{"id":20605,"date":"2024-05-03T20:24:48","date_gmt":"2024-05-03T12:24:48","guid":{"rendered":"https:\/\/cybersecthreat.com\/?p=20605"},"modified":"2024-05-03T22:06:06","modified_gmt":"2024-05-03T14:06:06","slug":"cybersec-2024-the-past-present-and-future-of-automation","status":"publish","type":"post","link":"https:\/\/cybersecthreat.com\/zh\/2024\/05\/03\/cybersec-2024-the-past-present-and-future-of-automation\/","title":{"rendered":"CYBERSEC 2024: \u81ea\u52d5\u5316\u7684\u904e\u53bb\u3001\u73fe\u5728\u548c\u672a\u4f86"},"content":{"rendered":"<style>.wp-block-kadence-advancedheading.kt-adv-heading20605_b80954-30, .wp-block-kadence-advancedheading.kt-adv-heading20605_b80954-30[data-kb-block=\"kb-adv-heading20605_b80954-30\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20605_b80954-30 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20605_b80954-30[data-kb-block=\"kb-adv-heading20605_b80954-30\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20605_b80954-30 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20605_b80954-30[data-kb-block=\"kb-adv-heading20605_b80954-30\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading20605_b80954-30 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20605_b80954-30\"><strong>Unveiling the Tapestry of Automation: A CYBERSEC 2024 Spotlight<\/strong>&nbsp;<em>Featuring KhaiChen Wong of Swimlane Inc.<\/em><\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20605_c7ca12-30, .wp-block-kadence-advancedheading.kt-adv-heading20605_c7ca12-30[data-kb-block=\"kb-adv-heading20605_c7ca12-30\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20605_c7ca12-30 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20605_c7ca12-30[data-kb-block=\"kb-adv-heading20605_c7ca12-30\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20605_c7ca12-30 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20605_c7ca12-30[data-kb-block=\"kb-adv-heading20605_c7ca12-30\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading20605_c7ca12-30 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20605_c7ca12-30\">At\u00a0<strong>CyberSecThreat<\/strong>, we are at the forefront of deciphering the intricate dance between technology and security. This year, we are honored to collaborate with\u00a0<strong>Swimlane<\/strong>\u00a0to present a thought-provoking session on \u201cThe Past, Present, and Future of Automation\u201d at the\u00a0CYBERSEC 2024 Exhibition Event.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20605_2fc6b9-5a, .wp-block-kadence-advancedheading.kt-adv-heading20605_2fc6b9-5a[data-kb-block=\"kb-adv-heading20605_2fc6b9-5a\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20605_2fc6b9-5a mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20605_2fc6b9-5a[data-kb-block=\"kb-adv-heading20605_2fc6b9-5a\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20605_2fc6b9-5a img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20605_2fc6b9-5a[data-kb-block=\"kb-adv-heading20605_2fc6b9-5a\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading20605_2fc6b9-5a wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20605_2fc6b9-5a\"><strong>A Voyage Through Time<\/strong><\/h2>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20605_bd734a-5f, .wp-block-kadence-advancedheading.kt-adv-heading20605_bd734a-5f[data-kb-block=\"kb-adv-heading20605_bd734a-5f\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20605_bd734a-5f mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20605_bd734a-5f[data-kb-block=\"kb-adv-heading20605_bd734a-5f\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20605_bd734a-5f img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20605_bd734a-5f[data-kb-block=\"kb-adv-heading20605_bd734a-5f\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading20605_bd734a-5f wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20605_bd734a-5f\">Our distinguished guest speaker,\u00a0KhaiChen Wong, Solutions Engineering, APAC at Swimlane Inc., will guide us through automation\u2019s transformative journey. From its nascent stages in early industry to its current role as a pivotal force in modern enterprises, automation has reshaped the landscape of work. We will explore its evolution, celebrate its triumphs, and learn from its challenges.