{"id":91780,"date":"2020-06-30T17:28:10","date_gmt":"2020-07-01T00:28:10","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=91780"},"modified":"2020-06-30T17:52:59","modified_gmt":"2020-07-01T00:52:59","slug":"intego-interviewed-about-home-centric-shift-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-home-centric-shift-in-cybersecurity\/","title":{"rendered":"Intego interviewed about home-centric shift in cybersecurity"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-91781\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/SafetyDetectives-interview-Intego-Josh-Long-2020-600x375-1.jpg\" alt=\"\" width=\"600\" height=\"375\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/SafetyDetectives-interview-Intego-Josh-Long-2020-600x375-1.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/SafetyDetectives-interview-Intego-Josh-Long-2020-600x375-1-300x188.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/SafetyDetectives-interview-Intego-Josh-Long-2020-600x375-1-150x94.jpg 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>SafetyDetectives recently published an interview about Intego, in which I was asked about how the world of cybersecurity has changed as a result of the COVID-19 pandemic.<\/p>\n<p>In the interview, I talked about:<\/p>\n<ul>\n<li>how organizations have had to change their approach to cybersecurity<\/li>\n<li>how end-users are rethinking security and privacy in light of the pandemic<\/li>\n<li>what Intego is doing to meet the needs of work-at-home and learn-at-home users\u2014including preparing for day-one support of <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/macos-big-sur\/\" target=\"_blank\" rel=\"noopener noreferrer\">macOS Big Sur<\/a>, and launching <a href=\"https:\/\/www.intego.com\/intego-antivirus\" target=\"_blank\" rel=\"noopener noreferrer\">Intego Antivirus for Windows<\/a><\/li>\n<\/ul>\n<p><em>Check out the full\u00a0<a href=\"https:\/\/www.safetydetectives.com\/blog\/interview-with-josh-long-intego\/\" target=\"_blank\" rel=\"noopener noreferrer\">Intego 2020 interview<\/a>\u00a0on the SafetyDetectives site.<\/em><\/p>\n<p>If you enjoy reading this year&#8217;s interview, SafetyDetectives also interviewed me in 2019 about (among other things):<\/p>\n<ul>\n<li>what we can expect to happen in the cybersecurity landscape in coming years<\/li>\n<li>what makes Intego unique when it comes to protecting our customers<\/li>\n<li>some of the biggest threats that users face today<\/li>\n<\/ul>\n<p>You can read the <a href=\"https:\/\/www.safetydetectives.com\/blog\/interview-josh-long-intego\/\" target=\"_blank\" rel=\"noopener noreferrer\">Intego 2019 interview<\/a> on SafetyDetectives&#8217; site as well.<\/p>\n<h3>How can I learn more?<\/h3>\n<p><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-71818\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-150x150.png\" sizes=\"(max-width: 50px) 100vw, 50px\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png 300w\" alt=\"\" width=\"50\" height=\"50\" data-pagespeed-url-hash=\"2337344131\" \/><\/a>Of course, you don&#8217;t have to rely solely on interviews to learn more about what&#8217;s happening at Intego, or in the cybersecurity scene in general.<\/p>\n<p>Each week on the <strong><a href=\"https:\/\/podcast.intego.com\/\">Intego Mac Podcast<\/a><\/strong> we discuss the latest security and privacy news, as well as the things you need to know as a user of Apple products. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\">subscribe<\/a> to make sure you don\u2019t miss any episodes!<\/p>\n<p>You\u2019ll also want to subscribe to our <strong>e-mail newsletter<\/strong> and keep an eye here on <strong>The Mac Security Blog<\/strong> for the latest Apple security and privacy news.<\/p>\n<p>And be sure to follow Intego on your favorite social media channels: <a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>, <a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener noreferrer\">Instagram<\/a>, <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>, and <a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener noreferrer\">YouTube<\/a> (click the \ud83d\udd14 to get notified about new videos).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a recent interview, Josh Long explains how Intego meets the needs of work-at-home and learn-at-home users, and how cybersecurity is evolving due to the pandemic.<\/p>\n","protected":false},"author":14,"featured_media":91783,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[3],"tags":[1999],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"In a recent interview, Josh Long explains how Intego meets the needs of work-at-home and learn-at-home users, and how cybersecurity is evolving due to the pandemic.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-home-centric-shift-in-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Intego interviewed about home-centric shift in cybersecurity - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"In a recent interview, Josh Long explains how Intego meets the needs of work-at-home and learn-at-home users, and how cybersecurity is evolving due to the pandemic.