{"id":27082,"date":"2023-11-07T06:00:29","date_gmt":"2023-11-07T11:00:29","guid":{"rendered":"https:\/\/www.rsa.com\/?p=27082"},"modified":"2023-11-07T16:05:56","modified_gmt":"2023-11-07T21:05:56","slug":"casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet","status":"publish","type":"post","link":"https:\/\/www.rsa.com\/ar\/resources\/blog\/zero-trust\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\/","title":{"rendered":"\u062e\u0631\u0648\u0642\u0627\u062a \u0628\u064a\u0627\u0646\u0627\u062a \u0627\u0644\u0643\u0627\u0632\u064a\u0646\u0648\u0647\u0627\u062a \u062a\u0643\u0634\u0641 \u0644\u0645\u0627\u0630\u0627 \u064a\u064f\u0639\u062f \u0627\u0644\u062a\u0623\u0645\u064a\u0646 \u062d\u0633\u0628 \u0627\u0644\u062a\u0635\u0645\u064a\u0645 \u0647\u0648 \u0627\u0644\u0631\u0647\u0627\u0646 \u0627\u0644\u0622\u0645\u0646"},"content":{"rendered":"<p>\u0641\u064a \u0643\u062b\u064a\u0631 \u0645\u0646 \u0627\u0644\u0623\u062d\u064a\u0627\u0646\u060c \u064a\u0643\u0648\u0646 \u0631\u062f \u0627\u0644\u0641\u0639\u0644 \u0627\u0644\u0641\u0648\u0631\u064a \u0639\u0644\u0649 \u0627\u0644\u062d\u0648\u0627\u062f\u062b \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \u0645\u062b\u0644 \u0647\u062c\u0645\u0627\u062a \u0627\u0644\u0641\u062f\u064a\u0629 \u0627\u0644\u062e\u0628\u064a\u062b\u0629 \u0627\u0644\u062a\u064a \u0636\u0631\u0628\u062a \u0643\u0627\u0632\u064a\u0646\u0648\u0647\u0627\u062a \u0644\u0627\u0633 \u0641\u064a\u063a\u0627\u0633 \u0641\u064a \u0648\u0642\u062a \u0633\u0627\u0628\u0642 \u0645\u0646 \u0647\u0630\u0627 \u0627\u0644\u062e\u0631\u064a\u0641 \u0647\u0648 \u0627\u0644\u0628\u062d\u062b \u0639\u0646 \u0627\u0644\u0633\u0628\u0628. \u0623\u062a\u0641\u0647\u0645 \u0647\u0630\u0627 \u0627\u0644\u0627\u0646\u062f\u0641\u0627\u0639. \u0641\u062a\u0623\u062b\u064a\u0631 \u0627\u0644\u0647\u062c\u0645\u0627\u062a - \u0627\u0644\u0636\u064a\u0648\u0641 \u0627\u0644\u0630\u064a\u0646 \u0627\u0636\u0637\u0631\u0648\u0627 \u0644\u062a\u0633\u062c\u064a\u0644 \u0627\u0644\u062e\u0631\u0648\u062c \u0628\u0627\u0633\u062a\u062e\u062f\u0627\u0645 <a href=\"https:\/\/www.wsj.com\/lifestyle\/travel\/las-vegas-mgm-cyberattack-casinos-6ca43dcf\">\u0642\u0644\u0645 \u0648\u0648\u0631\u0642\u0629<\/a>, \u062d\u062a\u0649 <a href=\"https:\/\/www.cnn.com\/2023\/10\/05\/business\/mgm-100-million-hit-data-breach\/index.html\">$100 \u0645\u0644\u064a\u0648\u0646<\/a> \u0641\u064a \u0627\u0644\u062e\u0633\u0627\u0626\u0631 \u0644\u0636\u062d\u064a\u0629 \u0648\u0627\u062d\u062f\u0629 - \u0645\u0645\u0627 \u064a\u062f\u0644 \u0639\u0644\u0649 \u0627\u0644\u062a\u0643\u0627\u0644\u064a\u0641 \u0627\u0644\u0628\u0627\u0647\u0638\u0629 \u0644\u0644\u0641\u0634\u0644 \u0627\u0644\u0623\u0645\u0646\u064a. \u0644\u0627 \u0623\u062d\u062f \u064a\u0631\u064a\u062f \u0623\u0646 \u064a\u0643\u0648\u0646 \u0627\u0644\u0636\u062d\u064a\u0629 \u0627\u0644\u062a\u0627\u0644\u064a\u0629 \u0644\u0627\u062e\u062a\u0631\u0627\u0642 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a.<\/p>\n<p>&nbsp;<\/p>\n<p>\u0648\u0644\u0643\u0646 \u0641\u064a \u0645\u062c\u0627\u0644 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a\u060c \u0644\u0627 \u064a\u0648\u062c\u062f \u0639\u0627\u062f\u0629\u064b \u0633\u0628\u0628 \u0648\u0627\u062d\u062f \u0641\u0642\u0637. \u0641\u064a \u0645\u0639\u0638\u0645 \u0627\u0644\u062d\u0648\u0627\u062f\u062b \u0627\u0644\u0623\u0645\u0646\u064a\u0629\u060c \u064a\u0633\u062a\u063a\u0644 \u0627\u0644\u0645\u0647\u0627\u062c\u0645\u0648\u0646 \u0633\u0644\u0633\u0644\u0629 \u0645\u0646 \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \u0627\u0644\u062a\u064a \u062a\u0645\u0646\u062d\u0647\u0645 \u062a\u062f\u0631\u064a\u062c\u064a\u0627\u064b \u0627\u0644\u0645\u0632\u064a\u062f \u0645\u0646 \u0627\u0644\u0648\u0635\u0648\u0644 \u0648\u0627\u0644\u0633\u064a\u0637\u0631\u0629 \u0639\u0644\u0649 \u0627\u0644\u0628\u064a\u0626\u0629. \u0644\u064a\u0633 \u0645\u0646 \u0627\u0644\u0645\u062b\u0645\u0631 \u0627\u0644\u0628\u062d\u062b \u0639\u0646 \u0627\u0644\u0633\u0628\u0628 \u0648\u0627\u0644\u0646\u062a\u064a\u062c\u0629 \u0639\u0646\u062f\u0645\u0627 \u0644\u0627 \u064a\u0643\u0648\u0646 \u0647\u0646\u0627\u0643 \u0639\u0627\u062f\u0629\u064b \u0623\u064a \u0633\u0628\u0628. \u0648\u0628\u062f\u0644\u0627\u064b \u0645\u0646 \u0630\u0644\u0643\u060c \u062a\u062d\u062a\u0627\u062c \u0641\u0631\u0642 \u0627\u0644\u0623\u0645\u0646 \u0625\u0644\u0649 \u0627\u0644\u0646\u0638\u0631 \u0641\u064a \u0628\u064a\u0626\u062a\u0647\u0627 \u0627\u0644\u0643\u0644\u064a\u0629 \u0648\u0628\u0646\u064a\u062a\u0647\u0627 \u0648\u0637\u0631\u0642 \u0639\u0645\u0644 \u062a\u0642\u0646\u064a\u0627\u062a\u0647\u0627 \u0628\u0627\u0644\u0625\u0636\u0627\u0641\u0629 \u0625\u0644\u0649 <a href=\"https:\/\/www.rsa.com\/ar\/zero-trust\/dont-get-hooked-zero-trust-strategies-to-protect-your-help-desk-from-phishing\/\">\u0627\u0644\u0639\u0645\u0644\u064a\u0627\u062a \u0627\u0644\u062a\u062c\u0627\u0631\u064a\u0629 \u0648\u0627\u0644\u062b\u0642\u0627\u0641\u0629<\/a> \u0648\u062a\u0642\u0631\u064a\u0628\u0647\u0627 \u0645\u0646 \u0628\u0646\u064a\u0629 \u0627\u0646\u0639\u062f\u0627\u0645 \u0627\u0644\u062b\u0642\u0629.