{"id":666,"date":"2014-12-28T01:11:08","date_gmt":"2014-12-28T01:11:08","guid":{"rendered":"https:\/\/duanestaging.mystagingwebsite.com\/?p=666"},"modified":"2014-12-28T01:11:08","modified_gmt":"2014-12-28T01:11:08","slug":"the-year-in-security-how-2014s-failures-will-help-us-prepare-for-2015","status":"publish","type":"post","link":"https:\/\/duanewells.com\/?p=666","title":{"rendered":"The year in security: How 2014\u2019s failures will help us prepare for 2015"},"content":{"rendered":"<p>Data breaches were\u00a0on the rise this year, with no clear indication of slowing down. Both 2013 and 2014 were dubbed the year of the data breach, indicating that these\u00a0are becoming the norm rather than isolated incidents. More notable, said Tom Turner, security firm BitSight\u2019s executive vice president of sales, is the scope of the breaches.\u00a0[\u2026] <\/p>\n<p><img loading=\"lazy\" decoding=\"async\" height=\"1\" width=\"1\" src=\"https:\/\/venturebeat.feedsportal.com\/c\/34021\/f\/617399\/s\/41ca27a0\/sc\/1\/mf.gif\" border=\"0\"><br clear=\"all\"><\/p>\n<p><a rel=\"nofollow\" href=\"https:\/\/da.feedsportal.com\/r\/216443240921\/u\/49\/f\/617399\/c\/34021\/s\/41ca27a0\/sc\/1\/rc\/1\/rc.htm\"><img decoding=\"async\" src=\"https:\/\/da.feedsportal.com\/r\/216443240921\/u\/49\/f\/617399\/c\/34021\/s\/41ca27a0\/sc\/1\/rc\/1\/rc.img\" border=\"0\"><\/a><br \/><a rel=\"nofollow\" href=\"https:\/\/da.feedsportal.com\/r\/216443240921\/u\/49\/f\/617399\/c\/34021\/s\/41ca27a0\/sc\/1\/rc\/2\/rc.htm\"><img decoding=\"async\" src=\"https:\/\/da.feedsportal.com\/r\/216443240921\/u\/49\/f\/617399\/c\/34021\/s\/41ca27a0\/sc\/1\/rc\/2\/rc.img\" border=\"0\"><\/a><br \/><a rel=\"nofollow\" href=\"https:\/\/da.feedsportal.com\/r\/216443240921\/u\/49\/f\/617399\/c\/34021\/s\/41ca27a0\/sc\/1\/rc\/3\/rc.htm\"><img decoding=\"async\" src=\"https:\/\/da.feedsportal.com\/r\/216443240921\/u\/49\/f\/617399\/c\/34021\/s\/41ca27a0\/sc\/1\/rc\/3\/rc.img\" border=\"0\"><\/a><\/p>\n<p><a href=\"https:\/\/da.feedsportal.com\/r\/216443240921\/u\/49\/f\/617399\/c\/34021\/s\/41ca27a0\/sc\/1\/a2.htm\"><img decoding=\"async\" src=\"https:\/\/da.feedsportal.com\/r\/216443240921\/u\/49\/f\/617399\/c\/34021\/s\/41ca27a0\/sc\/1\/a2.img\" border=\"0\"><\/a><img loading=\"lazy\" decoding=\"async\" height=\"1\" width=\"1\" src=\"https:\/\/pi.feedsportal.com\/r\/216443240921\/u\/49\/f\/617399\/c\/34021\/s\/41ca27a0\/sc\/1\/a2t.img\" border=\"0\"><\/p>\n<p>from VentureBeat https:\/\/venturebeat.com\/2014\/12\/26\/the-year-in-security-how-2014s-failures-will-help-us-prepare-for-2015\/<br \/>\nvia <a href=\"https:\/\/ifttt.com\/?ref=da&#038;site=wordpress\">IFTTT<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data breaches were\u00a0on the rise this year, with no clear indication of slowing down. Both 2013 and 2014 were dubbed the year of the data breach, indicating that these\u00a0are becoming the norm rather than isolated incidents. More notable, said Tom Turner, security firm BitSight\u2019s executive vice president of sales, is the scope of the breaches.\u00a0[\u2026] &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/duanewells.com\/?p=666\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;The year in security: How 2014\u2019s failures will help us prepare for 2015&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[24],"tags":[51,43,42,44],"class_list":["post-666","post","type-post","status-publish","format-standard","hentry","category-business","tag-business","tag-feedly","tag-ifttt","tag-recently-read","entry"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/duanewells.com\/index.php?rest_route=\/wp\/v2\/posts\/666","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/duanewells.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/duanewells.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/duanewells.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/duanewells.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=666"}],"version-history":[{"count":1,"href":"https:\/\/duanewells.com\/index.php?rest_route=\/wp\/v2\/posts\/666\/revisions"}],"predecessor-version":[{"id":667,"href":"https:\/\/duanewells.com\/index.php?rest_route=\/wp\/v2\/posts\/666\/revisions\/667"}],"wp:attachment":[{"href":"https:\/\/duanewells.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=666"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/duanewells.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=666"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/duanewells.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=666"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}