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20605_83ac67-13, .wp-block-kadence-advancedheading.kt-adv-heading20605_83ac67-13[data-kb-block=\"kb-adv-heading20605_83ac67-13\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20605_83ac67-13 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20605_83ac67-13[data-kb-block=\"kb-adv-heading20605_83ac67-13\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20605_83ac67-13 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20605_83ac67-13[data-kb-block=\"kb-adv-heading20605_83ac67-13\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading20605_83ac67-13 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20605_83ac67-13\"><strong>The Present: A Delicate Equilibrium<\/strong><\/h2>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20605_247093-d4, .wp-block-kadence-advancedheading.kt-adv-heading20605_247093-d4[data-kb-block=\"kb-adv-heading20605_247093-d4\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20605_247093-d4 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20605_247093-d4[data-kb-block=\"kb-adv-heading20605_247093-d4\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20605_247093-d4 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20605_247093-d4[data-kb-block=\"kb-adv-heading20605_247093-d4\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading20605_247093-d4 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20605_247093-d4\">In today\u2019s digital ecosystem, organizations strive to harness automation\u2019s potential to streamline workflows and enhance efficiency. Yet, the advent of autonomous and public AI-driven technologies presents a complex puzzle. Our session will delve into the art of leveraging automation to elevate human potential without succumbing to the pitfalls of over-reliance on AI.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20605_66731a-3e, .wp-block-kadence-advancedheading.kt-adv-heading20605_66731a-3e[data-kb-block=\"kb-adv-heading20605_66731a-3e\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20605_66731a-3e mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20605_66731a-3e[data-kb-block=\"kb-adv-heading20605_66731a-3e\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20605_66731a-3e img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20605_66731a-3e[data-kb-block=\"kb-adv-heading20605_66731a-3e\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading20605_66731a-3e wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20605_66731a-3e\"><strong>The Future: Charting Uncharted Waters<\/strong><\/h2>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20605_8e10c8-61, .wp-block-kadence-advancedheading.kt-adv-heading20605_8e10c8-61[data-kb-block=\"kb-adv-heading20605_8e10c8-61\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20605_8e10c8-61 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20605_8e10c8-61[data-kb-block=\"kb-adv-heading20605_8e10c8-61\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20605_8e10c8-61 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20605_8e10c8-61[data-kb-block=\"kb-adv-heading20605_8e10c8-61\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading20605_8e10c8-61 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20605_8e10c8-61\">As we peer into the future, we envision a world where automation not only simplifies tasks but also inspires innovation. KhaiChen Wong will share insights into emerging trends and predict how automation will continue to revolutionize industries, redefine roles, and reshape our approach to work.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20605_777299-90, .wp-block-kadence-advancedheading.kt-adv-heading20605_777299-90[data-kb-block=\"kb-adv-heading20605_777299-90\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20605_777299-90 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20605_777299-90[data-kb-block=\"kb-adv-heading20605_777299-90\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20605_777299-90 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20605_777299-90[data-kb-block=\"kb-adv-heading20605_777299-90\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading20605_777299-90 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20605_777299-90\"><strong>Confronting the Cyber Frontier<\/strong><\/h2>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20605_cc0b33-5b, .wp-block-kadence-advancedheading.kt-adv-heading20605_cc0b33-5b[data-kb-block=\"kb-adv-heading20605_cc0b33-5b\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20605_cc0b33-5b mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20605_cc0b33-5b[data-kb-block=\"kb-adv-heading20605_cc0b33-5b\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20605_cc0b33-5b img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20605_cc0b33-5b[data-kb-block=\"kb-adv-heading20605_cc0b33-5b\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading20605_cc0b33-5b wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20605_cc0b33-5b\">The intersection of AI and cybersecurity is fraught with both opportunities and threats. Our exhibition will spotlight adversarial AI\u2019s role in cyber threats, presenting real-world examples and dissecting their implications. Attendees will gain valuable strategies to mitigate these risks, ensuring a secure path forward in the automation landscape.