{"id":224,"date":"2023-08-08T12:53:17","date_gmt":"2023-08-08T12:53:17","guid":{"rendered":"https:\/\/cxo.exrtechsolutions.com\/?p=224"},"modified":"2023-08-10T10:39:33","modified_gmt":"2023-08-10T10:39:33","slug":"cyber-security-trends-to-watch-out-for-in-2023","status":"publish","type":"post","link":"https:\/\/cxo.exrtechsolutions.com\/index.php\/2023\/08\/08\/cyber-security-trends-to-watch-out-for-in-2023\/","title":{"rendered":"Cyber Security Trends to Watch Out for in 2023\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"224\" class=\"elementor elementor-224\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-28da1b31 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"28da1b31\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-4efa7cf8\" data-id=\"4efa7cf8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1c34488b elementor-widget elementor-widget-heading\" data-id=\"1c34488b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.15.0 - 02-08-2023 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">CXO<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d261af elementor-widget elementor-widget-text-editor\" data-id=\"7d261af\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.15.0 - 02-08-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>UPDATES<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-3cc9eabf\" data-id=\"3cc9eabf\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-3e2378ba\" data-id=\"3e2378ba\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6053af6b elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"6053af6b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6c70db48\" data-id=\"6c70db48\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-79893eca elementor-widget elementor-widget-heading\" data-id=\"79893eca\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Cyber Security Trends to Watch Out for in 2023<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1bea2022 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"1bea2022\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2724fb4b\" data-id=\"2724fb4b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7d241d19 elementor-widget elementor-widget-text-editor\" data-id=\"7d241d19\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Although keeping up with cybersecurity risks has always been difficult, the rate at which new threats are emerging today is concerning. Given the skill of cyber attackers and the abundance of security measures, the issues facing today&#8217;s security business could be characterised as a perfect storm, with a growing attack surface caused by remote working and cloud usage. This dynamic may produce disjointed insights and data, which would exacerbate the security skills gap already in place.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4a8ca0da\" data-id=\"4a8ca0da\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-27edb62a elementor-widget elementor-widget-image\" data-id=\"27edb62a\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.15.0 - 02-08-2023 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/cxo.exrtechsolutions.com\/wp-content\/uploads\/2023\/08\/Cyber-Security-Trends-to-Watch-Out-for-in-2023-1024x576.png\" class=\"attachment-large size-large wp-image-227\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/cxo.exrtechsolutions.com\/wp-content\/uploads\/2023\/08\/Cyber-Security-Trends-to-Watch-Out-for-in-2023-1024x576.png 1024w, https:\/\/cxo.exrtechsolutions.com\/wp-content\/uploads\/2023\/08\/Cyber-Security-Trends-to-Watch-Out-for-in-2023-300x169.png 300w, https:\/\/cxo.exrtechsolutions.com\/wp-content\/uploads\/2023\/08\/Cyber-Security-Trends-to-Watch-Out-for-in-2023-768x432.png 768w, https:\/\/cxo.exrtechsolutions.com\/wp-content\/uploads\/2023\/08\/Cyber-Security-Trends-to-Watch-Out-for-in-2023-1536x864.png 1536w, https:\/\/cxo.exrtechsolutions.com\/wp-content\/uploads\/2023\/08\/Cyber-Security-Trends-to-Watch-Out-for-in-2023.png 1920w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3fb6d450 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"3fb6d450\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4ec36868\" data-id=\"4ec36868\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-36387b05 elementor-widget elementor-widget-text-editor\" data-id=\"36387b05\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The way security teams approach threat detection and response is evolving. Organisations want broad visibility, integrated data, and the capability to act quickly in order to protect themselves against sophisticated attacks and securely manage the digital revolution.The average overall cost of data breaches in India increased by more than 3X from INR 53.5 million in 2012 to INR 176.0 million in 2022, according to the Cost of Data Breach Report 2022. Finding and containing these breaches takes longer.\u00a0<\/span><\/p><p>\u00a0<\/p><p><span style=\"font-weight: 400;\">Additionally, 5G will make it possible for more devices to connect quickly, which will put additional demand on security monitoring techniques to be updated. Cybersecurity will play a significant part in the scaling of AI and hybrid clouds, which has never been done before. These trends indicate that enterprises must improve their digital defences to fend off the scope and severity of cyberattacks in a nation like India, which is undergoing an exponential digital transition. Businesses must fortify and continuously enhance their digital defences if they want India to advance technologically. Here are a few trends in cyber security to be aware of in 2023.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-745f1245 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"745f1245\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7171560a\" data-id=\"7171560a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-63867c71 elementor-widget elementor-widget-heading\" data-id=\"63867c71\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Essential Infrastructure Displaying \"Blind Trust\":<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e4aee9b elementor-widget elementor-widget-text-editor\" data-id=\"7e4aee9b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">\u00a0In essence, the epidemic has altered critical infrastructure. The globe has relied on manufacturing more than ever in the last two years, yet maintaining production was difficult. In fact, almost one-fourth of compromised critical infrastructure organisations experienced a ransomware or destructive attack, according to the Cost of Data Breach study 2022, at a time when various nations&#8217; cyber authorities are advocating increased awareness to these sectors. Organisations must adopt a Zero Trust architecture that only grants access to verified and identifiable individuals in place of their current approaches to conventional cybersecurity.