{"id":27082,"date":"2023-11-07T06:00:29","date_gmt":"2023-11-07T11:00:29","guid":{"rendered":"https:\/\/www.rsa.com\/?p=27082"},"modified":"2023-11-07T16:05:56","modified_gmt":"2023-11-07T21:05:56","slug":"casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet","status":"publish","type":"post","link":"https:\/\/www.rsa.com\/pt_br\/resources\/blog\/zero-trust\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\/","title":{"rendered":"As viola\u00e7\u00f5es de dados de cassinos revelam por que o Secure By Design \u00e9 a aposta segura"},"content":{"rendered":"<p>Na maioria das vezes, a rea\u00e7\u00e3o imediata a incidentes de seguran\u00e7a, como os ataques de ransomware que atingiram os cassinos de Las Vegas no in\u00edcio do outono, \u00e9 procurar a causa. Eu entendo esse impulso. O impacto dos ataques - os h\u00f3spedes que tiveram de fazer o check-out usando <a href=\"https:\/\/www.wsj.com\/lifestyle\/travel\/las-vegas-mgm-cyberattack-casinos-6ca43dcf\">caneta e papel<\/a>, at\u00e9 <a href=\"https:\/\/www.cnn.com\/2023\/10\/05\/business\/mgm-100-million-hit-data-breach\/index.html\">$100 milh\u00f5es<\/a> em perdas para uma \u00fanica v\u00edtima - demonstram os altos custos das falhas de seguran\u00e7a. Ningu\u00e9m quer ser a pr\u00f3xima v\u00edtima de uma viola\u00e7\u00e3o de dados.<\/p>\n<p>&nbsp;<\/p>\n<p>Mas na seguran\u00e7a cibern\u00e9tica, geralmente n\u00e3o h\u00e1 apenas uma causa. Na maioria dos incidentes de seguran\u00e7a, os invasores tiram proveito de uma cadeia de vulnerabilidades que gradualmente lhes d\u00e1 mais acesso e controle de um ambiente. N\u00e3o \u00e9 produtivo procurar causa e efeito quando geralmente n\u00e3o h\u00e1 nenhum. Em vez disso, as equipes de seguran\u00e7a precisam analisar o ambiente geral, a arquitetura e as formas de opera\u00e7\u00e3o da tecnologia, bem como os <a href=\"https:\/\/www.rsa.com\/pt_br\/zero-trust\/dont-get-hooked-zero-trust-strategies-to-protect-your-help-desk-from-phishing\/\">processos e cultura de neg\u00f3cios<\/a> e aproxim\u00e1-los da arquitetura de confian\u00e7a zero.<\/p>\n<p>&nbsp;<\/p>\n<p>Assim como os cassinos que foram atingidos por esses ataques, tanto os ataques cibern\u00e9ticos quanto a seguran\u00e7a cibern\u00e9tica tendem a jogar com as probabilidades. Normalmente, n\u00e3o \u00e9 um calcanhar de Aquiles que p\u00f5e em risco a seguran\u00e7a cibern\u00e9tica de uma organiza\u00e7\u00e3o. Em vez disso, s\u00e3o as chances estat\u00edsticas e os riscos que se combinam entre si. As equipes de seguran\u00e7a n\u00e3o devem procurar uma bala de prata; em vez disso, devem entender as condi\u00e7\u00f5es que podem transformar um floco de neve em uma avalanche.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Quando o \"risco versus recompensa\" favorece os atacantes <\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>Embora provavelmente nunca saberemos a hist\u00f3ria completa sobre como o ALPHV \/ BlackCat lan\u00e7ou seus ataques, sabemos sobre algumas das condi\u00e7\u00f5es que os ajudaram a violar suas v\u00edtimas e como essas condi\u00e7\u00f5es criaram riscos que favoreceram os atacantes.<\/p>\n<p>&nbsp;<\/p>\n<p>Em seus <a href=\"https:\/\/www.malwarebytes.com\/blog\/personal\/2023\/09\/ransomware-group-steps-up-issues-statement-over-mgm-resorts-compromise#:~:text=MGM%20made%20the%20hasty%20decision,their%20domain%20controller%20hash%20dumps.\">declara\u00e7\u00e3o<\/a>, De acordo com a ALPHV, o cassino \"desligou todos os seus servidores Okta Sync depois de saber que est\u00e1vamos \u00e0 espreita em seus servidores Okta Agent, detectando as senhas de pessoas cujas senhas n\u00e3o podiam ser decifradas\".<\/p>\n<p>&nbsp;<\/p>\n<p>O ALPHV foi capaz de fazer isso devido a <a href=\"https:\/\/help.okta.com\/en-us\/content\/topics\/directory\/password-sync-application.htm\">Sincroniza\u00e7\u00e3o de senhas de aplicativos do Okta<\/a>, que \"usa APIs padr\u00e3o para sincronizar senhas e aplicativos locais quando eles est\u00e3o dispon\u00edveis\". A documenta\u00e7\u00e3o do produto continua: \"Quando Okta to Application - Sync Okta Password est\u00e1 ativado, o comportamento padr\u00e3o \u00e9 sincronizar a senha existente. A senha do Okta \u00e9 a senha usada para fazer logon no Okta.