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20605_8dc122-92, .wp-block-kadence-advancedheading.kt-adv-heading20605_8dc122-92[data-kb-block=\"kb-adv-heading20605_8dc122-92\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20605_8dc122-92 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20605_8dc122-92[data-kb-block=\"kb-adv-heading20605_8dc122-92\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20605_8dc122-92 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20605_8dc122-92[data-kb-block=\"kb-adv-heading20605_8dc122-92\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading20605_8dc122-92 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20605_8dc122-92\"><strong>Conclusion: A Call to Action<\/strong><\/h2>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20605_249d17-ad, .wp-block-kadence-advancedheading.kt-adv-heading20605_249d17-ad[data-kb-block=\"kb-adv-heading20605_249d17-ad\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20605_249d17-ad mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20605_249d17-ad[data-kb-block=\"kb-adv-heading20605_249d17-ad\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20605_249d17-ad img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20605_249d17-ad[data-kb-block=\"kb-adv-heading20605_249d17-ad\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading20605_249d17-ad wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20605_249d17-ad\">Join us at&nbsp;<strong><a href=\"https:\/\/cybersec.ithome.com.tw\/2024\/en\/exhibition-page\/2177\">CYBERSEC 2024<\/a><\/strong>&nbsp;as we embark on this enlightening expedition through automation\u2019s past, present, and future. Together, we will arm ourselves with the knowledge and tools to thrive in an era where automation and cybersecurity converge.<\/p>\n\n\n\n<p><a href=\"https:\/\/signupcybersec.ithome.com.tw\/signup\/2024\/?utm_source=email&amp;utm_medium=edm-sponsor&amp;utm_campaign=%E5%A5%87%E8%B3%87%E8%A8%8A%E4%BF%9D%E5%AE%89\">Register Now!<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u63ed\u958b\u81ea\u52d5\u5316\u7684\u9762\u7d17\uff1a2024 \u5e74 CYBERSEC \u805a\u7126 Swimlane Inc. \u7684 \u9ec3\u51f1\u7a0b KC Wong\u3002 \u4eca\u5e74\uff0c\u6211\u5011\u5f88\u69ae\u5e78\u8207 Swimlane \u5408\u4f5c\uff0c\u5728 CYBERSEC 2024 \u5c55\u89bd\u6d3b\u52d5\u4e2d\u8209\u8fa6\u4e00\u5834\u95dc\u65bc\u300c\u81ea\u52d5\u5316\u7684\u904e\u53bb\u3001\u73fe\u5728\u548c\u672a\u4f86\u300d\u7684\u767c\u4eba\u6df1\u7701\u7684\u6703\u8b70\u3002<\/p>","protected":false},"author":14,"featured_media":20606,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_uf_show_specific_survey":0,"_uf_disable_surveys":false,"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[379,283,297,236,294,298],"tags":[377,380,284,378,296,293,295],"class_list":["post-20605","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai-security","category-events","category-hyperautomation","category-news","category-soar","category-zero-trust","tag-ai","tag-ai-security","tag-events","tag-gpt","tag-hyperautomation","tag-soar","tag-zero-trust"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>CYBERSEC 2024: The Past, Present, and Future of Automation - CyberSecThreat<\/title>\n<meta name=\"description\" content=\"CyberSecThreat collaborates with\u00a0Swimlane\u00a0to present a session on \u201cThe Past, Present, and Future of Automation\u201d at the\u00a0CYBERSEC 2024.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cybersecthreat.com\/zh\/2024\/05\/03\/cybersec-2024-the-past-present-and-future-of-automation\/\" \/>\n<meta property=\"og:locale\" content=\"zh_TW\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CYBERSEC 2024: The Past, Present, and Future of Automation\" \/>\n<meta property=\"og:description\" content=\"Unveiling the Tapestry of Automation: A CYBERSEC 2024 Spotlight&nbsp;Featuring KhaiChen Wong of Swimlane Inc. At\u00a0CyberSecThreat, we are at the forefront\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cybersecthreat.com\/zh\/2024\/05\/03\/cybersec-2024-the-past-present-and-future-of-automation\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberSecThreat\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cybersecthreat\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-03T12:24:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-03T14:06:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/05\/CYBERSEC_2024_exhibition_banner.png\" \/>\n\t<meta