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77f26221 elementor-widget elementor-widget-heading\" data-id=\"77f26221\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Hybrid Cloud Security:<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-610085e3 elementor-widget elementor-widget-text-editor\" data-id=\"610085e3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Organisations must establish comprehensive security measures regardless of where the data resides\u2014on-premises, in public or private clouds, or at the edge.In order to protect data in 2023, enterprises must adopt comprehensive security plans, regardless of whether the data is on-premises, in public or private clouds, or at the edge. The hybrid multi cloud journey must take security into account at every stop. Adapting security strategies for multiple clouds, introducing new tools and unproven technologies, sharing responsibility and third-party risks, an expanding threat landscape, dissolving perimeters, siloed visibility of threats, securing sensitive data and managing access, as well as increased risks of misconfigurations and compliance monitoring, are important issues that must be addressed as part of hybrid cloud architecture.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e5b3a3e elementor-widget elementor-widget-heading\" data-id=\"1e5b3a3e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Quantum-safety needs to be taken seriously:<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c905dc3 elementor-widget elementor-widget-text-editor\" data-id=\"1c905dc3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">As quantum computing develops and poses potential concerns, such as the ability to swiftly crack encryption algorithms and access sensitive data, businesses will become more and more interested in quantum-safe cryptography and security to safeguard their data from being altered, hacked, or manipulated.\u00a0<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5820aa37 elementor-widget elementor-widget-heading\" data-id=\"5820aa37\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Automation and Artificial Intelligence Are Increasing Defenders:<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2cd5b6be elementor-widget elementor-widget-text-editor\" data-id=\"2cd5b6be\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Organisations with fully adopted security AI and automation save $3.05 million per data breach, according to IBM&#8217;s most recent Cost of a Data Breach Report. The difference in average breach costs is 65.2%. A growing number of businesses are implementing AI-powered automation to boost productivity, gain economies of scale, and enhance threat management. As time goes on, AI and automation will be a crucial part of this new security scenario.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a0abe28 elementor-widget elementor-widget-heading\" data-id=\"4a0abe28\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Integration of XDR and Zero Trust Strategies is necessary: <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-326a713e elementor-widget elementor-widget-text-editor\" data-id=\"326a713e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Organisations may modernise security operations and embrace digital transformation by combining Zero Trust and XDR policies. By adjusting dynamically to people, datasets, and workloads across the enterprise, regardless of where they are, security will become a business enabler.\u00a0<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7558b1e8 elementor-widget elementor-widget-heading\" data-id=\"7558b1e8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Attack surface management and offensive security will perform the role of a trusted adversary for customers:<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d76da91 elementor-widget elementor-widget-text-editor\" data-id=\"5d76da91\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The constant identification, inventory, classification, and monitoring of an enterprise&#8217;s IT infrastructure is mission vital due to the exponential expansion of exposure points in hybrid cloud operating environments brought on by remote and hybrid working patterns. In fact, according to ESG data, 67% of businesses experienced an increase in their external attack surface during the past two years, and 69% of those businesses were penetrated.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Bring the attacker&#8217;s perspective into the security operation centre, continuously detect externally facing assets that are visible to attackers on-premises or in the cloud, and give top priority to exposures that represent the most risk.<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-191a84fe elementor-widget elementor-widget-heading\" data-id=\"191a84fe\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Gain awareness of insider dangers as they will be increasing:<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6cdf64ca elementor-widget elementor-widget-text-editor\" data-id=\"6cdf64ca\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">It is widely accepted that internal risks have a greater financial impact than external ones. The cost of an insider threat occurrence is significantly impacted by the length of time it takes to identify and contain an insider threat.<\/span><\/p><p><span style=\"font-weight: 400;\">Organisations can use various technical and non-technical controls to enhance identification and prevention of each type of insider threat. Security teams must distinguish between the symptoms presented by each sort of insider threat.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Also the attackers&#8217; perspective in security operations is crucial. Security teams, however, can take a proactive approach to insider threat defence by comprehending the motives of attackers.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Successful firms take thorough measures to reduce insider threats. They could make use of security programmes that: accessible data for maps ,creates trust mechanisms for access authorization, access revocation, and multifactor authentication (MFA)<\/span> <span style=\"font-weight: 400;\">establishes guidelines for devices and data storage keeps an eye out for dangers and dangerous behaviour action as required.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-29e2029e elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"29e2029e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-69fdbc72\" data-id=\"69fdbc72\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3cd802c1 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"3cd802c1\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e3d1c3\" data-id=\"1e3d1c3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>CXO UPDATES Cyber Security Trends to Watch Out for in 2023 Although keeping up with cybersecurity risks has always been difficult, the rate at which new threats are emerging today is concerning. Given the skill of cyber attackers and the abundance of security measures, the issues facing today&#8217;s security business could be characterised as a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":395,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_canvas","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/posts\/224"}],"collection":[{"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/comments?post=224"}],"version-history":[{"count":8,"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/posts\/224\/revisions"}],"predecessor-version":[{"id":523,"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/posts\/224\/revisions\/523"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/media\/395"}],"wp:attachment":[{"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/media?parent=224"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/categories?post=224"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/tags?post=224"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}