\"<\/p>\n<p>&nbsp;<\/p>\n<p>O que isso significa em linguagem simples \u00e9 que a Okta tem as senhas do Active Directory de seus usu\u00e1rios. Isso se deve, em grande parte, \u00e0 arquitetura do fornecedor que prioriza a nuvem: a sincroniza\u00e7\u00e3o de senhas ajuda no tempo de execu\u00e7\u00e3o e facilita a r\u00e1pida implanta\u00e7\u00e3o e implementa\u00e7\u00e3o do sistema MFA.<\/p>\n<p>&nbsp;<\/p>\n<p>Embora essa op\u00e7\u00e3o ajude as organiza\u00e7\u00f5es a implantar a solu\u00e7\u00e3o mais rapidamente, ela vem com grandes compensa\u00e7\u00f5es de seguran\u00e7a que v\u00e3o contra um princ\u00edpio fundamental de seguran\u00e7a cibern\u00e9tica: Evitar dados ou, em outras palavras: n\u00e3o armazenar ou transmitir dados que n\u00e3o precisam ser armazenados ou transmitidos.<\/p>\n<p>&nbsp;<\/p>\n<p>Essa \u00e9 uma regra de longa data porque, se uma organiza\u00e7\u00e3o transmite algo, \u00e9 mais f\u00e1cil para um invasor roub\u00e1-lo. Foi o que aconteceu com o BlackCat e o ALPHV: eles provavelmente comprometeram o servidor em que o Okta Agent AD estava sendo executado. A partir da\u00ed, eles poderiam configurar um vampiro para copiar senhas, injetar uma DLL, despejar segmentos de mem\u00f3ria ou realizar qualquer outra a\u00e7\u00e3o.  E esse \u00e9 o ponto: n\u00e3o importa realmente quais a\u00e7\u00f5es espec\u00edficas os atacantes realizaram quando estavam no servidor comprometido.<\/p>\n<p>&nbsp;<\/p>\n<p>Em vez disso, o risco come\u00e7ou com a implementa\u00e7\u00e3o de uma arquitetura que sincroniza as senhas. Essa escolha estabeleceu as condi\u00e7\u00f5es que permitiram que todo o resto viesse a seguir. Essa decis\u00e3o \u00e9 o equivalente em seguran\u00e7a cibern\u00e9tica a optar por construir um edif\u00edcio sobre a areia em vez de sobre a rocha: o que voc\u00ea constr\u00f3i <em>pode <\/em>mas por que correr o risco?<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Seguro por design, seguro por padr\u00e3o<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>Os ataques do BlackCat \/ ALPHV ressaltam a dificuldade de proteger os servidores. V\u00e1rias atualiza\u00e7\u00f5es, senhas de administrador e repeti\u00e7\u00e3o de senha formam uma superf\u00edcie de ataque grande, complexa e fr\u00e1gil. Esse tipo de configura\u00e7\u00e3o geralmente favorece os invasores.<\/p>\n<p>&nbsp;<\/p>\n<p>A alternativa \u00e9 desenvolver o Secure by Design e o Secure by Default <a href=\"https:\/\/www.cisa.gov\/securebydesign\">princ\u00edpios<\/a>, que priorizam a seguran\u00e7a em todos os recursos, opera\u00e7\u00f5es e processos do produto e aproximam as organiza\u00e7\u00f5es da confian\u00e7a zero.<\/p>\n<p>&nbsp;<\/p>\n<p>Como em muitas coisas, o Secure by Design e o Secure by Default t\u00eam tudo a ver com os detalhes. \u00c9 f\u00e1cil afirmar que um produto prioriza a seguran\u00e7a, mas \u00e9 dif\u00edcil entregar algo que realmente atenda a esse padr\u00e3o.<\/p>\n<p>&nbsp;<\/p>\n<p>A RSA desenvolve solu\u00e7\u00f5es que priorizam a seguran\u00e7a e que come\u00e7am com esses princ\u00edpios. N\u00e3o sincronizamos as senhas do Active Directory ou do LDAP - n\u00e3o temos essas credenciais. Em vez disso, exigimos que os clientes implantem um dispositivo virtual refor\u00e7ado que se conecte aos seus reposit\u00f3rios de usu\u00e1rios locais e valide as senhas em tempo real, em vez de farej\u00e1-las e sincroniz\u00e1-las com a nuvem.<\/p>\n<p>&nbsp;<\/p>\n<p>Essa escolha tem algumas desvantagens: leva um pouco mais de tempo e esfor\u00e7o para implantar um dispositivo virtual refor\u00e7ado e nosso roteador de identidade virtual. Mas esse \u00e9 um custo que nossos clientes e nossa equipe acham que vale a pena, pois, ao n\u00e3o sincronizar as senhas, minimizamos a superf\u00edcie de ataque em vez de aument\u00e1-la. Se n\u00e3o as sincronizarmos, n\u00e3o poderemos perd\u00ea-las - e um invasor n\u00e3o poder\u00e1 explor\u00e1-las. Tamb\u00e9m argumentamos que as solu\u00e7\u00f5es de outros fornecedores consomem mais tempo e esfor\u00e7o a longo prazo, pois as solu\u00e7\u00f5es \"mais r\u00e1pidas\" resultam em uma superf\u00edcie de ataque muito maior com uma sobrecarga ainda maior.