property=\"og:image:width\" content=\"980\" \/>\n\t<meta property=\"og:image:height\" content=\"508\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"CyberSecThreat Editor Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cybersecthreat\" \/>\n<meta name=\"twitter:site\" content=\"@cybersecthreat\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005:\" \/>\n\t<meta name=\"twitter:data1\" content=\"CyberSecThreat Editor Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u4f30\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2024\\\/05\\\/03\\\/cybersec-2024-the-past-present-and-future-of-automation\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2024\\\/05\\\/03\\\/cybersec-2024-the-past-present-and-future-of-automation\\\/\"},\"author\":{\"name\":\"CyberSecThreat Editor Team\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#\\\/schema\\\/person\\\/fdcf199f6af74967b3b1ef42d3c84768\"},\"headline\":\"CYBERSEC 2024: The Past, Present, and Future of Automation\",\"datePublished\":\"2024-05-03T12:24:48+00:00\",\"dateModified\":\"2024-05-03T14:06:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2024\\\/05\\\/03\\\/cybersec-2024-the-past-present-and-future-of-automation\\\/\"},\"wordCount\":337,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2024\\\/05\\\/03\\\/cybersec-2024-the-past-present-and-future-of-automation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/CYBERSEC_2024_exhibition_banner.png\",\"keywords\":[\"AI\",\"AI Security\",\"Events\",\"GPT\",\"Hyperautomation\",\"SOAR\",\"Zero Trust\"],\"articleSection\":[\"AI Security\",\"Events\",\"Hyperautomation\",\"News\",\"SOAR\",\"Zero Trust\"],\"inLanguage\":\"zh-TW\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/cybersecthreat.com\\\/2024\\\/05\\\/03\\\/cybersec-2024-the-past-present-and-future-of-automation\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2024\\\/05\\\/03\\\/cybersec-2024-the-past-present-and-future-of-automation\\\/\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/2024\\\/05\\\/03\\\/cybersec-2024-the-past-present-and-future-of-automation\\\/\",\"name\":\"CYBERSEC 2024: The Past, Present, and Future of Automation - CyberSecThreat\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2024\\\/05\\\/03\\\/cybersec-2024-the-past-present-and-future-of-automation\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2024\\\/05\\\/03\\\/cybersec-2024-the-past-present-and-future-of-automation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/CYBERSEC_2024_exhibition_banner.png\",\"datePublished\":\"2024-05-03T12:24:48+00:00\",\"dateModified\":\"2024-05-03T14:06:06+00:00\",\"description\":\"CyberSecThreat collaborates with\u00a0Swimlane\u00a0to present a session on \u201cThe Past, Present, and Future of Automation\u201d at the\u00a0CYBERSEC 2024.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2024\\\/05\\\/03\\\/cybersec-2024-the-past-present-and-future-of-automation\\\/#breadcrumb\"},\"inLanguage\":\"zh-TW\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cybersecthreat.com\\\/2024\\\/05\\\/03\\\/cybersec-2024-the-past-present-and-future-of-automation\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2024\\\/05\\\/03\\\/cybersec-2024-the-past-present-and-future-of-automation\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/CYBERSEC_2024_exhibition_banner.png\",\"contentUrl\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/CYBERSEC_2024_exhibition_banner.png\",\"width\":980,\"height\":508,\"caption\":\"CYBERSEC 2024 exhibition banner\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2024\\\/05\\\/03\\\/cybersec-2024-the-past-present-and-future-of-automation\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"News\",\"item\":\"https:\\\/\\\/cybersecthreat.com\\\/category\\\/news\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CYBERSEC 2024: The Past, Present, and Future of Automation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#website\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/\",\"name\":\"CyberSecThreat\",\"description\":\"CyberSecurity Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cybersecthreat.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-TW\"},{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#organization\",\"name\":\"CyberSecThreat Corporation Limited.