<\/p>\n<p>&nbsp;<\/p>\n<p>\u0648\u0643\u0645\u0627 \u0647\u0648 \u0627\u0644\u062d\u0627\u0644 \u0628\u0627\u0644\u0646\u0633\u0628\u0629 \u0644\u0644\u0643\u0627\u0632\u064a\u0646\u0648\u0647\u0627\u062a \u0627\u0644\u062a\u064a \u062a\u0639\u0631\u0636\u062a \u0644\u0647\u0630\u0647 \u0627\u0644\u0647\u062c\u0645\u0627\u062a\u060c \u0641\u0625\u0646 \u0643\u0644\u0627\u064b \u0645\u0646 \u0627\u0644\u0647\u062c\u0645\u0627\u062a \u0627\u0644\u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a\u0629 \u0648\u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \u064a\u0645\u064a\u0644 \u0625\u0644\u0649 \u0627\u0644\u0644\u0639\u0628 \u0639\u0644\u0649 \u0627\u0644\u0627\u062d\u062a\u0645\u0627\u0644\u0627\u062a. \u0641\u0639\u0627\u062f\u0629\u064b \u0644\u0627 \u064a\u0643\u0648\u0646 \u0647\u0646\u0627\u0643 \u0646\u0642\u0637\u0629 \u0636\u0639\u0641 \u0648\u0627\u062d\u062f\u0629 \u062a\u0639\u0631\u0636 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \u0644\u0644\u0645\u0624\u0633\u0633\u0629 \u0644\u0644\u062e\u0637\u0631. \u0648\u0628\u062f\u0644\u0627\u064b \u0645\u0646 \u0630\u0644\u0643\u060c \u0641\u0625\u0646 \u0627\u0644\u0627\u062d\u062a\u0645\u0627\u0644\u0627\u062a \u0648\u0627\u0644\u0645\u062e\u0627\u0637\u0631 \u0627\u0644\u0625\u062d\u0635\u0627\u0626\u064a\u0629 \u0647\u064a \u0627\u0644\u062a\u064a \u062a\u0636\u0627\u0639\u0641 \u0628\u0639\u0636\u0647\u0627 \u0627\u0644\u0628\u0639\u0636. \u0644\u0627 \u064a\u0646\u0628\u063a\u064a \u0644\u0641\u0631\u0642 \u0627\u0644\u0623\u0645\u0646 \u0623\u0646 \u062a\u0628\u062d\u062b \u0639\u0646 \u0631\u0635\u0627\u0635\u0629 \u0641\u0636\u064a\u0629 - \u0628\u062f\u0644\u0627\u064b \u0645\u0646 \u0630\u0644\u0643\u060c \u064a\u062c\u0628 \u0623\u0646 \u064a\u0641\u0647\u0645\u0648\u0627 \u0627\u0644\u0638\u0631\u0648\u0641 \u0627\u0644\u062a\u064a \u064a\u0645\u0643\u0646 \u0623\u0646 \u062a\u062d\u0648\u0644 \u0646\u062f\u0641\u0629 \u0627\u0644\u062b\u0644\u062c \u0625\u0644\u0649 \u0627\u0646\u0647\u064a\u0627\u0631 \u062c\u0644\u064a\u062f\u064a.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>\u0639\u0646\u062f\u0645\u0627 \u062a\u0643\u0648\u0646 \"\u0627\u0644\u0645\u062e\u0627\u0637\u0631\u0629 \u0645\u0642\u0627\u0628\u0644 \u0627\u0644\u0645\u0643\u0627\u0641\u0623\u0629\" \u0641\u064a \u0635\u0627\u0644\u062d \u0627\u0644\u0645\u0647\u0627\u062c\u0645\u064a\u0646 <\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>\u0641\u064a \u062d\u064a\u0646 \u0623\u0646\u0646\u0627 \u0631\u0628\u0645\u0627 \u0644\u0646 \u0646\u0639\u0631\u0641 \u0623\u0628\u062f\u064b\u0627 \u0627\u0644\u0642\u0635\u0629 \u0627\u0644\u0643\u0627\u0645\u0644\u0629 \u062d\u0648\u0644 \u0643\u064a\u0641\u064a\u0629 \u0634\u0646\u0651 ALPHV \/ BlackCat \u0644\u0647\u062c\u0645\u0627\u062a\u0647\u0645\u060c \u0625\u0644\u0627 \u0623\u0646\u0646\u0627 \u0646\u0639\u0631\u0641 \u0628\u0639\u0636 \u0627\u0644\u0638\u0631\u0648\u0641 \u0627\u0644\u062a\u064a \u0633\u0627\u0639\u062f\u062a\u0647\u0645 \u0639\u0644\u0649 \u0627\u062e\u062a\u0631\u0627\u0642 \u0636\u062d\u0627\u064a\u0627\u0647\u0645 \u0648\u0643\u064a\u0641 \u0623\u0646 \u062a\u0644\u0643 \u0627\u0644\u0638\u0631\u0648\u0641 \u062e\u0644\u0642\u062a \u0645\u062e\u0627\u0637\u0631 \u0643\u0627\u0646\u062a \u0641\u064a \u0635\u0627\u0644\u062d \u0627\u0644\u0645\u0647\u0627\u062c\u0645\u064a\u0646.<\/p>\n<p>&nbsp;<\/p>\n<p>\u0641\u064a <a href=\"https:\/\/www.malwarebytes.com\/blog\/personal\/2023\/09\/ransomware-group-steps-up-issues-statement-over-mgm-resorts-compromise#:~:text=MGM%20made%20the%20hasty%20decision,their%20domain%20controller%20hash%20dumps.\">\u0628\u064a\u0627\u0646<\/a>, \u060c \u0642\u0627\u0644 ALPHV \u0625\u0646 \u0627\u0644\u0643\u0627\u0632\u064a\u0646\u0648 \"\u0623\u063a\u0644\u0642 \u0643\u0644 \u062e\u0648\u0627\u062f\u0645 \u0623\u0648\u0643\u062a\u0627 \u0633\u064a\u0646\u0643 \u0627\u0644\u062e\u0627\u0635\u0629 \u0628\u0647\u0645 \u0628\u0639\u062f \u0623\u0646 \u0639\u0644\u0645\u0648\u0627 \u0623\u0646\u0646\u0627 \u0643\u0646\u0627 \u0646\u062a\u0631\u0628\u0635 \u0628\u062e\u0648\u0627\u062f\u0645 \u0648\u0643\u064a\u0644 \u0623\u0648\u0643\u062a\u0627 \u0627\u0644\u062e\u0627\u0635\u0629 \u0628\u0647\u0645 \u0644\u0627\u0633\u062a\u0646\u0634\u0627\u0642 \u0643\u0644\u0645\u0627\u062a \u0645\u0631\u0648\u0631 \u0627\u0644\u0623\u0634\u062e\u0627\u0635 \u0627\u0644\u0630\u064a\u0646 \u0644\u0627 \u064a\u0645\u0643\u0646 \u0627\u062e\u062a\u0631\u0627\u0642 \u0643\u0644\u0645\u0627\u062a \u0645\u0631\u0648\u0631\u0647\u0645.\"<\/p>\n<p>&nbsp;<\/p>\n<p>\u062a\u0645\u0643\u0646\u062a ALPHV \u0645\u0646 \u0627\u0644\u0642\u064a\u0627\u0645 \u0628\u0630\u0644\u0643 \u0628\u0633\u0628\u0628 <a href=\"https:\/\/help.okta.com\/en-us\/content\/topics\/directory\/password-sync-application.htm\">\u0645\u0632\u0627\u0645\u0646\u0629 \u0643\u0644\u0645\u0629 \u0645\u0631\u0648\u0631 \u062a\u0637\u0628\u064a\u0642 \u0623\u0648\u0643\u062a\u0627 \u0644\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a<\/a>, \u060c \u0648\u0627\u0644\u062a\u064a \"\u062a\u0633\u062a\u062e\u062f\u0645 \u0648\u0627\u062c\u0647\u0627\u062a \u0628\u0631\u0645\u062c\u0629 \u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a \u0627\u0644\u0642\u064a\u0627\u0633\u064a\u0629 \u0644\u0645\u0632\u0627\u0645\u0646\u0629 \u0643\u0644\u0645\u0627\u062a \u0627\u0644\u0645\u0631\u0648\u0631 \u0648\u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a \u0627\u0644\u0645\u062d\u0644\u064a\u0629 \u0639\u0646\u062f \u062a\u0648\u0641\u0631\u0647\u0627.\" \u062a\u0633\u062a\u0645\u0631 \u0648\u062b\u0627\u0626\u0642 \u0627\u0644\u0645\u0646\u062a\u062c: \"\u0639\u0646\u062f\u0645\u0627 \u064a\u062a\u0645 \u062a\u0645\u0643\u064a\u0646 \u0645\u0632\u0627\u0645\u0646\u0629 \u0643\u0644\u0645\u0629 \u0645\u0631\u0648\u0631 Okta \u0644\u0644\u062a\u0637\u0628\u064a\u0642 - \u0645\u0632\u0627\u0645\u0646\u0629 \u0643\u0644\u0645\u0629 \u0645\u0631\u0648\u0631 Okta\u060c \u064a\u0643\u0648\u0646 \u0627\u0644\u0633\u0644\u0648\u0643 \u0627\u0644\u0627\u0641\u062a\u0631\u0627\u0636\u064a \u0647\u0648 \u0645\u0632\u0627\u0645\u0646\u0629 \u0643\u0644\u0645\u0629 \u0627\u0644\u0645\u0631\u0648\u0631 \u0627\u0644\u062d\u0627\u0644\u064a\u0629. \u0643\u0644\u0645\u0629 \u0645\u0631\u0648\u0631 Okta \u0647\u064a \u0643\u0644\u0645\u0629 \u0627\u0644\u0645\u0631\u0648\u0631 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645\u0629 \u0644\u062a\u0633\u062c\u064a\u0644 \u0627\u0644\u062f\u062e\u0648\u0644 \u0625\u0644\u0649 Okta.