{"id":2092,"date":"2022-01-20T16:34:08","date_gmt":"2022-01-21T00:34:08","guid":{"rendered":"https:\/\/live-rsa-hub.pantheonsite.io\/?p=2092"},"modified":"2023-11-07T16:23:29","modified_gmt":"2023-11-07T21:23:29","slug":"how-identity-trends-define-cybersecurity-2022","status":"publish","type":"post","link":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/","title":{"rendered":"Comment les tendances en mati\u00e8re d'identit\u00e9 d\u00e9finiront la cybers\u00e9curit\u00e9 en 2022"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>En 2022, la cybers\u00e9curit\u00e9 sera d\u00e9finie par plusieurs tendances cl\u00e9s, notamment le besoin constant de s\u00e9curiser le travail hybride et le cloud, ainsi que les nouvelles technologies con\u00e7ues pour r\u00e9pondre \u00e0 la demande croissante des utilisateurs et des consommateurs en mati\u00e8re d'authentification pratique. Quel est le point commun entre tous ces diff\u00e9rents aspects ? L'identit\u00e9. <\/p>","protected":false},"author":2,"featured_media":2093,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"categories":[63],"tags":[],"class_list":["post-2092","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zero-trust"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Identity Trends Will Define Cybersecurity in 2022 - RSA<\/title>\n<meta name=\"description\" content=\"Permanent remote and hybrid work and an increasing reliance on cloud and mobile are among the trends making identity central to cybersecurity in 2022.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Identity Trends Will Define Cybersecurity in 2022\" \/>\n<meta property=\"og:description\" content=\"Permanent remote and hybrid work and an increasing reliance on cloud and mobile are among the trends making identity central to cybersecurity in 2022.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-21T00:34:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-07T21:23:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Melinda O&#039;Connor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"How Identity Trends Will Define Cybersecurity in 2022\" \/>\n<meta name=\"twitter:description\" content=\"Permanent remote and hybrid work and an increasing reliance on cloud and mobile are among the trends making identity central to cybersecurity in 2022.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/\"},\"author\":{\"name\":\"Melinda O'Connor\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\"},\"headline\":\"How Identity Trends Will Define Cybersecurity in 2022\",\"datePublished\":\"2022-01-21T00:34:08+00:00\",\"dateModified\":\"2023-11-07T21:23:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/\"},\"wordCount\":7,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/how-Identity-Trends-Will-Define-Cybersecurity-in-2022.jpg\",\"articleSection\":[\"Zero Trust\"],\"inLanguage\":\"fr-CA\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/\",\"name\":\"How Identity Trends Will Define Cybersecurity in 2022 - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/how-Identity-Trends-Will-Define-Cybersecurity-in-2022.jpg\",\"datePublished\":\"2022-01-21T00:34:08+00:00\",\"dateModified\":\"2023-11-07T21:23:29+00:00\",\"description\":\"Permanent remote and hybrid work and an increasing reliance on cloud and mobile are among the trends making identity central to cybersecurity in 2022.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/how-Identity-Trends-Will-Define-Cybersecurity-in-2022.jpg\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/how-Identity-Trends-Will-Define-Cybersecurity-in-2022.jpg\",\"width\":950,\"height\":497},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Identity Trends Will Define Cybersecurity in 2022\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\",\"name\":\"Melinda O'Connor\",\"sameAs\":[\"http:\\\/\\\/logical-inc.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Comment les tendances en mati\u00e8re d'identit\u00e9 d\u00e9finiront la cybers\u00e9curit\u00e9 en 2022 - RSA","description":"Le travail permanent \u00e0 distance et hybride et la d\u00e9pendance croissante \u00e0 l'\u00e9gard de l'informatique en nuage et de la t\u00e9l\u00e9phonie mobile font partie des tendances qui placent l'identit\u00e9 au c\u0153ur de la cybers\u00e9curit\u00e9 en 2022.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/","og_locale":"fr_CA","og_type":"article","og_title":"How Identity Trends Will Define Cybersecurity in 2022","og_description":"Permanent remote and hybrid work and an increasing reliance on cloud and mobile are among the trends making identity central to cybersecurity in 2022.","og_url":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/","og_site_name":"RSA","article_published_time":"2022-01-21T00:34:08+00:00","article_modified_time":"2023-11-07T21:23:29+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","type":"image\/jpeg"}],"author":"Melinda O'Connor","twitter_card":"summary_large_image","twitter_title":"How Identity Trends Will Define Cybersecurity in 2022","twitter_description":"Permanent remote and hybrid work and an increasing reliance on cloud and mobile are among the trends making identity central to cybersecurity in 2022.","twitter_image":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/#article","isPartOf":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/"},"author":{"name":"Melinda O'Connor","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0"},"headline":"How Identity Trends Will Define Cybersecurity in 2022","datePublished":"2022-01-21T00:34:08+00:00","dateModified":"2023-11-07T21:23:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/"},"wordCount":7,"publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"image":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/how-Identity-Trends-Will-Define-Cybersecurity-in-2022.jpg","articleSection":["Zero Trust"],"inLanguage":"fr-CA"},{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/","url":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/","name":"Comment les tendances en mati\u00e8re d'identit\u00e9 d\u00e9finiront la cybers\u00e9curit\u00e9 en 2022 - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/how-Identity-Trends-Will-Define-Cybersecurity-in-2022.jpg","datePublished":"2022-01-21T00:34:08+00:00","dateModified":"2023-11-07T21:23:29+00:00","description":"Le travail permanent \u00e0 distance et hybride et la d\u00e9pendance croissante \u00e0 l'\u00e9gard de l'informatique en nuage et de la t\u00e9l\u00e9phonie mobile font partie des tendances qui placent l'identit\u00e9 au c\u0153ur de la cybers\u00e9curit\u00e9 en 2022.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/"]}]},{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/how-Identity-Trends-Will-Define-Cybersecurity-in-2022.jpg","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/how-Identity-Trends-Will-Define-Cybersecurity-in-2022.jpg","width":950,"height":497},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/"},{"@type":"ListItem","position":2,"name":"How Identity Trends Will Define Cybersecurity in 2022"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"Solutions de cybers\u00e9curit\u00e9 et de gestion des risques num\u00e9riques","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0","name":"Melinda O'Connor","sameAs":["http:\/\/logical-inc.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/posts\/2092","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/comments?post=2092"}],"version-history":[{"count":4,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/posts\/2092\/revisions"}],"predecessor-version":[{"id":27151,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/posts\/2092\/revisions\/27151"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/media\/2093"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/media?parent=2092"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/categories?post=2092"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/tags?post=2092"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}