{"id":88426,"date":"2019-04-30T12:55:57","date_gmt":"2019-04-30T19:55:57","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=88426"},"modified":"2019-06-26T03:05:24","modified_gmt":"2019-06-26T10:05:24","slug":"intego-interviewed-about-cybersecurity-of-today-and-tomorrow","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-cybersecurity-of-today-and-tomorrow\/","title":{"rendered":"Intego interviewed about cybersecurity of today and tomorrow"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-88429\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/Intego-Josh-Long-interviewed-by-Safety-Detective.png\" alt=\"\" width=\"600\" height=\"330\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/Intego-Josh-Long-interviewed-by-Safety-Detective.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/Intego-Josh-Long-interviewed-by-Safety-Detective-150x83.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/Intego-Josh-Long-interviewed-by-Safety-Detective-300x165.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>This week, Safety Detective published an interview about Intego, in which I was asked about the cybersecurity industry, threats, and what we can expect to happen in the cybersecurity landscape in coming years.<\/p>\n<p>In the interview, I talked about how I personally became interested in cybersecurity, what Intego does to help protect our users, and what makes Intego unique compared with other companies. I also talked about what I feel is one of the greatest threats to end users today: that most people have very little awareness of how to stay safe in today&#8217;s threat landscape.<\/p>\n<p>The interview is a fun an interesting read! If you&#8217;ve wondered about how you can better protect yourself online, or if you&#8217;re just curious about what motivates us at Intego, you&#8217;ll definitely want to read this interview!<\/p>\n<p><em>Check out the <a href=\"https:\/\/www.safetydetective.com\/blog\/interview-josh-long-intego\/\" target=\"_blank\" rel=\"noopener\">full interview<\/a>, and then leave a comment here on our blog post to let us know what you think.<\/em><\/p>\n<h3>How can I learn more?<\/h3>\n<p><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-71818\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-150x150.png\" alt=\"\" width=\"50\" height=\"50\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png 300w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/><\/a>As mentioned in the interview, Intego has a lot of great <strong>free<\/strong> resources available to you, including:<\/p>\n<ul>\n<li>our <strong>New Mac User Center<\/strong> with <a href=\"https:\/\/www.intego.com\/new-mac-user-guide\" target=\"_blank\" rel=\"noopener\">tips<\/a> on setting up a new Mac<\/li>\n<li>our <strong>e-mail newsletter<\/strong>\u00a0(look for the green-and-white Subscribe box on this page)<\/li>\n<li>the\u00a0<strong>Intego Mac Podcast<\/strong>\u00a0(<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\">subscribe<\/a>\u00a0in Apple Podcasts)<\/li>\n<li>our <strong>YouTube channel<\/strong> (<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\">subscribe<\/a>\u00a0and click the ?\u00a0to get notified about new videos)<\/li>\n<li>here on\u00a0<strong>The Mac Security Blog<\/strong>\u00a0you&#8217;ll find the latest Apple security and privacy news<\/li>\n<\/ul>\n<p>You can also follow Intego on\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\">Facebook<\/a>, <a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\">Instagram<\/a>, and\u00a0<a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\">Twitter<\/a>\u00a0to stay informed about Apple security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This week, Safety Detective published an interview about Intego, in which I was asked about the cybersecurity industry, threats, and what we can expect to happen in the cybersecurity landscape in coming years. In the interview, I talked about how I personally became interested in cybersecurity, what Intego does to help protect our users, and [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":88435,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[3],"tags":[1999],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"This week, Safety Detective published an interview about Intego, in which I was asked about the cybersecurity industry, threats, and what we can expect to\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-cybersecurity-of-today-and-tomorrow\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Intego interviewed about cybersecurity of today and tomorrow - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"This week, Safety Detective published an interview about Intego, in which I was asked about the cybersecurity industry, threats, and what we can expect to\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-cybersecurity-of-today-and-tomorrow\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-30T19:55:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-06-26T10:05:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/Intego-Josh-Long-interviewed-by-Safety-Detective-400x260-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-cybersecurity-of-today-and-tomorrow\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/Intego-Josh-Long-interviewed-by-Safety-Detective-400x260-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/Intego-Josh-Long-interviewed-by-Safety-Detective-400x260-1.png\",\"width\":400,\"height\":260,\"caption\":\"Intego Chief Security Analyst Josh Long interviewed by Safety Detective\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-cybersecurity-of-today-and-tomorrow\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-cybersecurity-of-today-and-tomorrow\/\",\"name\":\"Intego