\"<\/p>\n<p>&nbsp;<\/p>\n<p>\u0645\u0627 \u064a\u0639\u0646\u064a\u0647 \u0630\u0644\u0643 \u0628\u0627\u0644\u0644\u063a\u0629 \u0627\u0644\u0625\u0646\u062c\u0644\u064a\u0632\u064a\u0629 \u0627\u0644\u0628\u0633\u064a\u0637\u0629 \u0647\u0648 \u0623\u0646 Okta \u0644\u062f\u064a\u0647\u0627 \u0643\u0644\u0645\u0627\u062a \u0645\u0631\u0648\u0631 \u0627\u0644\u062f\u0644\u064a\u0644 \u0627\u0644\u0646\u0634\u0637 \u0644\u0645\u0633\u062a\u062e\u062f\u0645\u064a\u0647\u0627. \u0648\u064a\u0631\u062c\u0639 \u0630\u0644\u0643 \u0641\u064a \u062c\u0632\u0621 \u0643\u0628\u064a\u0631 \u0645\u0646\u0647 \u0625\u0644\u0649 \u0628\u0646\u064a\u0629 \u0627\u0644\u0628\u0627\u0626\u0639 \u0627\u0644\u062a\u064a \u062a\u0639\u062a\u0645\u062f \u0639\u0644\u0649 \u0627\u0644\u0633\u062d\u0627\u0628\u0629 \u0623\u0648\u0644\u0627\u064b: \u062a\u0633\u0627\u0639\u062f \u0645\u0632\u0627\u0645\u0646\u0629 \u0643\u0644\u0645\u0627\u062a \u0627\u0644\u0645\u0631\u0648\u0631 \u0641\u064a \u0648\u0642\u062a \u062a\u0634\u063a\u064a\u0644\u0647\u0627 \u0648\u062a\u0633\u0647\u064a\u0644 \u0639\u0645\u0644\u064a\u0629 \u0627\u0644\u0646\u0634\u0631 \u0627\u0644\u0633\u0631\u064a\u0639 \u0644\u0646\u0638\u0627\u0645 \u0627\u0644\u0645\u0635\u0627\u062f\u0642\u0629 \u0645\u062a\u0639\u062f\u062f\u0629 \u0627\u0644\u0623\u0637\u0631\u0627\u0641 \u0648\u0637\u0631\u062d\u0647.<\/p>\n<p>&nbsp;<\/p>\n<p>\u0641\u064a \u062d\u064a\u0646 \u0623\u0646 \u0647\u0630\u0627 \u0627\u0644\u062e\u064a\u0627\u0631 \u064a\u0633\u0627\u0639\u062f \u0627\u0644\u0645\u0624\u0633\u0633\u0627\u062a \u0639\u0644\u0649 \u0646\u0634\u0631 \u0627\u0644\u062d\u0644 \u0628\u0634\u0643\u0644 \u0623\u0633\u0631\u0639\u060c \u0625\u0644\u0627 \u0623\u0646\u0647 \u064a\u0623\u062a\u064a \u0645\u0639 \u0645\u0642\u0627\u064a\u0636\u0627\u062a \u0623\u0645\u0646\u064a\u0629 \u0643\u0628\u064a\u0631\u0629 \u062a\u062a\u0639\u0627\u0631\u0636 \u0645\u0639 \u0645\u0628\u062f\u0623 \u0623\u0633\u0627\u0633\u064a \u0645\u0646 \u0645\u0628\u0627\u062f\u0626 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a: \u062a\u062c\u0646\u0628 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a\u060c \u0623\u0648 \u0628\u0639\u0628\u0627\u0631\u0629 \u0623\u062e\u0631\u0649: \u0639\u062f\u0645 \u062a\u062e\u0632\u064a\u0646 \u0623\u0648 \u0646\u0642\u0644 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u0627\u0644\u062a\u064a \u0644\u0627 \u062a\u062d\u062a\u0627\u062c \u0625\u0644\u0649 \u062a\u062e\u0632\u064a\u0646\u0647\u0627 \u0623\u0648 \u0646\u0642\u0644\u0647\u0627.<\/p>\n<p>&nbsp;<\/p>\n<p>\u0625\u0646\u0647\u0627 \u0642\u0627\u0639\u062f\u0629 \u0637\u0648\u064a\u0644\u0629 \u0627\u0644\u0623\u0645\u062f \u0644\u0623\u0646\u0647 \u0625\u0630\u0627 \u0642\u0627\u0645\u062a \u0645\u0624\u0633\u0633\u0629 \u0645\u0627 \u0628\u0646\u0642\u0644 \u0634\u064a\u0621 \u0645\u0627\u060c \u0641\u0645\u0646 \u0627\u0644\u0623\u0633\u0647\u0644 \u0639\u0644\u0649 \u0627\u0644\u0645\u0647\u0627\u062c\u0645\u064a\u0646 \u0633\u0631\u0642\u062a\u0647. \u0647\u0630\u0627 \u0645\u0627 \u062d\u062f\u062b \u0645\u0639 BlackCat \u0648 ALPHV: \u0645\u0646 \u0627\u0644\u0645\u062d\u062a\u0645\u0644 \u0623\u0646\u0647\u0645 \u0627\u062e\u062a\u0631\u0642\u0648\u0627 \u0627\u0644\u062e\u0627\u062f\u0645 \u0627\u0644\u0630\u064a \u0643\u0627\u0646 \u064a\u0639\u0645\u0644 \u0639\u0644\u064a\u0647 \u0648\u0643\u064a\u0644 Okta Agent AD. \u0648\u0645\u0646 \u0647\u0646\u0627\u0643\u060c \u0643\u0627\u0646 \u0628\u0625\u0645\u0643\u0627\u0646\u0647\u0645 \u062a\u0639\u064a\u064a\u0646 \u0645\u0635\u0627\u0635 \u062f\u0645\u0627\u0621 \u0644\u0646\u0633\u062e \u0643\u0644\u0645\u0627\u062a \u0627\u0644\u0645\u0631\u0648\u0631\u060c \u0623\u0648 \u062d\u0642\u0646 DLL\u060c \u0623\u0648 \u062a\u0641\u0631\u064a\u063a \u0623\u062c\u0632\u0627\u0621 \u0645\u0646 \u0627\u0644\u0630\u0627\u0643\u0631\u0629\u060c \u0623\u0648 \u0627\u062a\u062e\u0627\u0630 \u0623\u064a \u0625\u062c\u0631\u0627\u0621 \u0622\u062e\u0631.  \u0648\u0647\u0630\u0627 \u0647\u0648 \u0628\u064a\u062a \u0627\u0644\u0642\u0635\u064a\u062f: \u0644\u0627 \u064a\u0647\u0645 \u062d\u0642\u064b\u0627 \u0627\u0644\u0625\u062c\u0631\u0627\u0621\u0627\u062a \u0627\u0644\u0645\u062d\u062f\u062f\u0629 \u0627\u0644\u062a\u064a \u0627\u062a\u062e\u0630\u0647\u0627 \u0627\u0644\u0645\u0647\u0627\u062c\u0645\u0648\u0646 \u0639\u0646\u062f\u0645\u0627 \u0643\u0627\u0646\u0648\u0627 \u0639\u0644\u0649 \u0627\u0644\u062e\u0627\u062f\u0645 \u0627\u0644\u0645\u062e\u062a\u0631\u0642.<\/p>\n<p>&nbsp;<\/p>\n<p>\u0628\u062f\u0644\u0627\u064b \u0645\u0646 \u0630\u0644\u0643\u060c \u0628\u062f\u0623\u062a \u0627\u0644\u0645\u062e\u0627\u0637\u0631\u0629 \u0628\u0646\u0634\u0631 \u0628\u0646\u064a\u0629 \u062a\u0632\u0627\u0645\u0646 \u0643\u0644\u0645\u0627\u062a \u0627\u0644\u0645\u0631\u0648\u0631. \u0648\u0642\u062f \u0623\u062f\u0649 \u0647\u0630\u0627 \u0627\u0644\u0627\u062e\u062a\u064a\u0627\u0631 \u0625\u0644\u0649 \u062a\u0647\u064a\u0626\u0629 \u0627\u0644\u0638\u0631\u0648\u0641 \u0627\u0644\u062a\u064a \u0633\u0645\u062d\u062a \u0644\u0643\u0644 \u0634\u064a\u0621 \u0622\u062e\u0631 \u0628\u0623\u0646 \u064a\u062a\u0628\u0639\u0647. \u0647\u0630\u0627 \u0627\u0644\u0642\u0631\u0627\u0631 \u0647\u0648 \u0627\u0644\u0645\u0643\u0627\u0641\u0626 \u0644\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \u0644\u0627\u062e\u062a\u064a\u0627\u0631 \u0627\u0644\u0628\u0646\u0627\u0621 \u0639\u0644\u0649 \u0627\u0644\u0631\u0645\u0627\u0644 \u0628\u062f\u0644\u0627\u064b \u0645\u0646 \u062d\u062c\u0631 \u0627\u0644\u0623\u0633\u0627\u0633: \u0645\u0627 \u062a\u0628\u0646\u064a\u0647 <em>\u0642\u062f <\/em>\u0627\u0644\u0648\u0642\u0648\u0641\u060c \u0648\u0644\u0643\u0646 \u0644\u0645\u0627\u0630\u0627 \u0627\u0644\u0645\u062e\u0627\u0637\u0631\u0629\u061f<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u0622\u0645\u0646 \u062d\u0633\u0628 \u0627\u0644\u062a\u0635\u0645\u064a\u0645\u060c \u0622\u0645\u0646 \u0627\u0641\u062a\u0631\u0627\u0636\u064a\u064b\u0627<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>\u062a\u0624\u0643\u062f \u0647\u062c\u0645\u0627\u062a BlackCat \/ ALPHV \u0639\u0644\u0649 \u0645\u062f\u0649 \u0635\u0639\u0648\u0628\u0629 \u062a\u0623\u0645\u064a\u0646 \u0627\u0644\u062e\u0648\u0627\u062f\u0645. \u062a\u0636\u064a\u0641 \u0627\u0644\u062a\u062d\u062f\u064a\u062b\u0627\u062a \u0627\u0644\u0645\u062a\u0639\u062f\u062f\u0629\u060c \u0648\u0643\u0644\u0645\u0627\u062a \u0645\u0631\u0648\u0631 \u0627\u0644\u0645\u0633\u0624\u0648\u0644\u060c \u0648\u0625\u0639\u0627\u062f\u0629 \u062a\u0634\u063a\u064a\u0644 \u0643\u0644\u0645\u0629 \u0627\u0644\u0645\u0631\u0648\u0631 \u0625\u0644\u0649 \u0633\u0637\u062d \u0647\u062c\u0648\u0645 \u0643\u0628\u064a\u0631 \u0648\u0645\u0639\u0642\u062f \u0648\u0647\u0634. \u0647\u0630\u0627 \u0627\u0644\u0646\u0648\u0639 \u0645\u0646 \u0627\u0644\u062a\u0643\u0648\u064a\u0646 \u0639\u0627\u062f\u0629 \u0645\u0627 \u064a\u0643\u0648\u0646 \u0641\u064a \u0635\u0627\u0644\u062d \u0627\u0644\u0645\u0647\u0627\u062c\u0645\u064a\u0646.<\/p>\n<p>&nbsp;<\/p>\n<p>\u0627\u0644\u0628\u062f\u064a\u0644 \u0647\u0648 \u0627\u0644\u0628\u0646\u0627\u0621 \u0639\u0644\u0649 \u0643\u0644 \u0645\u0646 \u0627\u0644\u062a\u0623\u0645\u064a\u0646 \u062d\u0633\u0628 \u0627\u0644\u062a\u0635\u0645\u064a\u0645 \u0648\u0627\u0644\u062a\u0623\u0645\u064a\u0646 \u0627\u0644\u0627\u0641\u062a\u0631\u0627\u0636\u064a <a href=\"https:\/\/www.cisa.gov\/securebydesign\">\u0627\u0644\u0645\u0628\u0627\u062f\u0626<\/a>, \u0627\u0644\u062a\u064a \u062a\u0639\u0637\u064a \u0627\u0644\u0623\u0648\u0644\u0648\u064a\u0629 \u0644\u0644\u0623\u0645\u0627\u0646 \u0641\u064a \u062c\u0645\u064a\u0639 \u0645\u064a\u0632\u0627\u062a \u0627\u0644\u0645\u0646\u062a\u062c \u0648\u0639\u0645\u0644\u064a\u0627\u062a\u0647 \u0648\u0639\u0645\u0644\u064a\u0627\u062a\u0647 \u0648\u0639\u0645\u0644\u064a\u0627\u062a\u0647 \u0648\u062a\u0642\u062a\u0631\u0628 \u0628\u0627\u0644\u0645\u0624\u0633\u0633\u0627\u062a \u0645\u0646 \u0627\u0646\u0639\u062f\u0627\u0645 \u0627\u0644\u062b\u0642\u0629.<\/p>\n<p>&nbsp;<\/p>\n<p>\u0645\u062b\u0644 \u0627\u0644\u0643\u062b\u064a\u0631 \u0645\u0646 \u0627\u0644\u0623\u0634\u064a\u0627\u0621\u060c \u0641\u0625\u0646 \u0627\u0644\u0623\u0645\u0627\u0646 \u062d\u0633\u0628 \u0627\u0644\u062a\u0635\u0645\u064a\u0645 \u0648\u0627\u0644\u0623\u0645\u0627\u0646 \u0627\u0644\u0627\u0641\u062a\u0631\u0627\u0636\u064a \u064a\u062a\u0639\u0644\u0642\u0627\u0646 \u0628\u0627\u0644\u062a\u0641\u0627\u0635\u064a\u0644. \u0645\u0646 \u0627\u0644\u0633\u0647\u0644 \u0627\u0644\u0627\u062f\u0639\u0627\u0621 \u0628\u0623\u0646 \u0627\u0644\u0645\u0646\u062a\u062c \u064a\u0639\u0637\u064a \u0627\u0644\u0623\u0648\u0644\u0648\u064a\u0629 \u0644\u0644\u0623\u0645\u0627\u0646 - \u0645\u0646 \u0627\u0644\u0635\u0639\u0628 \u062a\u0642\u062f\u064a\u0645 \u0634\u064a\u0621 \u064a\u0644\u0628\u064a \u0647\u0630\u0627 \u0627\u0644\u0645\u0639\u064a\u0627\u0631 \u0628\u0627\u0644\u0641\u0639\u0644.<\/p>\n<p>&nbsp;<\/p>\n<p>\u062a\u0642\u0648\u0645 RSA \u0628\u062a\u0637\u0648\u064a\u0631 \u062d\u0644\u0648\u0644 \u0627\u0644\u0623\u0645\u0627\u0646 \u0623\u0648\u0644\u0627\u064b \u0627\u0644\u062a\u064a \u062a\u0628\u062f\u0623 \u0628\u0647\u0630\u0647 \u0627\u0644\u0645\u0628\u0627\u062f\u0626. \u0646\u062d\u0646 \u0644\u0627 \u0646\u0642\u0648\u0645 \u0628\u0645\u0632\u0627\u0645\u0646\u0629 Active Directory \u0623\u0648 \u0643\u0644\u0645\u0627\u062a \u0645\u0631\u0648\u0631 LDAP - \u0641\u0646\u062d\u0646 \u0644\u0627 \u0646\u0645\u0644\u0643 \u0628\u064a\u0627\u0646\u0627\u062a \u0627\u0644\u0627\u0639\u062a\u0645\u0627\u062f \u0647\u0630\u0647. \u0648\u0628\u062f\u0644\u0627\u064b \u0645\u0646 \u0630\u0644\u0643\u060c \u0646\u0637\u0644\u0628 \u0645\u0646 \u0627\u0644\u0639\u0645\u0644\u0627\u0621 \u0646\u0634\u0631 \u062c\u0647\u0627\u0632 \u0627\u0641\u062a\u0631\u0627\u0636\u064a \u0645\u062d\u0635\u0651\u0646 \u064a\u062a\u0635\u0644 \u0628\u0645\u0633\u062a\u0648\u062f\u0639\u0627\u062a \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645\u064a\u0646 \u0641\u064a \u0623\u0645\u0627\u0643\u0646 \u0627\u0644\u0639\u0645\u0644 \u0648\u064a\u062a\u062d\u0642\u0642 \u0645\u0646 \u0635\u062d\u0629 \u0643\u0644\u0645\u0627\u062a \u0627\u0644\u0645\u0631\u0648\u0631 \u0641\u064a \u0627\u0644\u0648\u0642\u062a \u0627\u0644\u0641\u0639\u0644\u064a \u0628\u062f\u0644\u0627\u064b \u0645\u0646 \u0627\u0633\u062a\u0646\u0634\u0627\u0642\u0647\u0627 \u0648\u0645\u0632\u0627\u0645\u0646\u062a\u0647\u0627 \u0645\u0639 \u0627\u0644\u0633\u062d\u0627\u0628\u0629.<\/p>\n<p>&nbsp;<\/p>\n<p>\u064a\u0623\u062a\u064a \u0647\u0630\u0627 \u0627\u0644\u0627\u062e\u062a\u064a\u0627\u0631 \u0645\u0639 \u0628\u0639\u0636 \u0627\u0644\u0645\u0641\u0627\u0636\u0644\u0627\u062a: \u064a\u0633\u062a\u063a\u0631\u0642 \u0646\u0634\u0631 \u062c\u0647\u0627\u0632 \u0627\u0641\u062a\u0631\u0627\u0636\u064a \u0645\u062d\u0635\u0651\u0646 \u0648\u0645\u0648\u062c\u0651\u0647 \u0627\u0644\u0647\u0648\u064a\u0629 \u0627\u0644\u0627\u0641\u062a\u0631\u0627\u0636\u064a \u0627\u0644\u062e\u0627\u0635 \u0628\u0646\u0627 \u0627\u0644\u0645\u0632\u064a\u062f \u0645\u0646 \u0627\u0644\u0648\u0642\u062a \u0648\u0627\u0644\u062c\u0647\u062f. \u0648\u0644\u0643\u0646 \u0647\u0630\u0647 \u062a\u0643\u0644\u0641\u0629 \u064a\u0639\u062a\u0642\u062f \u0639\u0645\u0644\u0627\u0624\u0646\u0627 \u0648\u0641\u0631\u064a\u0642\u0646\u0627 \u0623\u0646\u0647\u0627 \u062a\u0633\u062a\u062d\u0642 \u0627\u0644\u0639\u0646\u0627\u0621\u060c \u0644\u0623\u0646\u0646\u0627 \u0628\u0639\u062f\u0645 \u0645\u0632\u0627\u0645\u0646\u0629 \u0643\u0644\u0645\u0627\u062a \u0627\u0644\u0645\u0631\u0648\u0631 \u0646\u0642\u0644\u0644 \u0645\u0646 \u0645\u0633\u0627\u062d\u0629 \u0627\u0644\u0647\u062c\u0648\u0645 \u0628\u062f\u0644\u0627\u064b \u0645\u0646 \u062a\u0648\u0633\u064a\u0639\u0647\u0627. \u0625\u0630\u0627 \u0644\u0645 \u0646\u0642\u0645 \u0628\u0645\u0632\u0627\u0645\u0646\u062a\u0647\u0627\u060c \u0641\u0644\u0627 \u064a\u0645\u0643\u0646\u0646\u0627 \u0641\u0642\u062f\u0627\u0646\u0647\u0627 - \u0648\u0644\u0627 \u064a\u0645\u0643\u0646 \u0644\u0644\u0645\u0647\u0627\u062c\u0645 \u0627\u0633\u062a\u063a\u0644\u0627\u0644\u0647\u0627. \u0648\u0646\u062c\u0627\u062f\u0644 \u0623\u064a\u0636\u064b\u0627 \u0628\u0623\u0646 \u062d\u0644\u0648\u0644 \u0627\u0644\u0628\u0627\u0626\u0639\u064a\u0646 \u0627\u0644\u0622\u062e\u0631\u064a\u0646 \u062a\u0633\u062a\u063a\u0631\u0642 \u0648\u0642\u062a\u064b\u0627 \u0648\u062c\u0647\u062f\u064b\u0627 \u0623\u0643\u0628\u0631 \u0639\u0644\u0649 \u0627\u0644\u0645\u062f\u0649 \u0627\u0644\u0637\u0648\u064a\u0644\u060c \u062d\u064a\u062b \u062a\u0624\u062f\u064a \u0627\u0644\u062d\u0644\u0648\u0644 \"\u0627\u0644\u0623\u0633\u0631\u0639\" \u0625\u0644\u0649 \u0633\u0637\u062d \u0647\u062c\u0648\u0645 \u0623\u0643\u0628\u0631 \u0628\u0643\u062b\u064a\u0631 \u0645\u0639 \u0632\u064a\u0627\u062f\u0629 \u0627\u0644\u0646\u0641\u0642\u0627\u062a \u0627\u0644\u0639\u0627\u0645\u0629.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.rsa.com\/ar\/products-and-solutions\/expanded-rsa-mobile-lock-capabilities-secure-mobile-devices\/\">RSA<sup>\u00ae<\/sup> \u0642\u0641\u0644 \u0627\u0644\u0647\u0627\u062a\u0641 \u0627\u0644\u0645\u062d\u0645\u0648\u0644<\/a>, \u0627\u0644\u0630\u064a \u064a\u0631\u0633\u062e \u0627\u0644\u062b\u0642\u0629 \u0641\u064a \u0627\u0644\u0623\u062c\u0647\u0632\u0629 \u063a\u064a\u0631 \u0627\u0644\u0645\u064f\u062f\u0627\u0631\u0629 \u0648\u064a\u0633\u0627\u0639\u062f \u0641\u064a \u062a\u0623\u0645\u064a\u0646 BYOD\u060c \u0643\u0645\u0627 \u0623\u0646\u0647 \u064a\u062c\u0633\u062f \u0645\u0628\u0627\u062f\u0626 Secure by Design \u0648 Secure by Default. \u0644\u0627 \u064a\u0628\u062d\u062b Mobile Lock \u0639\u0646 \u0627\u0644\u062a\u0647\u062f\u064a\u062f\u0627\u062a \u0625\u0644\u0627 \u0639\u0646\u062f\u0645\u0627 \u064a\u062d\u0627\u0648\u0644 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645\u0648\u0646 \u0627\u0644\u0645\u0635\u0627\u062f\u0642\u0629 \u0628\u0627\u0633\u062a\u062e\u062f\u0627\u0645 RSA Authenticator \u0644\u0646\u0638\u0627\u0645\u064a iOS \u0648Android\u060c \u0648\u0644\u0627 \u064a\u0642\u064a\u062f \u0627\u0644\u0645\u0635\u0627\u062f\u0642\u0629 \u0625\u0644\u0627 \u0639\u0646\u062f\u0645\u0627 \u064a\u0643\u062a\u0634\u0641 \u0648\u062c\u0648\u062f \u062a\u0647\u062f\u064a\u062f. \u0643\u0645\u0627 \u0623\u0646\u0647 \u0644\u0627 \u064a\u0633\u062a\u0639\u0644\u0645 \u0625\u0644\u0627 \u0639\u0646 \u0627\u0644\u062d\u062f \u0627\u0644\u0623\u062f\u0646\u0649 \u0627\u0644\u0645\u0637\u0644\u0642 \u0645\u0646 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u0644\u0623\u062f\u0627\u0621 \u0648\u0638\u0627\u0626\u0641\u0647\u060c \u0648\u0644\u0627 \u064a\u0637\u0644\u0639 \u0634\u0631\u064a\u0643\u0646\u0627 Zimperium \u0639\u0644\u0649 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0627\u0644\u0634\u062e\u0635\u064a\u0629 \u0639\u0646 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645\u064a\u0646 \u0627\u0644\u0646\u0647\u0627\u0626\u064a\u064a\u0646. \u0625\u0646 \u0627\u0644\u0645\u0643\u0627\u0633\u0628 \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \u0645\u0646 \u0627\u0644\u0642\u064a\u0627\u0645 \u0628\u0623\u064a \u0634\u064a\u0621 \u0623\u0643\u062b\u0631 \u0645\u0646 \u0630\u0644\u0643 - \u0645\u062b\u0644 \u0627\u0644\u0641\u062d\u0635 \u0627\u0644\u0645\u0633\u062a\u0645\u0631 \u0644\u062c\u0647\u0627\u0632 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645 - \u0633\u062a\u0643\u0648\u0646 \u0636\u0626\u064a\u0644\u0629\u060c \u062e\u0627\u0635\u0629\u064b \u0628\u0627\u0644\u0645\u0642\u0627\u0631\u0646\u0629 \u0645\u0639 \u0625\u0645\u0643\u0627\u0646\u064a\u0629 \u0627\u0633\u062a\u0647\u062f\u0627\u0641 \u0627\u0644\u0645\u0647\u0627\u062c\u0645 \u0644\u062e\u062f\u0645\u0629 \u062e\u0644\u0641\u064a\u0629 \u062f\u0627\u0626\u0645\u0629 \u0627\u0644\u062a\u0634\u063a\u064a\u0644.<\/p>\n<p>&nbsp;<\/p>\n<p>\u0627\u0644\u0623\u0645\u0631 \u0646\u0641\u0633\u0647 \u0645\u0639 \u0648\u0643\u064a\u0644 \u0627\u0644\u0645\u0635\u0627\u062f\u0642\u0629 \u0645\u062a\u0639\u062f\u062f\u0629 \u0627\u0644\u0639\u0648\u0627\u0645\u0644 (MFA) \u0627\u0644\u062e\u0627\u0635 \u0628\u0646\u0627. \u0641\u064a \u062d\u0627\u0644\u0629 \u0627\u0646\u0642\u0637\u0627\u0639 \u0627\u0644\u0625\u0646\u062a\u0631\u0646\u062a\u060c \u064a\u0641\u0634\u0644 \u0648\u0643\u064a\u0644 \u0627\u0644\u0645\u0635\u0627\u062f\u0642\u0629 \u0645\u062a\u0639\u062f\u062f\u0629 \u0627\u0644\u0639\u0648\u0627\u0645\u0644 (MFA) \u0627\u0644\u062e\u0627\u0635 \u0628\u0646\u0627 \u0641\u064a \u0627\u0644\u0646\u0634\u0631 \u0627\u0644\u0645\u062d\u0644\u064a \u0628\u062f\u0644\u0627\u064b \u0645\u0646 \u0627\u0644\u0641\u0634\u0644 \u0641\u064a \u0641\u062a\u062d\u0647 \u0623\u0648 \u0627\u0644\u0627\u0646\u062a\u0642\u0627\u0644 \u0625\u0644\u0649 \u0648\u0636\u0639 \u0639\u062f\u0645 \u0627\u0644\u0627\u062a\u0635\u0627\u0644 \u0628\u0627\u0644\u0625\u0646\u062a\u0631\u0646\u062a \u062d\u064a\u062b \u064a\u062a\u0645 \u0627\u0644\u062a\u062d\u0642\u0642 \u0645\u0646 \u0635\u062d\u0629 \u0643\u0644\u0645\u0629 \u0645\u0631\u0648\u0631 \u0644\u0645\u0631\u0629 \u0648\u0627\u062d\u062f\u0629 \u0641\u064a \u0648\u0643\u064a\u0644 \u0627\u0644\u0645\u0635\u0627\u062f\u0642\u0629 \u0645\u062a\u0639\u062f\u062f\u0629 \u0627\u0644\u0639\u0648\u0627\u0645\u0644 \u0646\u0641\u0633\u0647. \u0645\u0627 \u064a\u0639\u0646\u064a\u0647 \u0630\u0644\u0643 \u0647\u0648 \u0623\u0646 \u0627\u0644\u062c\u0647\u0627\u062a \u0627\u0644\u0641\u0627\u0639\u0644\u0629 \u0641\u064a \u0645\u062c\u0627\u0644 \u0627\u0644\u062a\u0647\u062f\u064a\u062f \u0644\u0627 \u064a\u0645\u0643\u0646\u0647\u0627 <a href=\"https:\/\/webinars.securid.com\/RSA\/Anatomy-of-the-Attack-The-Rise-Fall-of-MFA\">\u0627\u0644\u062a\u0647\u0631\u0628 \u0645\u0646 \u0648\u0632\u0627\u0631\u0629 \u0627\u0644\u062e\u0627\u0631\u062c\u064a\u0629<\/a> \u0641\u0642\u0637 \u0639\u0646 \u0637\u0631\u064a\u0642 \u0642\u0637\u0639 \u0627\u0644\u0627\u062a\u0635\u0627\u0644 \u0628\u0627\u0644\u0625\u0646\u062a\u0631\u0646\u062a \u0623\u0648 \u062c\u0639\u0644 \u062e\u062f\u0645\u0629 \u0627\u0644\u0648\u0627\u062c\u0647\u0629 \u0627\u0644\u062e\u0644\u0641\u064a\u0629 \u0644 MFA \u062a\u0628\u062f\u0648 \u0648\u0643\u0623\u0646\u0647\u0627 \u063a\u064a\u0631 \u0645\u062a\u0635\u0644\u0629 \u0628\u0627\u0644\u0625\u0646\u062a\u0631\u0646\u062a\u060c \u0648\u0647\u0648 \u0645\u0627 \u0641\u0639\u0644\u062a\u0647 \u0627\u0644\u062c\u0647\u0627\u062a \u0627\u0644\u062a\u064a \u062a\u0631\u0639\u0627\u0647\u0627 \u0627\u0644\u062f\u0648\u0644\u0629 \u0641\u064a <a href=\"https:\/\/www.rsa.com\/ar\/multi-factor-authentication\/securing-the-identity-lifecycle-part-1-enrolling-mfa\/\">\u0627\u0644\u0645\u0646\u0638\u0645\u0627\u062a \u063a\u064a\u0631 \u0627\u0644\u062d\u0643\u0648\u0645\u064a\u0629<\/a> \u0627\u0644\u0639\u0627\u0645 \u0627\u0644\u0645\u0627\u0636\u064a<\/p>\n<p>&nbsp;<\/p>\n<p><strong>\u062d\u0633\u0651\u0646 \u0627\u062d\u062a\u0645\u0627\u0644\u0627\u062a\u0643 \u0645\u0646 \u062e\u0644\u0627\u0644 \u0627\u0644\u0645\u0631\u0627\u0647\u0646\u0629 \u0639\u0644\u0649 \u0627\u0644\u0623\u0645\u0627\u0646 <\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>\u0644\u0627 \u064a\u062a\u0645 \u0627\u0644\u0625\u0641\u0631\u0627\u0637 \u0641\u064a \u0647\u0646\u062f\u0633\u0629 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u062d\u0642\u064a\u0642\u064a \u0623\u0628\u062f\u064b\u0627: \u0641\u0647\u0648 \u064a\u0639\u062a\u0645\u062f \u0639\u0644\u0649 \u0645\u0632\u064a\u062c \u0645\u0639\u0642\u0648\u0644 \u0645\u0646 \u0627\u0644\u062d\u0644\u0648\u0644 \u0627\u0644\u0628\u0633\u064a\u0637\u0629 \u0643\u0644\u0645\u0627 \u0623\u0645\u0643\u0646\u060c \u0648\u0627\u0644\u062d\u0644\u0648\u0644 \u0627\u0644\u0623\u0643\u062b\u0631 \u062a\u0639\u0642\u064a\u062f\u064b\u0627 \u0639\u0646\u062f \u0627\u0644\u062d\u0627\u062c\u0629. \u064a\u062c\u0628 \u062a\u0635\u0645\u064a\u0645 \u0643\u0644 \u0645\u0643\u0648\u0646 \u0645\u0646 \u0645\u0643\u0648\u0646\u0627\u062a \u0627\u0644\u062e\u062f\u0645\u0629 \u0644\u0644\u062d\u062f \u0645\u0646 \u0633\u0637\u062d \u0627\u0644\u0647\u062c\u0648\u0645 \u0643\u0644\u0645\u0627 \u0623\u0645\u0643\u0646 \u0630\u0644\u0643. \u0648\u0647\u0630\u0627 \u064a\u0639\u0646\u064a \u062c\u0645\u0639 \u0627\u0644\u062d\u062f \u0627\u0644\u0623\u062f\u0646\u0649 \u0641\u0642\u0637 \u0645\u0646 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0627\u0644\u062a\u064a \u064a\u062d\u062a\u0627\u062c\u0647\u0627 \u0627\u0644\u0646\u0638\u0627\u0645 \u0628\u0634\u0643\u0644 \u0645\u0637\u0644\u0642 \u0648\u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u062a\u0644\u0643 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0641\u0642\u0637 \u0639\u0646\u062f \u0627\u0644\u062d\u0627\u062c\u0629 \u0625\u0644\u064a\u0647\u0627. \u0643\u0645\u0627 \u064a\u0639\u0646\u064a \u0630\u0644\u0643 \u0623\u064a\u0636\u064b\u0627 \u0627\u062a\u062e\u0627\u0630 \u0642\u0631\u0627\u0631\u0627\u062a \u0645\u0639\u0645\u0627\u0631\u064a\u0629 \u062a\u0642\u0644\u0644 \u0645\u0646 \u0633\u0637\u062d \u0627\u0644\u0647\u062c\u0648\u0645 \u0628\u062f\u0644\u0627\u064b \u0645\u0646 \u062a\u0648\u0633\u064a\u0639\u0647 \u062f\u0648\u0646 \u062f\u0627\u0639\u064d.<\/p>\n<p>&nbsp;<\/p>\n<p>\u064a\u0645\u064a\u0644 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \u0625\u0644\u0649 \u0627\u0644\u0645\u0631\u0627\u0647\u0646\u0629 \u0639\u0644\u0649 \u0627\u0644\u0627\u062d\u062a\u0645\u0627\u0644\u0627\u062a. \u0642\u0645 \u0628\u062a\u062d\u0633\u064a\u0646 \u0623\u062f\u0627\u0621\u0643 \u0645\u0646 \u062e\u0644\u0627\u0644 \u0627\u0644\u0644\u0639\u0628 \u0628\u0630\u0643\u0627\u0621 \u0648\u0627\u0644\u0645\u0631\u0627\u0647\u0646\u0629 \u0639\u0644\u0649 \u0627\u0644\u0628\u0627\u0626\u0639\u064a\u0646 \u0627\u0644\u0630\u064a\u0646 \u064a\u0636\u0639\u0648\u0646 \u0627\u0644\u0623\u0645\u0646 \u0641\u064a \u0627\u0644\u0645\u0642\u0627\u0645 \u0627\u0644\u0623\u0648\u0644.<\/p>","protected":false},"excerpt":{"rendered":"<p>\u0641\u064a \u0643\u062b\u064a\u0631 \u0645\u0646 \u0627\u0644\u0623\u062d\u064a\u0627\u0646\u060c \u064a\u0643\u0648\u0646 \u0631\u062f \u0627\u0644\u0641\u0639\u0644 \u0627\u0644\u0641\u0648\u0631\u064a \u0639\u0644\u0649 \u0627\u0644\u062d\u0648\u0627\u062f\u062b \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \u0645\u062b\u0644 \u0647\u062c\u0645\u0627\u062a \u0627\u0644\u0641\u062f\u064a\u0629 \u0627\u0644\u062e\u0628\u064a\u062b\u0629 \u0627\u0644\u062a\u064a \u0636\u0631\u0628\u062a \u0643\u0627\u0632\u064a\u0646\u0648\u0647\u0627\u062a \u0644\u0627\u0633 \u0641\u064a\u063a\u0627\u0633 \u0641\u064a \u0648\u0642\u062a \u0633\u0627\u0628\u0642 \u0645\u0646 \u0647\u0630\u0627 \u0627\u0644\u062e\u0631\u064a\u0641 \u0647\u0648 \u0627\u0644\u0628\u062d\u062b \u0639\u0646 \u0627\u0644\u0633\u0628\u0628. \u0623\u062a\u0641\u0647\u0645 \u0647\u0630\u0627 \u0627\u0644\u0627\u0646\u062f\u0641\u0627\u0639. \u0641\u062a\u0623\u062b\u064a\u0631 \u0627\u0644\u0647\u062c\u0645\u0627\u062a - \u0627\u0644\u0636\u064a\u0648\u0641 \u0627\u0644\u0630\u064a\u0646 \u0627\u0636\u0637\u0631\u0648\u0627 \u0625\u0644\u0649 \u062a\u0633\u062c\u064a\u0644 \u0627\u0644\u0645\u063a\u0627\u062f\u0631\u0629 \u0628\u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u0627\u0644\u0642\u0644\u0645 \u0648\u0627\u0644\u0648\u0631\u0642\u0629\u060c \u0648\u062e\u0633\u0627\u0626\u0631 \u062a\u0635\u0644 \u0625\u0644\u0649 $100 \u0645\u0644\u064a\u0648\u0646 \u062f\u0648\u0644\u0627\u0631 \u0644\u0636\u062d\u064a\u0629 \u0648\u0627\u062d\u062f\u0629 - \u064a\u062f\u0644 \u0639\u0644\u0649 ... <a href=\"https:\/\/www.rsa.com\/ar\/resources\/blog\/zero-trust\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\/\">\u062a\u0627\u0628\u0639<\/a><\/p>","protected":false},"author":6,"featured_media":27090,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"categories":[63],"tags":[],"class_list":["post-27082","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zero-trust"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Casino Data Breaches Reveal Why Secure By Design is the Safe Bet - RSA<\/title>\n<meta name=\"description\" content=\"The data breaches that launched ransomware attacks on Las Vegas casinos reveal why Secure by Design is essential to cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/ar\/resources\/blog\/zero-trust\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\/\" \/>\n<meta property=\"og:locale\" content=\"ar_AR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Casino Data Breaches Reveal Why Secure By Design is the Safe Bet | RSA Blog\" \/>\n<meta property=\"og:description\" content=\"The data breaches that launched ransomware attacks on Las Vegas casinos reveal why Secure by Design is essential to cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/ar\/resources\/blog\/zero-trust\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-07T11:00:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-07T21:05:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet-rsa-social.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Ben Lebeaux\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Casino Data Breaches Reveal Why Secure By Design is the Safe Bet | RSA Blog\" \/>\n<meta name=\"twitter:description\" content=\"The data breaches that launched ransomware attacks on Las Vegas casinos reveal why Secure by Design is essential to cybersecurity.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet-rsa-social.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@bcomroe@logical-inc.com\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr_ca\\\/resources\\\/blog\\\/zero-trust\\\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr_ca\\\/resources\\\/blog\\\/zero-trust\\\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\\\/\"},\"author\":{\"name\":\"Ben Lebeaux\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/597f5b8f2d9eb8876c9be212f4dcdce9\"},\"headline\":\"Casino Data Breaches Reveal Why Secure By Design is the Safe Bet\",\"datePublished\":\"2023-11-07T11:00:29+00:00\",\"dateModified\":\"2023-11-07T21:05:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr_ca\\\/resources\\\/blog\\\/zero-trust\\\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\\\/\"},\"wordCount\":1196,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr_ca\\\/resources\\\/blog\\\/zero-trust\\\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet-rsa-blog.webp\",\"articleSection\":[\"Zero Trust\"],\"inLanguage\":\"ar\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr_ca\\\/resources\\\/blog\\\/zero-trust\\\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/fr_ca\\\/resources\\\/blog\\\/zero-trust\\\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\\\/\",\"name\":\"Casino Data Breaches Reveal Why Secure By Design is the Safe Bet - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr_ca\\\/resources\\\/blog\\\/zero-trust\\\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr_ca\\\/resources\\\/blog\\\/zero-trust\\\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet-rsa-blog.webp\",\"datePublished\":\"2023-11-07T11:00:29+00:00\",\"dateModified\":\"2023-11-07T21:05:56+00:00\",\"description\":\"The data breaches that launched ransomware attacks on Las Vegas casinos reveal why Secure by Design is essential to cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr_ca\\\/resources\\\/blog\\\/zero-trust\\\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\\\/#breadcrumb\"},\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/fr_ca\\\/resources\\\/blog\\\/zero-trust\\\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr_ca\\\/resources\\\/blog\\\/zero-trust\\\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet-rsa-blog.webp\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet-rsa-blog.webp\",\"width\":1200,\"height\":741,\"caption\":\"Casino Data Breaches Reveal Why Secure By Design is the Safe Bet\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr_ca\\\/resources\\\/blog\\\/zero-trust\\\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Casino Data Breaches Reveal Why Secure By Design is the Safe Bet\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ar\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/597f5b8f2d9eb8876c9be212f4dcdce9\",\"name\":\"Ben Lebeaux\",\"sameAs\":[\"https:\\\/\\\/x.com\\\/bcomroe@logical-inc.