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.rsa.com\/pt_br\/products-and-solutions\/expanded-rsa-mobile-lock-capabilities-secure-mobile-devices\/\">RSA<sup>\u00ae<\/sup> Trava m\u00f3vel<\/a>, O Mobile Lock, que estabelece a confian\u00e7a em dispositivos n\u00e3o gerenciados e ajuda a proteger o BYOD, tamb\u00e9m exemplifica os princ\u00edpios Secure by Design e Secure by Default. O Mobile Lock s\u00f3 procura amea\u00e7as quando os usu\u00e1rios tentam se autenticar usando o RSA Authenticator para iOS e Android, e s\u00f3 restringe a autentica\u00e7\u00e3o quando detecta uma amea\u00e7a. Ele tamb\u00e9m consulta apenas o m\u00ednimo absoluto de dados para executar suas fun\u00e7\u00f5es, e nosso parceiro Zimperium nunca v\u00ea informa\u00e7\u00f5es pessoais sobre os usu\u00e1rios finais. Os ganhos de seguran\u00e7a de fazer algo mais - como verificar continuamente o dispositivo de um usu\u00e1rio - seriam m\u00ednimos, especialmente em compara\u00e7\u00e3o com a possibilidade de um invasor ter como alvo um servi\u00e7o em segundo plano sempre ativo.<\/p>\n<p>&nbsp;<\/p>\n<p>O mesmo acontece com nosso agente de autentica\u00e7\u00e3o multifator (MFA). No caso de uma interrup\u00e7\u00e3o da Internet, nosso agente de MFA \u00e9 \u00e0 prova de falhas para uma implementa\u00e7\u00e3o no local, em vez de falhar na abertura ou entrar em um modo off-line em que a valida\u00e7\u00e3o de OTP ocorre no pr\u00f3prio agente de MFA. Isso significa que os agentes de amea\u00e7as n\u00e3o podem <a href=\"https:\/\/webinars.securid.com\/RSA\/Anatomy-of-the-Attack-The-Rise-Fall-of-MFA\">Evitar a MFA<\/a> simplesmente desconectando-se da Internet ou fazendo com que o servi\u00e7o de back-end do MFA pare\u00e7a estar off-line, que \u00e9 essencialmente o que os agentes patrocinados pelo Estado fizeram com um <a href=\"https:\/\/www.rsa.com\/pt_br\/multi-factor-authentication\/securing-the-identity-lifecycle-part-1-enrolling-mfa\/\">ONG<\/a> no ano passado.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Aumente suas chances apostando na seguran\u00e7a <\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>A verdadeira seguran\u00e7a nunca \u00e9 projetada em excesso: ela se baseia em uma combina\u00e7\u00e3o sensata de solu\u00e7\u00f5es simples sempre que poss\u00edvel e mais complexas quando necess\u00e1rio. Cada componente de um servi\u00e7o precisa ser projetado para limitar a superf\u00edcie de ataque sempre que poss\u00edvel. Isso significa coletar apenas o m\u00ednimo de informa\u00e7\u00f5es de que um sistema absolutamente precisa e usar essas informa\u00e7\u00f5es apenas quando necess\u00e1rio. Isso tamb\u00e9m significa tomar decis\u00f5es arquitet\u00f4nicas que minimizem a superf\u00edcie de ataque em vez de expandi-la desnecessariamente.<\/p>\n<p>&nbsp;<\/p>\n<p>A seguran\u00e7a cibern\u00e9tica tende a ser uma quest\u00e3o de jogar com as probabilidades. Melhore a sua fazendo a jogada inteligente e apostando em fornecedores que colocam a seguran\u00e7a em primeiro lugar.<\/p>","protected":false},"excerpt":{"rendered":"<p>Na maioria das vezes, a rea\u00e7\u00e3o imediata a incidentes de seguran\u00e7a, como os ataques de ransomware que atingiram os cassinos de Las Vegas no in\u00edcio do outono, \u00e9 procurar a causa. Eu entendo esse impulso. O impacto dos ataques - h\u00f3spedes que tiveram de fazer o check-out usando caneta e papel, at\u00e9 $100 milh\u00f5es em perdas para uma v\u00edtima - demonstra ... <a href=\"https:\/\/www.rsa.com\/pt_br\/resources\/blog\/zero-trust\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\/\">Continua\u00e7\u00e3o<\/a><\/p>","protected":false},"author":6,"featured_media":27090,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"categories":[63],"tags":[],"class_list":["post-27082","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zero-trust"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Casino Data Breaches Reveal Why Secure By Design is the Safe Bet - RSA<\/title>\n<meta name=\"description\" content=\"The data breaches that launched ransomware attacks on Las Vegas casinos reveal why Secure by Design is essential to cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/pt_br\/resources\/blog\/zero-trust\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Casino Data Breaches Reveal Why Secure By Design is the Safe Bet | RSA Blog\" \/>\n<meta property=\"og:description\" content=\"The data breaches that launched ransomware attacks on Las Vegas casinos reveal why Secure by Design is essential to cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/pt_br\/resources\/blog\/zero-trust\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-07T11:00:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-07T21:05:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet-rsa-social.