{"id":961,"date":"2022-06-15T12:51:55","date_gmt":"2022-06-15T12:51:55","guid":{"rendered":"https:\/\/sattrix.com\/blog\/?p=961"},"modified":"2024-11-19T08:19:10","modified_gmt":"2024-11-19T08:19:10","slug":"eye-opening-cloud-security-trends-to-look-for-in-2022","status":"publish","type":"post","link":"https:\/\/www.sattrix.com\/blog\/eye-opening-cloud-security-trends-to-look-for-in-2022\/","title":{"rendered":"Eye-Opening Cloud Security Trends To Look For In 2022"},"content":{"rendered":"<p style=\"text-align: justify;\">Cloud computing is becoming more popular among organizations. In 2022, the public cloud services are expected to grow<a href=\"https:\/\/www.nationalheraldindia.com\/national\/public-cloud-spending-in-india-to-touch-75-billion-this-year\" target=\"_blank\" rel=\"noopener\"> 20.4% to $494.7<\/a> billion, up from $410.9 billion in 2021.<\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_69 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title \" >Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.sattrix.com\/blog\/eye-opening-cloud-security-trends-to-look-for-in-2022\/#Cloud_security_trends_in_2022_to_watch_out\" title=\"Cloud security trends in 2022 to watch out\">Cloud security trends in 2022 to watch out<\/a><ul class='ez-toc-list-level-5' ><li class='ez-toc-heading-level-5'><ul class='ez-toc-list-level-5' ><li class='ez-toc-heading-level-5'><ul class='ez-toc-list-level-5' ><li class='ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.sattrix.com\/blog\/eye-opening-cloud-security-trends-to-look-for-in-2022\/#Zero_Trust_Adoption\" title=\"Zero Trust Adoption\">Zero Trust Adoption<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.sattrix.com\/blog\/eye-opening-cloud-security-trends-to-look-for-in-2022\/#Cybersecurity_Mesh\" title=\"Cybersecurity Mesh\">Cybersecurity Mesh<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.sattrix.com\/blog\/eye-opening-cloud-security-trends-to-look-for-in-2022\/#Cloud_Security_Posture_Management_Organization-Wide\" title=\"Cloud Security Posture Management Organization-Wide\">Cloud Security Posture Management Organization-Wide<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.sattrix.com\/blog\/eye-opening-cloud-security-trends-to-look-for-in-2022\/#Hybrid_and_Multi-Cloud_Environments\" title=\"Hybrid and Multi-Cloud Environments\">Hybrid and Multi-Cloud Environments<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.sattrix.com\/blog\/eye-opening-cloud-security-trends-to-look-for-in-2022\/#Cloud-Native_Tools_and_Platforms\" title=\"Cloud-Native Tools and Platforms\">Cloud-Native Tools and Platforms<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.sattrix.com\/blog\/eye-opening-cloud-security-trends-to-look-for-in-2022\/#The_amalgamation_of_Security_and_DevSecOps\" title=\"The amalgamation of Security and DevSecOps\">The amalgamation of Security and DevSecOps<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.sattrix.com\/blog\/eye-opening-cloud-security-trends-to-look-for-in-2022\/#Acquisition_Of_SASE_Framework\" title=\"Acquisition Of SASE Framework\">Acquisition Of SASE Framework<\/a><\/li><\/ul><\/li><\/ul><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.sattrix.com\/blog\/eye-opening-cloud-security-trends-to-look-for-in-2022\/#Final_words\" title=\"Final words!\">Final words!<\/a><\/li><\/ul><\/nav><\/div>\n\n<p>There are several questions raised by the predictions discussed above.<\/p>\n<p style=\"text-align: justify;\">The question is, where will these businesses and agencies spend their cloud security budgets in 2022?<\/p>\n<p style=\"text-align: justify;\">There are a few trends to watch over the next 12 months. It is essential to keep an eye out for the latest trends in cloud security to protect the cloud environment from data breaches.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Cloud_security_trends_in_2022_to_watch_out\"><\/span>Cloud security trends in 2022 to watch out<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">A secure cloud environment is possible by understanding cloud security development and demands. It would help if you kept your security team updated on these cloud security trends:<\/p>\n<h5><span class=\"ez-toc-section\" id=\"Zero_Trust_Adoption\"><\/span><span data-contrast=\"none\">Zero Trust Adoption<\/span><span class=\"ez-toc-section-end\"><\/span><\/h5>\n<p style=\"text-align: justify;\">Zero-trust works on the &#8220;never trust, always verify&#8221; motto, which suggests that an organization should not rely on anything outside of its boundaries.