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u062e\u0631\u0648\u0642\u0627\u062a \u0628\u064a\u0627\u0646\u0627\u062a \u0627\u0644\u0643\u0627\u0632\u064a\u0646\u0648\u0647\u0627\u062a \u062a\u0643\u0634\u0641 \u0644\u0645\u0627\u0630\u0627 \u064a\u0639\u062a\u0628\u0631 \u0627\u0644\u062a\u0623\u0645\u064a\u0646 \u062d\u0633\u0628 \u0627\u0644\u062a\u0635\u0645\u064a\u0645 \u0647\u0648 \u0627\u0644\u0631\u0647\u0627\u0646 \u0627\u0644\u0622\u0645\u0646 - RSA","description":"\u062a\u0643\u0634\u0641 \u062e\u0631\u0648\u0642\u0627\u062a \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u0627\u0644\u062a\u064a \u0623\u0637\u0644\u0642\u062a \u0647\u062c\u0645\u0627\u062a \u0628\u0631\u0627\u0645\u062c \u0627\u0644\u0641\u062f\u064a\u0629 \u0627\u0644\u062e\u0628\u064a\u062b\u0629 \u0639\u0644\u0649 \u0643\u0627\u0632\u064a\u0646\u0648\u0647\u0627\u062a \u0644\u0627\u0633 \u0641\u064a\u063a\u0627\u0633 \u0639\u0646 \u0623\u0647\u0645\u064a\u0629 \u0627\u0644\u062a\u0623\u0645\u064a\u0646 \u062d\u0633\u0628 \u0627\u0644\u062a\u0635\u0645\u064a\u0645 \u0641\u064a \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/ar\/resources\/blog\/zero-trust\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\/","og_locale":"ar_AR","og_type":"article","og_title":"Casino Data Breaches Reveal Why Secure By Design is the Safe Bet | RSA Blog","og_description":"The data breaches that launched ransomware attacks on Las Vegas casinos reveal why Secure by Design is essential to cybersecurity.","og_url":"https:\/\/www.rsa.com\/ar\/resources\/blog\/zero-trust\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\/","og_site_name":"RSA","article_published_time":"2023-11-07T11:00:29+00:00","article_modified_time":"2023-11-07T21:05:56+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet-rsa-social.webp","type":"image\/webp"}],"author":"Ben Lebeaux","twitter_card":"summary_large_image","twitter_title":"Casino Data Breaches Reveal Why Secure By Design is the Safe Bet | RSA Blog","twitter_description":"The data breaches that launched ransomware attacks on Las Vegas casinos reveal why Secure by Design is essential to cybersecurity.","twitter_image":"https:\/\/www.rsa.com\/wp-content\/uploads\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet-rsa-social.webp","twitter_creator":"@bcomroe@logical-inc.com","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\/#article","isPartOf":{"@id":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\/"},"author":{"name":"Ben Lebeaux","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/597f5b8f2d9eb8876c9be212f4dcdce9"},"headline":"Casino Data Breaches Reveal Why Secure By Design is the Safe Bet","datePublished":"2023-11-07T11:00:29+00:00","dateModified":"2023-11-07T21:05:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\/"},"wordCount":1196,"publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"image":{"@id":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet-rsa-blog.webp","articleSection":["Zero Trust"],"inLanguage":"ar"},{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\/","url":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\/","name":"\u062e\u0631\u0648\u0642\u0627\u062a \u0628\u064a\u0627\u0646\u0627\u062a \u0627\u0644\u0643\u0627\u0632\u064a\u0646\u0648\u0647\u0627\u062a \u062a\u0643\u0634\u0641 \u0644\u0645\u0627\u0630\u0627 \u064a\u0639\u062a\u0628\u0631 \u0627\u0644\u062a\u0623\u0645\u064a\u0646 \u062d\u0633\u0628 \u0627\u0644\u062a\u0635\u0645\u064a\u0645 \u0647\u0648 \u0627\u0644\u0631\u0647\u0627\u0646 \u0627\u0644\u0622\u0645\u0646 - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet-rsa-blog.webp","datePublished":"2023-11-07T11:00:29+00:00","dateModified":"2023-11-07T21:05:56+00:00","description":"\u062a\u0643\u0634\u0641 \u062e\u0631\u0648\u0642\u0627\u062a \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u0627\u0644\u062a\u064a \u0623\u0637\u0644\u0642\u062a \u0647\u062c\u0645\u0627\u062a \u0628\u0631\u0627\u0645\u062c \u0627\u0644\u0641\u062f\u064a\u0629 \u0627\u0644\u062e\u0628\u064a\u062b\u0629 \u0639\u0644\u0649 \u0643\u0627\u0632\u064a\u0646\u0648\u0647\u0627\u062a \u0644\u0627\u0633 \u0641\u064a\u063a\u0627\u0633 \u0639\u0646 \u0623\u0647\u0645\u064a\u0629 \u0627\u0644\u062a\u0623\u0645\u064a\u0646 \u062d\u0633\u0628 \u0627\u0644\u062a\u0635\u0645\u064a\u0645 \u0641\u064a \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\/#breadcrumb"},"inLanguage":"ar","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\/"]}]},{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet-rsa-blog.webp","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet-rsa-blog.webp","width":1200,"height":741,"caption":"Casino Data Breaches Reveal Why Secure By Design is the Safe Bet"},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/"},{"@type":"ListItem","position":2,"name":"Casino Data Breaches Reveal Why Secure By Design is the Safe Bet"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"\u062d\u0644\u0648\u0644 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \u0648\u0625\u062f\u0627\u0631\u0629 \u0627\u0644\u0645\u062e\u0627\u0637\u0631 \u0627\u0644\u0631\u0642\u0645\u064a\u0629","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ar"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/597f5b8f2d9eb8876c9be212f4dcdce9","name":"\u0628\u0646 \u0644\u064a\u0628\u0648","sameAs":["https:\/\/x.com\/bcomroe@logical-inc.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/posts\/27082","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/comments?post=27082"}],"version-history":[{"count":11,"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/posts\/27082\/revisions"}],"predecessor-version":[{"id":27150,"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/posts\/27082\/revisions\/27150"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/media\/27090"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/media?parent=27082"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/categories?post=27082"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rsa.com\/ar\/wp-json\/wp\/v2\/tags?post=27082"}],"curies":[{"name":"\u062f\u0628\u0644\u064a\u0648 \u0628\u064a","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}