interviewed about cybersecurity of today and tomorrow - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-cybersecurity-of-today-and-tomorrow\/#primaryimage\"},\"datePublished\":\"2019-04-30T19:55:57+00:00\",\"dateModified\":\"2019-06-26T10:05:24+00:00\",\"description\":\"This week, Safety Detective published an interview about Intego, in which I was asked about the cybersecurity industry, threats, and what we can expect to\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-cybersecurity-of-today-and-tomorrow\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-cybersecurity-of-today-and-tomorrow\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-cybersecurity-of-today-and-tomorrow\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Intego interviewed about cybersecurity of today and tomorrow\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-cybersecurity-of-today-and-tomorrow\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-cybersecurity-of-today-and-tomorrow\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Intego interviewed about cybersecurity of today and tomorrow\",\"datePublished\":\"2019-04-30T19:55:57+00:00\",\"dateModified\":\"2019-06-26T10:05:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-cybersecurity-of-today-and-tomorrow\/#webpage\"},\"wordCount\":262,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-cybersecurity-of-today-and-tomorrow\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/Intego-Josh-Long-interviewed-by-Safety-Detective-400x260-1.png\",\"keywords\":[\"Interview\"],\"articleSection\":[\"Intego\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-cybersecurity-of-today-and-tomorrow\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"This week, Safety Detective published an interview about Intego, in which I was asked about the cybersecurity industry, threats, and what we can expect to","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-cybersecurity-of-today-and-tomorrow\/","og_locale":"en_US","og_type":"article","og_title":"Intego interviewed about cybersecurity of today and tomorrow - The Mac Security Blog","og_description":"This week, Safety Detective published an interview about Intego, in which I was asked about the cybersecurity industry, threats, and what we can expect to","og_url":"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-cybersecurity-of-today-and-tomorrow\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2019-04-30T19:55:57+00:00","article_modified_time":"2019-06-26T10:05:24+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/Intego-Josh-Long-interviewed-by-Safety-Detective-400x260-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-cybersecurity-of-today-and-tomorrow\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/Intego-Josh-Long-interviewed-by-Safety-Detective-400x260-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/Intego-Josh-Long-interviewed-by-Safety-Detective-400x260-1.png","width":400,"height":260,"caption":"Intego Chief Security Analyst Josh Long interviewed by Safety Detective"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-cybersecurity-of-today-and-tomorrow\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-cybersecurity-of-today-and-tomorrow\/","name":"Intego interviewed about cybersecurity of today and tomorrow - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-cybersecurity-of-today-and-tomorrow\/#primaryimage"},"datePublished":"2019-04-30T19:55:57+00:00","dateModified":"2019-06-26T10:05:24+00:00","description":"This week, Safety Detective published an interview about Intego, in which I was asked about the cybersecurity industry, threats, and what we can expect to","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-cybersecurity-of-today-and-tomorrow\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-cybersecurity-of-today-and-tomorrow\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-cybersecurity-of-today-and-tomorrow\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Intego interviewed about cybersecurity of today and tomorrow"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-cybersecurity-of-today-and-tomorrow\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-cybersecurity-of-today-and-tomorrow\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Intego interviewed about cybersecurity of today and tomorrow","datePublished":"2019-04-30T19:55:57+00:00","dateModified":"2019-06-26T10:05:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-cybersecurity-of-today-and-tomorrow\/#webpage"},"wordCount":262,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-cybersecurity-of-today-and-tomorrow\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/Intego-Josh-Long-interviewed-by-Safety-Detective-400x260-1.png","keywords":["Interview"],"articleSection":["Intego"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-cybersecurity-of-today-and-tomorrow\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/06\/Intego-Josh-Long-interviewed-by-Safety-Detective-400x260-1.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-n0e","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/88426"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=88426"}],"version-history":[{"count":6,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/88426\/revisions"}],"predecessor-version":[{"id":88453,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/88426\/revisions\/88453"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/88435"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=88426"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=88426"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=88426"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}