{"id":1681,"date":"2015-08-25T23:57:05","date_gmt":"2015-08-25T23:57:05","guid":{"rendered":"http:\/\/shuyuanmaryho.com\/?p=1681"},"modified":"2015-08-25T23:57:05","modified_gmt":"2015-08-25T23:57:05","slug":"next-generation-cybersecurity-is-all-about-behavior-recognition","status":"publish","type":"post","link":"https:\/\/shuyuanmaryho.com\/?p=1681","title":{"rendered":"Next-Generation Cybersecurity Is All About Behavior Recognition"},"content":{"rendered":"<div class=\"fcbkbttn_buttons_block\" id=\"fcbkbttn_left\"><div class=\"fcbkbttn_button\">\n                            <a href=\"https:\/\/www.facebook.com\/\" target=\"_blank\">\n                                <img decoding=\"async\" src=\"https:\/\/shuyuanmaryho.com\/wp-content\/plugins\/facebook-button-plugin\/images\/standard-facebook-ico.png\" alt=\"Fb-Button\" \/>\n                            <\/a>\n                        <\/div><div class=\"fcbkbttn_like \"><fb:like href=\"https:\/\/shuyuanmaryho.com\/?p=1681\" action=\"like\" colorscheme=\"light\" layout=\"standard\"  width=\"450px\" size=\"small\"><\/fb:like><\/div><\/div><p>Rather than focusing on stopping cybercriminals with walls, new technologies are emerging that work to identify cybercriminals instead. For example, BioCatch technology works to identify patterns of user behavior in certain applications, creating user profiles that can then be matched to subsequent visits.\u00a0Mimicking a user\u2019s online behavior is far more difficult than breaking down a wall.<\/p>\n<p><a href=\"http:\/\/techcrunch.com\/2015\/08\/23\/next-gen-cybersecurity-is-all-about-behavior-recognition\/#.buu0t1:IhC6\" target=\"_blank\">Get the whole article here from TechCrunch.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Rather than focusing on stopping cybercriminals with walls, new technologies are emerging that work to identify cybercriminals instead. For example, BioCatch technology works to identify patterns of user behavior in certain applications, creating user profiles that can then be matched &hellip; <a href=\"https:\/\/shuyuanmaryho.com\/?p=1681\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1681","post","type-post","status-publish","format-standard","hentry","category-the-latest-news-ideas-problems-strategies-and-tactics-in-securing-cyberspace-and-virtual-organizations-discussed-by-experts-in-industries-as-well-as-academia"],"_links":{"self":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/posts\/1681","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1681"}],"version-history":[{"count":1,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/posts\/1681\/revisions"}],"predecessor-version":[{"id":1683,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/posts\/1681\/revisions\/1683"}],"wp:attachment":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1681"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1681"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1681"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}