<\/p>\n<p style=\"text-align: justify;\">The recent migration to the cloud should lead to zero trust in every organization.<\/p>\n<p style=\"text-align: justify;\">Security perimeters and firewalls are essential for protecting organizations&#8217; most valuable assets, such as user data and intellectual property.<\/p>\n<p style=\"text-align: justify;\">Because security teams cannot reduce attack surfaces efficiently, especially in the cloud era, they spend too much time on manual tasks.<\/p>\n<p style=\"text-align: justify;\">The Zero Trust approach aims to enhance security for every device, every user, and connection. Further, it also provides proactive threat management capabilities. A thorough approach to countering threats can be strategized and organized with the help of this method.<\/p>\n<h5><span class=\"ez-toc-section\" id=\"Cybersecurity_Mesh\"><\/span><span data-contrast=\"none\">Cybersecurity Mesh<\/span><span class=\"ez-toc-section-end\"><\/span><\/h5>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/sattrix.com\/blog\/cybercriminals-in-the-cloud-rise-of-cloud-security-issues\/\" target=\"_blank\" rel=\"noopener\">Companies need to secure their data and assets in the cloud<\/a>, outside their network. The concept of cyber security mesh is to create a perimeter of safety for individuals and systems across a distributed network.<\/p>\n<p style=\"text-align: justify;\">An organization can manage access to its data from a central location by using this concept. Using this approach, organizations can also enforce security policies on a distributed basis.<\/p>\n<p style=\"text-align: justify;\">As part of Zero-Trust architecture, cybersecurity mesh is also considered necessary.<\/p>\n<h5><span class=\"ez-toc-section\" id=\"Cloud_Security_Posture_Management_Organization-Wide\"><\/span><span data-contrast=\"none\">Cloud Security Posture Management Organization-Wide<\/span><span class=\"ez-toc-section-end\"><\/span><\/h5>\n<p style=\"text-align: justify;\">Cloud Security Posture Management is essential in today&#8217;s cloud-driven world. IT tools used in the Cloud Security Performance Management process help identify misconfigurations and security risks in a cloud environment.<\/p>\n<p style=\"text-align: justify;\">CSPM is a security posture management solution that automates identifying levels of risk at different cloud infrastructure levels and the potential remedies for them. Services such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).<\/p>\n<p style=\"text-align: justify;\">CSPM is used primarily for risk visualization, risk assessment, incident response, monitoring, and DevOps integration. CSPM helps apply best practices and regulations to cloud security in multi-cloud, hybrid, and container environments.<\/p>\n<h5><span class=\"ez-toc-section\" id=\"Hybrid_and_Multi-Cloud_Environments\"><\/span><span data-contrast=\"none\">Hybrid and Multi-Cloud Environments<\/span><span class=\"ez-toc-section-end\"><\/span><\/h5>\n<p style=\"text-align: justify;\">Defense solutions such as cybersecurity mesh go beyond zero-trust, and they can also secure hybrid and multi-cloud environments.<\/p>\n<p style=\"text-align: justify;\">More and more businesses and agencies are turning to these types of strategies. One example is hybrid cloud computing. By 2022, 90% of organizations will have used hybrid clouds to meet their needs.<\/p>\n<p style=\"text-align: justify;\">This could look different for each organization, and some may require a mix of public and private cloud services.<\/p>\n<p style=\"text-align: justify;\">Other companies might have cloud-based and on-premises assets, and others might use both.<\/p>\n<p style=\"text-align: justify;\">Similarly, multi-cloud is a strategy that uses more than one cloud service. 