats in 2011 and 2012. You can find a couple of interesting things in this prediction. As a summary, due to pervasive use of computing entities, the IT security incidents would be more serious and harmful. It might inflict on human health and life, this is why the digital forensics is going to be the most important skills. Read the full text <a href=\"http:\/\/www.sans.edu\/resources\/securitylab\/2011_2012_predict.php\">here<\/a>.<\/p>\n<p>Dr. Eric Cole also has summarized the 2010 emerging threats. <a href=\"http:\/\/www.sans.edu\/resources\/securitylab\/cole_predictions_10.php\">Read more &#8230; <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Stephen Northcutt, president of The SANS Technology Institute, recently has published a forecast for emerging threats in 2011 and 2012. You can find a couple of interesting things in this prediction. As a summary, due to pervasive use of computing entities, the IT security incidents would be more serious and harmful. It might inflict on [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-46","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/blog.esafeinfo.com\/index.php?rest_route=\/wp\/v2\/posts\/46","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.esafeinfo.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.esafeinfo.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.esafeinfo.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.esafeinfo.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=46"}],"version-history":[{"count":3,"href":"https:\/\/blog.esafeinfo.com\/index.php?rest_route=\/wp\/v2\/posts\/46\/revisions"}],"predecessor-version":[{"id":49,"href":"https:\/\/blog.esafeinfo.com\/index.php?rest_route=\/wp\/v2\/posts\/46\/revisions\/49"}],"wp:attachment":[{"href":"https:\/\/blog.esafeinfo.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=46"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.esafeinfo.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=46"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.esafeinfo.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=46"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}