{"id":2092,"date":"2022-01-20T16:34:08","date_gmt":"2022-01-21T00:34:08","guid":{"rendered":"https:\/\/live-rsa-hub.pantheonsite.io\/?p=2092"},"modified":"2023-11-07T16:23:29","modified_gmt":"2023-11-07T21:23:29","slug":"how-identity-trends-define-cybersecurity-2022","status":"publish","type":"post","link":"https:\/\/www.rsa.com\/ko\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/","title":{"rendered":"2022\ub144 ID \ud2b8\ub80c\ub4dc\uac00 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc744 \uc815\uc758\ud558\ub294 \ubc29\ubc95"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>2022\ub144 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc740 \ud558\uc774\ube0c\ub9ac\ub4dc \uadfc\ubb34 \ud658\uacbd\uacfc \ud074\ub77c\uc6b0\ub4dc \ubcf4\uc548\uc744 \uc9c0\uc18d\uc801\uc73c\ub85c \uac15\ud654\ud574\uc57c \ud558\ub294 \ud544\uc694\uc131, \uadf8\ub9ac\uace0 \ud3b8\ub9ac\ud568\uc744 \ucd94\uad6c\ud558\ub294 \uc0ac\uc6a9\uc790 \ubc0f \uc18c\ube44\uc790\uc758 \uc99d\uac00\ud558\ub294 \uc778\uc99d \uc218\uc694\ub97c \ucda9\uc871\uc2dc\ud0a4\uae30 \uc704\ud574 \uc124\uacc4\ub41c \uc2e0\uae30\uc220 \ub4f1 \uba87 \uac00\uc9c0 \uc8fc\uc694 \ud2b8\ub80c\ub4dc\ub85c \uc815\uc758\ub420 \uac83\uc785\ub2c8\ub2e4. \uc774 \ubaa8\ub4e0 \uc11c\ub85c \ub2e4\ub978 \ud750\ub984\ub4e4\uc774 \uacf5\uc720\ud558\ub294 \ud558\ub098\uc758 \uacf5\ud1b5\ub41c \uc18d\uc131\uc740 \ubb34\uc5c7\uc77c\uae4c\uc694? \ubc14\ub85c \uc2e0\uc6d0(Identity)\uc785\ub2c8\ub2e4. <\/p>","protected":false},"author":2,"featured_media":2093,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"categories":[63],"tags":[],"class_list":["post-2092","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zero-trust"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Identity Trends Will Define Cybersecurity in 2022 - RSA<\/title>\n<meta name=\"description\" content=\"Permanent remote and hybrid work and an increasing reliance on cloud and mobile are among the trends making identity central to cybersecurity in 2022.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/ko\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Identity Trends Will Define Cybersecurity in 2022\" \/>\n<meta property=\"og:description\" content=\"Permanent remote and hybrid work and an increasing reliance on cloud and mobile are among the trends making identity central to cybersecurity in 2022.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/ko\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-21T00:34:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-07T21:23:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Melinda O&#039;Connor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"How Identity Trends Will Define Cybersecurity in 2022\" \/>\n<meta name=\"twitter:description\" content=\"Permanent remote and hybrid work and an increasing reliance on cloud and mobile are among the trends making identity central to cybersecurity in 2022.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/\"},\"author\":{\"name\":\"Melinda O'Connor\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\"},\"headline\":\"How Identity Trends Will Define Cybersecurity in 2022\",\"datePublished\":\"2022-01-21T00:34:08+00:00\",\"dateModified\":\"2023-11-07T21:23:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/\"},\"wordCount\":7,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/how-Identity-Trends-Will-Define-Cybersecurity-in-2022.jpg\",\"articleSection\":[\"Zero Trust\"],\"inLanguage\":\"ko-KR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/\",\"name\":\"How Identity Trends Will Define Cybersecurity in 2022 - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/how-Identity-Trends-Will-Define-Cybersecurity-in-2022.jpg\",\"datePublished\":\"2022-01-21T00:34:08+00:00\",\"dateModified\":\"2023-11-07T21:23:29+00:00\",\"description\":\"Permanent remote and hybrid work and an increasing reliance on cloud and mobile are among the trends making identity central to cybersecurity in 2022.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/how-Identity-Trends-Will-Define-Cybersecurity-in-2022.jpg\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/how-Identity-Trends-Will-Define-Cybersecurity-in-2022.jpg\",\"width\":950,\"height\":497},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/how-identity-trends-define-cybersecurity-2022\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Identity Trends Will Define Cybersecurity in 2022\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\",\"name\":\"Melinda O'Connor\",\"sameAs\":[\"http:\\\/\\\/logical-inc.