\",\"alternateName\":\"CyberSecThreat\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/\",\"logo\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2024\\\/05\\\/03\\\/cybersec-2024-the-past-present-and-future-of-automation\\\/#local-main-organization-logo\"},\"image\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2024\\\/05\\\/03\\\/cybersec-2024-the-past-present-and-future-of-automation\\\/#local-main-organization-logo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/cybersecthreat\",\"https:\\\/\\\/x.com\\\/cybersecthreat\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cybersecthreat-corporation-limited\"],\"description\":\"CyberSecThreat, headquartered in Taiwan, is a Cybersecurity solutions provider that offers cutting-edge Cybersecurity solutions including Cyber Threat Intelligence (CTI), Security Orchestration, Automation, and Response (SOAR), UBA\\\/UEBA, DFIR, and CyberSecurity consulting. CyberSecThreat was awarded as Top 10 Cyber Security Companies of 2022 in APAC CIO Outlook\u2019s Cyber Security Edition. We position ourselves as one of the most comprehensive players in the most advanced high-end marketplace with our highly customizable cybersecurity solutions. CyberSecThreat has been committed to contributing to the CyberSecurity industry and assisting our global clients to improve their CyberSecurity posture. With our global partners and experts, we can deliver a wide range of world-class services to our global clients including vCISO, SOC consulting, Splunk consulting, red team, blue team, and AppSec consulting. CyberSecThreat Research Lab, which is led by our founder Kelvin Yip, is a subdivision that focuses on researching Cyber Warfare, Cyber Influence Operation\\\/Cognitive Domain Warfare (including Disinformation, Propaganda, and psychological manipulation), the latest Cybersecurity trends, and threats that organizations face today as well as technology innovation. With decades of Cybersecurity and technology experience, our teams of experts carry out research and experiment, bringing it to the real world. When things come to the real world and production environment, it is more complicated than our imagination. Let us worry about it because this is our mission! Our vision: NextGen safe digital life, and our mission is to Transform Security Into Real World.\",\"legalName\":\"CyberSecThreat Corporation Limited.\",\"foundingDate\":\"2021-01-23\",\"address\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2024\\\/05\\\/03\\\/cybersec-2024-the-past-present-and-future-of-automation\\\/#local-main-place-address\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"25.0600452\",\"longitude\":\"121.4594381\"},\"telephone\":[\"(+886) 02 - 77527628\"],\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\",\"Saturday\",\"Sunday\"],\"opens\":\"09:00\",\"closes\":\"18:00\"}],\"email\":\"info@cybersecthreat.com\",\"areaServed\":\"Taiwan\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#\\\/schema\\\/person\\\/fdcf199f6af74967b3b1ef42d3c84768\",\"name\":\"CyberSecThreat Editor Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/26417c73a4193a1e97107d72157b7cd90c3cab6fa2e4da2bb0ecfae02062cce6?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/26417c73a4193a1e97107d72157b7cd90c3cab6fa2e4da2bb0ecfae02062cce6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/26417c73a4193a1e97107d72157b7cd90c3cab6fa2e4da2bb0ecfae02062cce6?s=96&d=mm&r=g\",\"caption\":\"CyberSecThreat Editor Team\"},\"sameAs\":[\"https:\\\/\\\/cybersecthreat.com\"],\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/zh\\\/author\\\/cst-editor\\\/\"},{\"@type\":\"PostalAddress\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2024\\\/05\\\/03\\\/cybersec-2024-the-past-present-and-future-of-automation\\\/#local-main-place-address\",\"streetAddress\":\"9 F.-A6, No. 601, Siyuan Rd., Xinzhuang Dist., New Taipei City 242032, Taiwan (R.O.C.)\",\"addressLocality\":\"New Taipei City\",\"postalCode\":\"242032\",\"addressRegion\":\"Taiwan\",\"addressCountry\":\"TW\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/2024\\\/05\\\/03\\\/cybersec-2024-the-past-present-and-future-of-automation\\\/#local-main-organization-logo\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/CyberSecThreat_website-site-logo-_164x164-min.png\",\"contentUrl\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/CyberSecThreat_website-site-logo-_164x164-min.png\",\"width\":164,\"height\":164,\"caption\":\"CyberSecThreat Corporation Limited.\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"New Taipei City\" \/>\n<meta name=\"geo.position\" content=\"25.0600452;121.4594381\" \/>\n<meta name=\"geo.region\" content=\"Taiwan\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CYBERSEC 2024: The Past, Present, and Future of Automation - CyberSecThreat","description":"CyberSecThreat collaborates with\u00a0Swimlane\u00a0to present a session on \u201cThe Past, Present, and Future of Automation\u201d at the\u00a0CYBERSEC 2024.