95% of IT leaders said multi-cloud is a strategic priority for their businesses in 2022. Security was also mentioned as a top priority by about the same percentage (96%) of respondents. However, only 54% of respondents said they had high confidence in their defensive program tools and skills. More than half of respondents (76%) indicated they were unprepared to counter digital threats due to their multi-cloud project.<\/p>\n<p style=\"text-align: justify;\">As a result of this funding shortage, another problem is exacerbated. Security challenges arising from the hybrid cloud and multi-cloud environments. The result is a reduction in visibility due to increased complexity.<\/p>\n<p style=\"text-align: justify;\">AWS Marketplace is one example of a third-party cloud marketplace that can help you overcome these obstacles. Using these resources, security teams can access cloud-based software and services.<\/p>\n<h5><span class=\"ez-toc-section\" id=\"Cloud-Native_Tools_and_Platforms\"><\/span><span data-contrast=\"none\">Cloud-Native Tools and Platforms<\/span><span class=\"ez-toc-section-end\"><\/span><\/h5>\n<p style=\"text-align: justify;\">Cloud-native platforms are also crucial for 2022. Developing cloud-based application architectures empowers businesses and agencies. Cloud assets cannot be protected the same way as on-premises resources.<\/p>\n<p style=\"text-align: justify;\">Internal teams protect these. Information security personnel are only responsible for providing security &#8216;in&#8217; the cloud, as per the shared responsibility model. Protecting the physical hosts, network, and infrastructure that make up the cloud is the cloud service provider&#8217;s responsibility.<\/p>\n<p style=\"text-align: justify;\">Under this division, internal teams can only control security efforts to a limited extent.<\/p>\n<p style=\"text-align: justify;\">Make sure you have the right tools. Understanding your defensive perimeter will help you make the most of cloud-native tools and platforms.<\/p>\n<p style=\"text-align: justify;\">Your business or agency may be left vulnerable if you fail to do so, as threat actors exploit vulnerabilities and misconfigurations in the cloud.<\/p>\n<p style=\"text-align: justify;\">As a result, it could be more expensive to recover from a cloud security incident. It is advantageous to work with strategic vendor partnerships that combine security and visibility.<\/p>\n<h5><span class=\"ez-toc-section\" id=\"The_amalgamation_of_Security_and_DevSecOps\"><\/span><span data-contrast=\"none\">The amalgamation of Security and DevSecOps<\/span><span class=\"ez-toc-section-end\"><\/span><\/h5>\n<p style=\"text-align: justify;\">Development Security Operations is a methodology that integrates security protocols into every phase of the SDLC process. This facilitates dealing with threats during their lifecycle and not after exposure.<\/p>\n<p style=\"text-align: justify;\">DevOps has accelerated the delivery of new software for every release since its deployment. DevSecOps is only secure and fast when the entire software development life cycle is automated, and security measures and protocols will be implemented during the whole supply chain.<\/p>\n<p style=\"text-align: justify;\">Businesses can also innovate securely with DevSecOps. There is an exponential need for more robust and better security in digital services and applications. DevOps and Security teams must collaborate to provide a massive digital transformation and protection. This methodology must be incorporated into a CI\/CD pipeline to make it continuous.<\/p>\n<h5><span class=\"ez-toc-section\" id=\"Acquisition_Of_SASE_Framework\"><\/span><span data-contrast=\"none\">Acquisition Of SASE Framework<\/span><span class=\"ez-toc-section-end\"><\/span><\/h5>\n<p style=\"text-align: justify;\">Cloud-based cybersecurity is crucial to securely connect users, systems, and endpoint devices to a single cloud. With SASE, digital enterprises can access their data securely and dynamically in a cloud-based environment.<\/p>\n<p style=\"text-align: justify;\">As part of SASE&#8217;s working structure, WAN is combined with multiple security capabilities such as network security. security brokers, and anti-malware.