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2022\ub144 \uc2e0\uc6d0 \ud2b8\ub80c\ub4dc\uac00 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc744 \uc815\uc758\ud558\ub294 \ubc29\ubc95 - RSA","description":"\uc601\uad6c\uc801\uc778 \uc6d0\uaca9 \ubc0f \ud558\uc774\ube0c\ub9ac\ub4dc \uadfc\ubb34\uc640 \ud074\ub77c\uc6b0\ub4dc \ubc0f \ubaa8\ubc14\uc77c\uc5d0 \ub300\ud55c \uc758\uc874\ub3c4 \uc99d\uac00\ub294 2022\ub144 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc758 \uc911\uc2ec\uc774 \ub418\ub294 \ud2b8\ub80c\ub4dc \uc911 \ud558\ub098\uc785\ub2c8\ub2e4.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/ko\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/","og_locale":"ko_KR","og_type":"article","og_title":"How Identity Trends Will Define Cybersecurity in 2022","og_description":"Permanent remote and hybrid work and an increasing reliance on cloud and mobile are among the trends making identity central to cybersecurity in 2022.","og_url":"https:\/\/www.rsa.com\/ko\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/","og_site_name":"RSA","article_published_time":"2022-01-21T00:34:08+00:00","article_modified_time":"2023-11-07T21:23:29+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","type":"image\/jpeg"}],"author":"Melinda O'Connor","twitter_card":"summary_large_image","twitter_title":"How Identity Trends Will Define Cybersecurity in 2022","twitter_description":"Permanent remote and hybrid work and an increasing reliance on cloud and mobile are among the trends making identity central to cybersecurity in 2022.","twitter_image":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/#article","isPartOf":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/"},"author":{"name":"Melinda O'Connor","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0"},"headline":"How Identity Trends Will Define Cybersecurity in 2022","datePublished":"2022-01-21T00:34:08+00:00","dateModified":"2023-11-07T21:23:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/"},"wordCount":7,"publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"image":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/how-Identity-Trends-Will-Define-Cybersecurity-in-2022.jpg","articleSection":["Zero Trust"],"inLanguage":"ko-KR"},{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/","url":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/","name":"2022\ub144 \uc2e0\uc6d0 \ud2b8\ub80c\ub4dc\uac00 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc744 \uc815\uc758\ud558\ub294 \ubc29\ubc95 - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/how-Identity-Trends-Will-Define-Cybersecurity-in-2022.jpg","datePublished":"2022-01-21T00:34:08+00:00","dateModified":"2023-11-07T21:23:29+00:00","description":"\uc601\uad6c\uc801\uc778 \uc6d0\uaca9 \ubc0f \ud558\uc774\ube0c\ub9ac\ub4dc \uadfc\ubb34\uc640 \ud074\ub77c\uc6b0\ub4dc \ubc0f \ubaa8\ubc14\uc77c\uc5d0 \ub300\ud55c \uc758\uc874\ub3c4 \uc99d\uac00\ub294 2022\ub144 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc758 \uc911\uc2ec\uc774 \ub418\ub294 \ud2b8\ub80c\ub4dc \uc911 \ud558\ub098\uc785\ub2c8\ub2e4.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/how-Identity-Trends-Will-Define-Cybersecurity-in-2022.jpg","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/how-Identity-Trends-Will-Define-Cybersecurity-in-2022.jpg","width":950,"height":497},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/how-identity-trends-define-cybersecurity-2022\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/"},{"@type":"ListItem","position":2,"name":"How Identity Trends Will Define Cybersecurity in 2022"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"\uc0ac\uc774\ubc84 \ubcf4\uc548 \ubc0f \ub514\uc9c0\ud138 \ub9ac\uc2a4\ud06c \uad00\ub9ac \uc194\ub8e8\uc158","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0","name":"\uba5c\ub9b0\ub2e4 \uc624\ucf54\ub108","sameAs":["http:\/\/logical-inc.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/posts\/2092","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/comments?post=2092"}],"version-history":[{"count":4,"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/posts\/2092\/revisions"}],"predecessor-version":[{"id":27151,"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/posts\/2092\/revisions\/27151"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/media\/2093"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/media?parent=2092"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/categories?post=2092"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/tags?post=2092"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}