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cybersecthreat.com\/zh\/2024\/05\/03\/cybersec-2024-the-past-present-and-future-of-automation\/","og_locale":"zh_TW","og_type":"article","og_title":"CYBERSEC 2024: The Past, Present, and Future of Automation","og_description":"Unveiling the Tapestry of Automation: A CYBERSEC 2024 Spotlight&nbsp;Featuring KhaiChen Wong of Swimlane Inc. At\u00a0CyberSecThreat, we are at the forefront","og_url":"https:\/\/cybersecthreat.com\/zh\/2024\/05\/03\/cybersec-2024-the-past-present-and-future-of-automation\/","og_site_name":"CyberSecThreat","article_publisher":"https:\/\/www.facebook.com\/cybersecthreat","article_published_time":"2024-05-03T12:24:48+00:00","article_modified_time":"2024-05-03T14:06:06+00:00","og_image":[{"width":980,"height":508,"url":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/05\/CYBERSEC_2024_exhibition_banner.png","type":"image\/png"}],"author":"CyberSecThreat Editor Team","twitter_card":"summary_large_image","twitter_creator":"@cybersecthreat","twitter_site":"@cybersecthreat","twitter_misc":{"\u4f5c\u8005:":"CyberSecThreat Editor Team","\u9810\u4f30\u95b1\u8b80\u6642\u9593":"2 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cybersecthreat.com\/2024\/05\/03\/cybersec-2024-the-past-present-and-future-of-automation\/#article","isPartOf":{"@id":"https:\/\/cybersecthreat.com\/2024\/05\/03\/cybersec-2024-the-past-present-and-future-of-automation\/"},"author":{"name":"CyberSecThreat Editor Team","@id":"https:\/\/cybersecthreat.com\/#\/schema\/person\/fdcf199f6af74967b3b1ef42d3c84768"},"headline":"CYBERSEC 2024: The Past, Present, and Future of Automation","datePublished":"2024-05-03T12:24:48+00:00","dateModified":"2024-05-03T14:06:06+00:00","mainEntityOfPage":{"@id":"https:\/\/cybersecthreat.com\/2024\/05\/03\/cybersec-2024-the-past-present-and-future-of-automation\/"},"wordCount":337,"commentCount":0,"publisher":{"@id":"https:\/\/cybersecthreat.com\/#organization"},"image":{"@id":"https:\/\/cybersecthreat.com\/2024\/05\/03\/cybersec-2024-the-past-present-and-future-of-automation\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/05\/CYBERSEC_2024_exhibition_banner.png","keywords":["AI","AI Security","Events","GPT","Hyperautomation","SOAR","Zero Trust"],"articleSection":["AI Security","Events","Hyperautomation","News","SOAR","Zero Trust"],"inLanguage":"zh-TW","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cybersecthreat.com\/2024\/05\/03\/cybersec-2024-the-past-present-and-future-of-automation\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cybersecthreat.com\/2024\/05\/03\/cybersec-2024-the-past-present-and-future-of-automation\/","url":"https:\/\/cybersecthreat.com\/2024\/05\/03\/cybersec-2024-the-past-present-and-future-of-automation\/","name":"CYBERSEC 2024: The Past, Present, and Future of Automation - CyberSecThreat","isPartOf":{"@id":"https:\/\/cybersecthreat.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cybersecthreat.com\/2024\/05\/03\/cybersec-2024-the-past-present-and-future-of-automation\/#primaryimage"},"image":{"@id":"https:\/\/cybersecthreat.com\/2024\/05\/03\/cybersec-2024-the-past-present-and-future-of-automation\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/05\/CYBERSEC_2024_exhibition_banner.png","datePublished":"2024-05-03T12:24:48+00:00","dateModified":"2024-05-03T14:06:06+00:00","description":"CyberSecThreat collaborates with\u00a0Swimlane\u00a0to present a session on \u201cThe Past, Present, and Future of Automation\u201d at the\u00a0CYBERSEC 2024.","breadcrumb":{"@id":"https:\/\/cybersecthreat.com\/2024\/05\/03\/cybersec-2024-the-past-present-and-future-of-automation\/#breadcrumb"},"inLanguage":"zh-TW","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cybersecthreat.com\/2024\/05\/03\/cybersec-2024-the-past-present-and-future-of-automation\/"]}]},{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/cybersecthreat.com\/2024\/05\/03\/cybersec-2024-the-past-present-and-future-of-automation\/#primaryimage","url":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/05\/CYBERSEC_2024_exhibition_banner.png","contentUrl":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/05\/CYBERSEC_2024_exhibition_banner.png","width":980,"height":508,"caption":"CYBERSEC 2024 exhibition banner"},{"@type":"BreadcrumbList","@id":"https:\/\/cybersecthreat.com\/2024\/05\/03\/cybersec-2024-the-past-present-and-future-of-automation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"News","item":"https:\/\/cybersecthreat.com\/category\/news\/"},{"@type":"ListItem","position":2,"name":"CYBERSEC 2024: The Past, Present, and Future of Automation"}]},{"@type":"WebSite","@id":"https:\/\/cybersecthreat.com\/#website","url":"https:\/\/cybersecthreat.com\/","name":"\u5947\u8cc7\u5b89","description":"\u7db2\u8def\u5b89\u5168\u65b9\u6848","publisher":{"@id":"https:\/\/cybersecthreat.