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Ben Lebeaux\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Casino Data Breaches Reveal Why Secure By Design is the Safe Bet | RSA Blog\" \/>\n<meta name=\"twitter:description\" content=\"The data breaches that launched ransomware attacks on Las Vegas casinos reveal why Secure by Design is essential to cybersecurity.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet-rsa-social.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@bcomroe@logical-inc.com\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr_ca\\\/resources\\\/blog\\\/zero-trust\\\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr_ca\\\/resources\\\/blog\\\/zero-trust\\\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\\\/\"},\"author\":{\"name\":\"Ben Lebeaux\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/597f5b8f2d9eb8876c9be212f4dcdce9\"},\"headline\":\"Casino Data Breaches Reveal Why Secure By Design is the Safe Bet\",\"datePublished\":\"2023-11-07T11:00:29+00:00\",\"dateModified\":\"2023-11-07T21:05:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr_ca\\\/resources\\\/blog\\\/zero-trust\\\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\\\/\"},\"wordCount\":1196,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr_ca\\\/resources\\\/blog\\\/zero-trust\\\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet-rsa-blog.webp\",\"articleSection\":[\"Zero Trust\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr_ca\\\/resources\\\/blog\\\/zero-trust\\\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/fr_ca\\\/resources\\\/blog\\\/zero-trust\\\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\\\/\",\"name\":\"Casino Data Breaches Reveal Why Secure By Design is the Safe Bet - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr_ca\\\/resources\\\/blog\\\/zero-trust\\\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr_ca\\\/resources\\\/blog\\\/zero-trust\\\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet-rsa-blog.webp\",\"datePublished\":\"2023-11-07T11:00:29+00:00\",\"dateModified\":\"2023-11-07T21:05:56+00:00\",\"description\":\"The data breaches that launched ransomware attacks on Las Vegas casinos reveal why Secure by Design is essential to cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr_ca\\\/resources\\\/blog\\\/zero-trust\\\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/fr_ca\\\/resources\\\/blog\\\/zero-trust\\\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr_ca\\\/resources\\\/blog\\\/zero-trust\\\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet-rsa-blog.webp\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet-rsa-blog.webp\",\"width\":1200,\"height\":741,\"caption\":\"Casino Data Breaches Reveal Why Secure By Design is the Safe Bet\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr_ca\\\/resources\\\/blog\\\/zero-trust\\\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Casino Data Breaches Reveal Why Secure By Design is the Safe Bet\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/597f5b8f2d9eb8876c9be212f4dcdce9\",\"name\":\"Ben Lebeaux\",\"sameAs\":[\"https:\\\/\\\/x.com\\\/bcomroe@logical-inc.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"As viola\u00e7\u00f5es de dados de cassinos revelam por que o Secure By Design \u00e9 a aposta segura - RSA","description":"As viola\u00e7\u00f5es de dados que lan\u00e7aram ataques de ransomware nos cassinos de Las Vegas revelam por que o Secure by Design \u00e9 essencial para a seguran\u00e7a cibern\u00e9tica.