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Final_words\"><\/span>Final words!<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\">Cloud services will likely be used more by businesses and agencies in the upcoming year. 28% of IT spending in critical segments will migrate to the cloud by 2022. IT spending will increase by $1.3 trillion due to this increase in cloud-based services.<\/p>\n<p style=\"text-align: justify;\">Business leaders must therefore secure cloud-based services. Cloud-native tools, multi-cloud security strategies, and cybersecurity mesh can help them accomplish this.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cloud computing is becoming more popular among organizations. In 2022, the public cloud services are<\/p>\n","protected":false},"author":1,"featured_media":975,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"categories":[1],"tags":[67,76,41,95,23,68],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v16.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Discover the Top Cloud Security Trends for 2022<\/title>\n<meta name=\"description\" content=\"Get the inside scoop on the top cloud security trends for 2022. Our expert analysis provides valuable insights to help you stay secure in the cloud.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sattrix.com\/blog\/eye-opening-cloud-security-trends-to-look-for-in-2022\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Discover the Top Cloud Security Trends for 2022\" \/>\n<meta property=\"og:description\" content=\"Get the inside scoop on the top cloud security trends for 2022. Our expert analysis provides valuable insights to help you stay secure in the cloud.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sattrix.com\/blog\/eye-opening-cloud-security-trends-to-look-for-in-2022\/\" \/>\n<meta property=\"og:site_name\" content=\"Sattrix\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SattrixInfo\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-15T12:51:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-19T08:19:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sattrix.com\/blog\/wp-content\/uploads\/2022\/06\/Eye-Opening-Cloud-Security-Trends-To-Look-For-In-2022.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1270\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SattrixInfo\" \/>\n<meta name=\"twitter:site\" content=\"@SattrixInfo\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.sattrix.com\/blog\/#organization\",\"name\":\"Sattrix\",\"url\":\"https:\/\/www.sattrix.com\/blog\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/SattrixInfo\",\"https:\/\/www.linkedin.com\/company\/sattrix-information-security-private-limited\/\",\"https:\/\/twitter.com\/SattrixInfo\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.sattrix.com\/blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/sattrix.com\/blog\/wp-content\/uploads\/2021\/05\/Sattrix-Information-Security.png\",\"contentUrl\":\"https:\/\/sattrix.com\/blog\/wp-content\/uploads\/2021\/05\/Sattrix-Information-Security.png\",\"width\":1500,\"height\":414,\"caption\":\"Sattrix\"},\"image\":{\"@id\":\"https:\/\/www.sattrix.com\/blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sattrix.com\/blog\/#website\",\"url\":\"https:\/\/www.sattrix.com\/blog\/\",\"name\":\"Sattrix\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.sattrix.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/www.sattrix.com\/blog\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.sattrix.com\/blog\/eye-opening-cloud-security-trends-to-look-for-in-2022\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.sattrix.com\/blog\/wp-content\/uploads\/2022\/06\/Eye-Opening-Cloud-Security-Trends-To-Look-For-In-2022.jpg\",\"contentUrl\":\"https:\/\/www.sattrix.com\/blog\/wp-content\/uploads\/2022\/06\/Eye-Opening-Cloud-Security-Trends-To-Look-For-In-2022.jpg\",\"width\":1600,\"height\":1270,\"caption\":\"Eye-Opening Cloud Security Trends To Look For In 2022 - cloud security services\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sattrix.com\/blog\/eye-opening-cloud-security-trends-to-look-for-in-2022\/#webpage\",\"url\":\"https:\/\/www.sattrix.com\/blog\/eye-opening-cloud-security-trends-to-look-for-in-2022\/\",\"name\":\"Discover the Top Cloud Security Trends for 2022\",\"isPartOf\":{\"@id\":\"https:\/\/www.sattrix.