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cybersecthreat.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-TW"},{"@type":["Organization","Place"],"@id":"https:\/\/cybersecthreat.com\/#organization","name":"\u5947\u8cc7\u8a0a\u4fdd\u5b89\u53ca\u7db2\u7d61\u6709\u9650\u516c\u53f8","alternateName":"CyberSecThreat","url":"https:\/\/cybersecthreat.com\/","logo":{"@id":"https:\/\/cybersecthreat.com\/2024\/05\/03\/cybersec-2024-the-past-present-and-future-of-automation\/#local-main-organization-logo"},"image":{"@id":"https:\/\/cybersecthreat.com\/2024\/05\/03\/cybersec-2024-the-past-present-and-future-of-automation\/#local-main-organization-logo"},"sameAs":["https:\/\/www.facebook.com\/cybersecthreat","https:\/\/x.com\/cybersecthreat","https:\/\/www.linkedin.com\/company\/cybersecthreat-corporation-limited"],"description":"CyberSecThreat, headquartered in Taiwan, is a Cybersecurity solutions provider that offers cutting-edge Cybersecurity solutions including Cyber Threat Intelligence (CTI), Security Orchestration, Automation, and Response (SOAR), UBA\/UEBA, DFIR, and CyberSecurity consulting. CyberSecThreat was awarded as Top 10 Cyber Security Companies of 2022 in APAC CIO Outlook\u2019s Cyber Security Edition. We position ourselves as one of the most comprehensive players in the most advanced high-end marketplace with our highly customizable cybersecurity solutions. CyberSecThreat has been committed to contributing to the CyberSecurity industry and assisting our global clients to improve their CyberSecurity posture. With our global partners and experts, we can deliver a wide range of world-class services to our global clients including vCISO, SOC consulting, Splunk consulting, red team, blue team, and AppSec consulting. CyberSecThreat Research Lab, which is led by our founder Kelvin Yip, is a subdivision that focuses on researching Cyber Warfare, Cyber Influence Operation\/Cognitive Domain Warfare (including Disinformation, Propaganda, and psychological manipulation), the latest Cybersecurity trends, and threats that organizations face today as well as technology innovation. With decades of Cybersecurity and technology experience, our teams of experts carry out research and experiment, bringing it to the real world. When things come to the real world and production environment, it is more complicated than our imagination. Let us worry about it because this is our mission! Our vision: NextGen safe digital life, and our mission is to Transform Security Into Real World.","legalName":"CyberSecThreat Corporation Limited.","foundingDate":"2021-01-23","address":{"@id":"https:\/\/cybersecthreat.com\/2024\/05\/03\/cybersec-2024-the-past-present-and-future-of-automation\/#local-main-place-address"},"geo":{"@type":"GeoCoordinates","latitude":"25.0600452","longitude":"121.4594381"},"telephone":["(+886) 02 - 77527628"],"openingHoursSpecification":[{"@type":"OpeningHoursSpecification","dayOfWeek":["Monday","Tuesday","Wednesday","Thursday","Friday","Saturday","Sunday"],"opens":"09:00","closes":"18:00"}],"email":"info@cybersecthreat.com","areaServed":"Taiwan"},{"@type":"Person","@id":"https:\/\/cybersecthreat.com\/#\/schema\/person\/fdcf199f6af74967b3b1ef42d3c84768","name":"\u5947\u8cc7\u5b89\u7de8\u8f2f\u5718\u968a","image":{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/secure.gravatar.com\/avatar\/26417c73a4193a1e97107d72157b7cd90c3cab6fa2e4da2bb0ecfae02062cce6?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/26417c73a4193a1e97107d72157b7cd90c3cab6fa2e4da2bb0ecfae02062cce6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/26417c73a4193a1e97107d72157b7cd90c3cab6fa2e4da2bb0ecfae02062cce6?s=96&d=mm&r=g","caption":"CyberSecThreat Editor Team"},"sameAs":["https:\/\/cybersecthreat.com"],"url":"https:\/\/cybersecthreat.com\/zh\/author\/cst-editor\/"},{"@type":"PostalAddress","@id":"https:\/\/cybersecthreat.com\/2024\/05\/03\/cybersec-2024-the-past-present-and-future-of-automation\/#local-main-place-address","streetAddress":"9 F.-A6, No. 601, Siyuan Rd., Xinzhuang Dist., New Taipei City 242032, Taiwan (R.O.C.)","addressLocality":"New Taipei City","postalCode":"242032","addressRegion":"Taiwan","addressCountry":"TW"},{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/cybersecthreat.com\/2024\/05\/03\/cybersec-2024-the-past-present-and-future-of-automation\/#local-main-organization-logo","url":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/12\/CyberSecThreat_website-site-logo-_164x164-min.png","contentUrl":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/12\/CyberSecThreat_website-site-logo-_164x164-min.png","width":164,"height":164,"caption":"CyberSecThreat Corporation Limited."