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/pt_br\/resources\/blog\/zero-trust\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\/","og_locale":"pt_BR","og_type":"article","og_title":"Casino Data Breaches Reveal Why Secure By Design is the Safe Bet | RSA Blog","og_description":"The data breaches that launched ransomware attacks on Las Vegas casinos reveal why Secure by Design is essential to cybersecurity.","og_url":"https:\/\/www.rsa.com\/pt_br\/resources\/blog\/zero-trust\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\/","og_site_name":"RSA","article_published_time":"2023-11-07T11:00:29+00:00","article_modified_time":"2023-11-07T21:05:56+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet-rsa-social.webp","type":"image\/webp"}],"author":"Ben Lebeaux","twitter_card":"summary_large_image","twitter_title":"Casino Data Breaches Reveal Why Secure By Design is the Safe Bet | RSA Blog","twitter_description":"The data breaches that launched ransomware attacks on Las Vegas casinos reveal why Secure by Design is essential to cybersecurity.","twitter_image":"https:\/\/www.rsa.com\/wp-content\/uploads\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet-rsa-social.webp","twitter_creator":"@bcomroe@logical-inc.com","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\/#article","isPartOf":{"@id":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\/"},"author":{"name":"Ben Lebeaux","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/597f5b8f2d9eb8876c9be212f4dcdce9"},"headline":"Casino Data Breaches Reveal Why Secure By Design is the Safe Bet","datePublished":"2023-11-07T11:00:29+00:00","dateModified":"2023-11-07T21:05:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\/"},"wordCount":1196,"publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"image":{"@id":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet-rsa-blog.webp","articleSection":["Zero Trust"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\/","url":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\/","name":"As viola\u00e7\u00f5es de dados de cassinos revelam por que o Secure By Design \u00e9 a aposta segura - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet-rsa-blog.webp","datePublished":"2023-11-07T11:00:29+00:00","dateModified":"2023-11-07T21:05:56+00:00","description":"As viola\u00e7\u00f5es de dados que lan\u00e7aram ataques de ransomware nos cassinos de Las Vegas revelam por que o Secure by Design \u00e9 essencial para a seguran\u00e7a cibern\u00e9tica.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet-rsa-blog.webp","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet-rsa-blog.webp","width":1200,"height":741,"caption":"Casino Data Breaches Reveal Why Secure By Design is the Safe Bet"},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/casino-data-breaches-reveal-why-secure-by-design-is-the-safe-bet\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/"},{"@type":"ListItem","position":2,"name":"Casino Data Breaches Reveal Why Secure By Design is the Safe Bet"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"Solu\u00e7\u00f5es de seguran\u00e7a cibern\u00e9tica e gerenciamento de riscos digitais","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/597f5b8f2d9eb8876c9be212f4dcdce9","name":"Ben Lebeaux","sameAs":["https:\/\/x.com\/bcomroe@logical-inc.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/pt_br\/wp-json\/wp\/v2\/posts\/27082","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/pt_br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rsa.com\/pt_br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/pt_br\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/pt_br\/wp-json\/wp\/v2\/comments?post=27082"}],"version-history":[{"count":11,"href":"https:\/\/www.rsa.com\/pt_br\/wp-json\/wp\/v2\/posts\/27082\/revisions"}],"predecessor-version":[{"id":27150,"href":"https:\/\/www.rsa.com\/pt_br\/wp-json\/wp\/v2\/posts\/27082\/revisions\/27150"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/pt_br\/wp-json\/wp\/v2\/media\/27090"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/pt_br\/wp-json\/wp\/v2\/media?parent=27082"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rsa.com\/pt_br\/wp-json\/wp\/v2\/categories?post=27082"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rsa.com\/pt_br\/wp-json\/wp\/v2\/tags?post=27082"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}