{"id":2092,"date":"2022-01-20T16:34:08","date_gmt":"2022-01-21T00:34:08","guid":{"rendered":"https:\/\/live-rsa-hub.pantheonsite.io\/?p=2092"},"modified":"2023-11-07T16:23:29","modified_gmt":"2023-11-07T21:23:29","slug":"how-identity-trends-define-cybersecurity-2022","status":"publish","type":"post","link":"https:\/\/www.rsa.com\/de\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/","title":{"rendered":"Wie Identit\u00e4ts-Trends die Cybersicherheit im Jahr 2022 bestimmen werden"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>Im Jahr 2022 wird die Cybersicherheit von mehreren wichtigen Trends gepr\u00e4gt sein, darunter die anhaltende Notwendigkeit, hybrides Arbeiten und die Cloud zu sichern, sowie neue Technologien, die entwickelt wurden, um der wachsenden Nachfrage von Anwendern und Verbrauchern nach bequemer Authentifizierung gerecht zu werden. Was ist das gemeinsame Merkmal all dieser unterschiedlichen Themen? Identit\u00e4t. <\/p>","protected":false},"author":2,"featured_media":2093,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"categories":[63],"tags":[],"class_list":["post-2092","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zero-trust"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Identity Trends Will Define Cybersecurity in 2022 - RSA<\/title>\n<meta name=\"description\" content=\"Permanent remote and hybrid work and an increasing reliance on cloud and mobile are among the trends making identity central to cybersecurity in 2022.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/de\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Identity Trends Will Define Cybersecurity in 2022\" \/>\n<meta property=\"og:description\" content=\"Permanent remote and hybrid work and an increasing reliance on cloud and mobile are among the trends making identity central to cybersecurity in 2022.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/de\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-21T00:34:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-07T21:23:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Melinda O&#039;Connor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"How Identity Trends Will Define Cybersecurity in 2022\" \/>\n<meta name=\"twitter:description\" content=\"Permanent remote and hybrid work and an increasing reliance on cloud and mobile are among the trends making identity central to cybersecurity in 2022.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/\"},\"author\":{\"name\":\"Melinda O'Connor\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\"},\"headline\":\"How Identity Trends Will Define Cybersecurity in 2022\",\"datePublished\":\"2022-01-21T00:34:08+00:00\",\"dateModified\":\"2023-11-07T21:23:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/\"},\"wordCount\":7,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/how-Identity-Trends-Will-Define-Cybersecurity-in-2022.jpg\",\"articleSection\":[\"Zero Trust\"],\"inLanguage\":\"de-DE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/\",\"name\":\"How Identity Trends Will Define Cybersecurity in 2022 - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/how-Identity-Trends-Will-Define-Cybersecurity-in-2022.jpg\",\"datePublished\":\"2022-01-21T00:34:08+00:00\",\"dateModified\":\"2023-11-07T21:23:29+00:00\",\"description\":\"Permanent remote and hybrid work and an increasing reliance on cloud and mobile are among the trends making identity central to cybersecurity in 2022.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/how-Identity-Trends-Will-Define-Cybersecurity-in-2022.jpg\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/how-Identity-Trends-Will-Define-Cybersecurity-in-2022.jpg\",\"width\":950,\"height\":497},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Identity Trends Will Define Cybersecurity in 2022\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\",\"name\":\"Melinda O'Connor\",\"sameAs\":[\"http:\\\/\\\/logical-inc.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Wie Identit\u00e4ts-Trends die Cybersicherheit im Jahr 2022 bestimmen werden - RSA","description":"St\u00e4ndige Fernarbeit und hybride Arbeitsformen sowie die zunehmende Nutzung von Cloud und Mobilger\u00e4ten geh\u00f6ren zu den Trends, die die Identit\u00e4t im Jahr 2022 in den Mittelpunkt der Cybersicherheit stellen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/de\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/","og_locale":"de_DE","og_type":"article","og_title":"How Identity Trends Will Define Cybersecurity in 2022","og_description":"Permanent remote and hybrid work and an increasing reliance on cloud and mobile are among the trends making identity central to cybersecurity in 2022.","og_url":"https:\/\/www.rsa.com\/de\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/","og_site_name":"RSA","article_published_time":"2022-01-21T00:34:08+00:00","article_modified_time":"2023-11-07T21:23:29+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","type":"image\/jpeg"}],"author":"Melinda O'Connor","twitter_card":"summary_large_image","twitter_title":"How Identity Trends Will Define Cybersecurity in 2022","twitter_description":"Permanent remote and hybrid work and an increasing reliance on cloud and mobile are among the trends making identity central to cybersecurity in 2022.","twitter_image":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/#article","isPartOf":{"@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/"},"author":{"name":"Melinda O'Connor","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0"},"headline":"How Identity Trends Will Define Cybersecurity in 2022","datePublished":"2022-01-21T00:34:08+00:00","dateModified":"2023-11-07T21:23:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/"},"wordCount":7,"publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"image":{"@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/how-Identity-Trends-Will-Define-Cybersecurity-in-2022.jpg","articleSection":["Zero Trust"],"inLanguage":"de-DE"},{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/","url":"https:\/\/www.rsa.com\/de\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/","name":"Wie Identit\u00e4ts-Trends die Cybersicherheit im Jahr 2022 bestimmen werden - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/how-Identity-Trends-Will-Define-Cybersecurity-in-2022.jpg","datePublished":"2022-01-21T00:34:08+00:00","dateModified":"2023-11-07T21:23:29+00:00","description":"St\u00e4ndige Fernarbeit und hybride Arbeitsformen sowie die zunehmende Nutzung von Cloud und Mobilger\u00e4ten geh\u00f6ren zu den Trends, die die Identit\u00e4t im Jahr 2022 in den Mittelpunkt der Cybersicherheit stellen.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/de\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/how-Identity-Trends-Will-Define-Cybersecurity-in-2022.jpg","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/how-Identity-Trends-Will-Define-Cybersecurity-in-2022.jpg","width":950,"height":497},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/de\/"},{"@type":"ListItem","position":2,"name":"How Identity Trends Will Define Cybersecurity in 2022"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"L\u00f6sungen f\u00fcr Cybersecurity und digitales Risikomanagement","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0","name":"Melinda O'Connor","sameAs":["http:\/\/logical-inc.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/posts\/2092","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/comments?post=2092"}],"version-history":[{"count":4,"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/posts\/2092\/revisions"}],"predecessor-version":[{"id":27151,"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/posts\/2092\/revisions\/27151"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/media\/2093"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/media?parent=2092"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/categories?post=2092"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/tags?post=2092"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}