}]},"geo.placename":"New Taipei City","geo.position":{"lat":"25.0600452","long":"121.4594381"},"geo.region":"Taiwan"},"taxonomy_info":{"category":[{"value":379,"label":"AI Security"},{"value":283,"label":"Events"},{"value":297,"label":"Hyperautomation"},{"value":236,"label":"News"},{"value":294,"label":"SOAR"},{"value":298,"label":"Zero Trust"}],"post_tag":[{"value":377,"label":"AI"},{"value":380,"label":"AI Security"},{"value":284,"label":"Events"},{"value":378,"label":"GPT"},{"value":296,"label":"Hyperautomation"},{"value":293,"label":"SOAR"},{"value":295,"label":"Zero Trust"}]},"featured_image_src_large":["https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/05\/CYBERSEC_2024_exhibition_banner.png",980,508,false],"author_info":{"display_name":"CyberSecThreat Editor Team","author_link":"https:\/\/cybersecthreat.com\/zh\/author\/cst-editor\/"},"comment_info":2,"category_info":[{"term_id":379,"name":"AI Security","slug":"ai-security","term_group":0,"term_taxonomy_id":379,"taxonomy":"category","description":"","parent":0,"count":2,"filter":"raw","cat_ID":379,"category_count":2,"category_description":"","cat_name":"AI Security","category_nicename":"ai-security","category_parent":0},{"term_id":283,"name":"Events","slug":"events","term_group":0,"term_taxonomy_id":283,"taxonomy":"category","description":"","parent":0,"count":7,"filter":"raw","cat_ID":283,"category_count":7,"category_description":"","cat_name":"Events","category_nicename":"events","category_parent":0},{"term_id":297,"name":"Hyperautomation","slug":"hyperautomation","term_group":0,"term_taxonomy_id":297,"taxonomy":"category","description":"","parent":0,"count":3,"filter":"raw","cat_ID":297,"category_count":3,"category_description":"","cat_name":"Hyperautomation","category_nicename":"hyperautomation","category_parent":0},{"term_id":236,"name":"News","slug":"news","term_group":0,"term_taxonomy_id":236,"taxonomy":"category","description":"Latest news of CyberSecThreat, follow us and stay tuned!","parent":0,"count":12,"filter":"raw","cat_ID":236,"category_count":12,"category_description":"Latest news of CyberSecThreat, follow us and stay tuned!","cat_name":"News","category_nicename":"news","category_parent":0},{"term_id":294,"name":"SOAR","slug":"soar","term_group":0,"term_taxonomy_id":294,"taxonomy":"category","description":"","parent":0,"count":3,"filter":"raw","cat_ID":294,"category_count":3,"category_description":"","cat_name":"SOAR","category_nicename":"soar","category_parent":0},{"term_id":298,"name":"Zero Trust","slug":"zero-trust","term_group":0,"term_taxonomy_id":298,"taxonomy":"category","description":"","parent":0,"count":3,"filter":"raw","cat_ID":298,"category_count":3,"category_description":"","cat_name":"Zero Trust","category_nicename":"zero-trust","category_parent":0}],"tag_info":[{"term_id":377,"name":"AI","slug":"ai","term_group":0,"term_taxonomy_id":377,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"},{"term_id":380,"name":"AI Security","slug":"ai-security","term_group":0,"term_taxonomy_id":380,"taxonomy":"post_tag","description":"","parent":0,"count":2,"filter":"raw"},{"term_id":284,"name":"Events","slug":"events","term_group":0,"term_taxonomy_id":284,"taxonomy":"post_tag","description":"","parent":0,"count":7,"filter":"raw"},{"term_id":378,"name":"GPT","slug":"gpt","term_group":0,"term_taxonomy_id":378,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"},{"term_id":296,"name":"Hyperautomation","slug":"hyperautomation","term_group":0,"term_taxonomy_id":296,"taxonomy":"post_tag","description":"","parent":0,"count":3,"filter":"raw"},{"term_id":293,"name":"SOAR","slug":"soar","term_group":0,"term_taxonomy_id":293,"taxonomy":"post_tag","description":"","parent":0,"count":3,"filter":"raw"},{"term_id":295,"name":"Zero Trust","slug":"zero-trust","term_group":0,"term_taxonomy_id":295,"taxonomy":"post_tag","description":"","parent":0,"count":3,"filter":"raw"}],"_links":{"self":[{"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/posts\/20605","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/comments?post=20605"}],"version-history":[{"count":0,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/posts\/20605\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/media\/20606"}],"wp:attachment":[{"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/media?parent=20605"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/categories?post=20605"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/tags?post=20605"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}