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.sattrix.com\/blog\/eye-opening-cloud-security-trends-to-look-for-in-2022\/#primaryimage\"},\"datePublished\":\"2022-06-15T12:51:55+00:00\",\"dateModified\":\"2024-11-19T08:19:10+00:00\",\"description\":\"Get the inside scoop on the top cloud security trends for 2022. Our expert analysis provides valuable insights to help you stay secure in the cloud.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sattrix.com\/blog\/eye-opening-cloud-security-trends-to-look-for-in-2022\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sattrix.com\/blog\/eye-opening-cloud-security-trends-to-look-for-in-2022\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sattrix.com\/blog\/eye-opening-cloud-security-trends-to-look-for-in-2022\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sattrix.com\/blog\/\",\"url\":\"https:\/\/www.sattrix.com\/blog\/\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"position\":2,\"item\":{\"@id\":\"https:\/\/www.sattrix.com\/blog\/eye-opening-cloud-security-trends-to-look-for-in-2022\/#webpage\"}}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.sattrix.com\/blog\/eye-opening-cloud-security-trends-to-look-for-in-2022\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.sattrix.com\/blog\/eye-opening-cloud-security-trends-to-look-for-in-2022\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.sattrix.com\/blog\/#\/schema\/person\/6dab33d15055e8cde82c625e94d0bc1c\"},\"headline\":\"Eye-Opening Cloud Security Trends To Look For In 2022\",\"datePublished\":\"2022-06-15T12:51:55+00:00\",\"dateModified\":\"2024-11-19T08:19:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.sattrix.com\/blog\/eye-opening-cloud-security-trends-to-look-for-in-2022\/#webpage\"},\"wordCount\":1055,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.sattrix.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.sattrix.com\/blog\/eye-opening-cloud-security-trends-to-look-for-in-2022\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.sattrix.com\/blog\/wp-content\/uploads\/2022\/06\/Eye-Opening-Cloud-Security-Trends-To-Look-For-In-2022.jpg\",\"keywords\":[\"cloud security\",\"cloud security company\",\"cloud security consulting\",\"cloud security trends\",\"cybersecurity company\",\"cybersecurity services\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.sattrix.com\/blog\/eye-opening-cloud-security-trends-to-look-for-in-2022\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.sattrix.com\/blog\/#\/schema\/person\/6dab33d15055e8cde82c625e94d0bc1c\",\"name\":\"Admin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.sattrix.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3976ddabb5eefc23abf0673e60c595f4?s=96&d=retro&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3976ddabb5eefc23abf0673e60c595f4?s=96&d=retro&r=g\",\"caption\":\"Admin\"},\"sameAs\":[\"https:\/\/www.sattrix.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/www.sattrix.com\/blog\/wp-json\/wp\/v2\/posts\/961"}],"collection":[{"href":"https:\/\/www.sattrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sattrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sattrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sattrix.com\/blog\/wp-json\/wp\/v2\/comments?post=961"}],"version-history":[{"count":18,"href":"https:\/\/www.sattrix.com\/blog\/wp-json\/wp\/v2\/posts\/961\/revisions"}],"predecessor-version":[{"id":1329,"href":"https:\/\/www.sattrix.com\/blog\/wp-json\/wp\/v2\/posts\/961\/revisions\/1329"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sattrix.com\/blog\/wp-json\/wp\/v2\/media\/975"}],"wp:attachment":[{"href":"https:\/\/www.sattrix.com\/blog\/wp-json\/wp\/v2\/media?parent=961"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sattrix.com\/blog\/wp-json\/wp\/v2\/categories?post=961"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sattrix.com\/blog\/wp-json\/wp\/v2\/tags?post=961"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}