{"id":2092,"date":"2022-01-20T16:34:08","date_gmt":"2022-01-21T00:34:08","guid":{"rendered":"https:\/\/live-rsa-hub.pantheonsite.io\/?p=2092"},"modified":"2023-11-07T16:23:29","modified_gmt":"2023-11-07T21:23:29","slug":"how-identity-trends-define-cybersecurity-2022","status":"publish","type":"post","link":"https:\/\/www.rsa.com\/id\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/","title":{"rendered":"Bagaimana Tren Identitas Akan Menentukan Keamanan Siber pada Tahun 2022"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>Pada tahun 2022, keamanan siber akan ditentukan oleh beberapa tren utama, termasuk kebutuhan berkelanjutan untuk mengamankan pekerjaan hibrida dan cloud, dan teknologi baru yang dirancang untuk memenuhi permintaan pengguna dan konsumen yang terus meningkat akan autentikasi yang nyaman. Apa satu atribut umum yang dimiliki oleh semua benang merah yang berbeda ini? Identitas. <\/p>","protected":false},"author":2,"featured_media":2093,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"categories":[63],"tags":[],"class_list":["post-2092","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zero-trust"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Identity Trends Will Define Cybersecurity in 2022 - RSA<\/title>\n<meta name=\"description\" content=\"Permanent remote and hybrid work and an increasing reliance on cloud and mobile are among the trends making identity central to cybersecurity in 2022.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/id\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/\" \/>\n<meta property=\"og:locale\" content=\"id_ID\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Identity Trends Will Define Cybersecurity in 2022\" \/>\n<meta property=\"og:description\" content=\"Permanent remote and hybrid work and an increasing reliance on cloud and mobile are among the trends making identity central to cybersecurity in 2022.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/id\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-21T00:34:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-07T21:23:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Melinda O&#039;Connor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"How Identity Trends Will Define Cybersecurity in 2022\" \/>\n<meta name=\"twitter:description\" content=\"Permanent remote and hybrid work and an increasing reliance on cloud and mobile are among the trends making identity central to cybersecurity in 2022.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/\"},\"author\":{\"name\":\"Melinda O'Connor\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\"},\"headline\":\"How Identity Trends Will Define Cybersecurity in 2022\",\"datePublished\":\"2022-01-21T00:34:08+00:00\",\"dateModified\":\"2023-11-07T21:23:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/\"},\"wordCount\":7,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/how-Identity-Trends-Will-Define-Cybersecurity-in-2022.jpg\",\"articleSection\":[\"Zero Trust\"],\"inLanguage\":\"id-ID\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/\",\"name\":\"How Identity Trends Will Define Cybersecurity in 2022 - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/how-Identity-Trends-Will-Define-Cybersecurity-in-2022.jpg\",\"datePublished\":\"2022-01-21T00:34:08+00:00\",\"dateModified\":\"2023-11-07T21:23:29+00:00\",\"description\":\"Permanent remote and hybrid work and an increasing reliance on cloud and mobile are among the trends making identity central to cybersecurity in 2022.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/#breadcrumb\"},\"inLanguage\":\"id-ID\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"id-ID\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/how-Identity-Trends-Will-Define-Cybersecurity-in-2022.jpg\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/how-Identity-Trends-Will-Define-Cybersecurity-in-2022.jpg\",\"width\":950,\"height\":497},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Identity Trends Will Define Cybersecurity in 2022\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"id-ID\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"id-ID\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\",\"name\":\"Melinda O'Connor\",\"sameAs\":[\"http:\\\/\\\/logical-inc.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bagaimana Tren Identitas Akan Menentukan Keamanan Siber pada Tahun 2022 - RSA","description":"Pekerjaan jarak jauh dan hibrida yang permanen serta meningkatnya ketergantungan pada cloud dan seluler merupakan salah satu tren yang menjadikan identitas sebagai pusat keamanan siber pada tahun 2022.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/id\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/","og_locale":"id_ID","og_type":"article","og_title":"How Identity Trends Will Define Cybersecurity in 2022","og_description":"Permanent remote and hybrid work and an increasing reliance on cloud and mobile are among the trends making identity central to cybersecurity in 2022.","og_url":"https:\/\/www.rsa.com\/id\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/","og_site_name":"RSA","article_published_time":"2022-01-21T00:34:08+00:00","article_modified_time":"2023-11-07T21:23:29+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","type":"image\/jpeg"}],"author":"Melinda O'Connor","twitter_card":"summary_large_image","twitter_title":"How Identity Trends Will Define Cybersecurity in 2022","twitter_description":"Permanent remote and hybrid work and an increasing reliance on cloud and mobile are among the trends making identity central to cybersecurity in 2022.","twitter_image":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/#article","isPartOf":{"@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/"},"author":{"name":"Melinda O'Connor","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0"},"headline":"How Identity Trends Will Define Cybersecurity in 2022","datePublished":"2022-01-21T00:34:08+00:00","dateModified":"2023-11-07T21:23:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/"},"wordCount":7,"publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"image":{"@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/how-Identity-Trends-Will-Define-Cybersecurity-in-2022.jpg","articleSection":["Zero Trust"],"inLanguage":"id-ID"},{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/","url":"https:\/\/www.rsa.com\/id\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/","name":"Bagaimana Tren Identitas Akan Menentukan Keamanan Siber pada Tahun 2022 - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/how-Identity-Trends-Will-Define-Cybersecurity-in-2022.jpg","datePublished":"2022-01-21T00:34:08+00:00","dateModified":"2023-11-07T21:23:29+00:00","description":"Pekerjaan jarak jauh dan hibrida yang permanen serta meningkatnya ketergantungan pada cloud dan seluler merupakan salah satu tren yang menjadikan identitas sebagai pusat keamanan siber pada tahun 2022.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/#breadcrumb"},"inLanguage":"id-ID","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/id\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/"]}]},{"@type":"ImageObject","inLanguage":"id-ID","@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/how-Identity-Trends-Will-Define-Cybersecurity-in-2022.jpg","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/how-Identity-Trends-Will-Define-Cybersecurity-in-2022.jpg","width":950,"height":497},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/id\/"},{"@type":"ListItem","position":2,"name":"How Identity Trends Will Define Cybersecurity in 2022"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"Solusi Keamanan Siber dan Manajemen Risiko Digital","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"id-ID"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"id-ID","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0","name":"Melinda O'Connor","sameAs":["http:\/\/logical-inc.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/posts\/2092","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/comments?post=2092"}],"version-history":[{"count":4,"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/posts\/2092\/revisions"}],"predecessor-version":[{"id":27151,"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/posts\/2092\/revisions\/27151"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/media\/2093"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/media?parent=2092"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/categories?post=2092"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/tags?post=2092"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}