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-home-centric-shift-in-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-01T00:28:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-01T00:52:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/SafetyDetectives-interview-Intego-Josh-Long-2020-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-home-centric-shift-in-cybersecurity\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/SafetyDetectives-interview-Intego-Josh-Long-2020-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/SafetyDetectives-interview-Intego-Josh-Long-2020-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"SafetyDetectives interviews Intego - Josh Long\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-home-centric-shift-in-cybersecurity\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-home-centric-shift-in-cybersecurity\/\",\"name\":\"Intego interviewed about home-centric shift in cybersecurity - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-home-centric-shift-in-cybersecurity\/#primaryimage\"},\"datePublished\":\"2020-07-01T00:28:10+00:00\",\"dateModified\":\"2020-07-01T00:52:59+00:00\",\"description\":\"In a recent interview, Josh Long explains how Intego meets the needs of work-at-home and learn-at-home users, and how cybersecurity is evolving due to the pandemic.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-home-centric-shift-in-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-home-centric-shift-in-cybersecurity\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-home-centric-shift-in-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Intego interviewed about home-centric shift in cybersecurity\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-home-centric-shift-in-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-home-centric-shift-in-cybersecurity\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Intego interviewed about home-centric shift in cybersecurity\",\"datePublished\":\"2020-07-01T00:28:10+00:00\",\"dateModified\":\"2020-07-01T00:52:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-home-centric-shift-in-cybersecurity\/#webpage\"},\"wordCount\":286,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-home-centric-shift-in-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/SafetyDetectives-interview-Intego-Josh-Long-2020-400x260-1.jpg\",\"keywords\":[\"Interview\"],\"articleSection\":[\"Intego\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-home-centric-shift-in-cybersecurity\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"In a recent interview, Josh Long explains how Intego meets the needs of work-at-home and learn-at-home users, and how cybersecurity is evolving due to the pandemic.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-home-centric-shift-in-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Intego interviewed about home-centric shift in cybersecurity - The Mac Security Blog","og_description":"In a recent interview, Josh Long explains how Intego meets the needs of work-at-home and learn-at-home users, and how cybersecurity is evolving due to the pandemic.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-home-centric-shift-in-cybersecurity\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2020-07-01T00:28:10+00:00","article_modified_time":"2020-07-01T00:52:59+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/SafetyDetectives-interview-Intego-Josh-Long-2020-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-home-centric-shift-in-cybersecurity\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/SafetyDetectives-interview-Intego-Josh-Long-2020-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/SafetyDetectives-interview-Intego-Josh-Long-2020-400x260-1.jpg","width":400,"height":260,"caption":"SafetyDetectives interviews Intego - Josh Long"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-home-centric-shift-in-cybersecurity\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-home-centric-shift-in-cybersecurity\/","name":"Intego interviewed about home-centric shift in cybersecurity - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-home-centric-shift-in-cybersecurity\/#primaryimage"},"datePublished":"2020-07-01T00:28:10+00:00","dateModified":"2020-07-01T00:52:59+00:00","description":"In a recent interview, Josh Long explains how Intego meets the needs of work-at-home and learn-at-home users, and how cybersecurity is evolving due to the pandemic.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-home-centric-shift-in-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-home-centric-shift-in-cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-home-centric-shift-in-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Intego interviewed about home-centric shift in cybersecurity"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-home-centric-shift-in-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-home-centric-shift-in-cybersecurity\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Intego interviewed about home-centric shift in cybersecurity","datePublished":"2020-07-01T00:28:10+00:00","dateModified":"2020-07-01T00:52:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-home-centric-shift-in-cybersecurity\/#webpage"},"wordCount":286,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-home-centric-shift-in-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/SafetyDetectives-interview-Intego-Josh-Long-2020-400x260-1.jpg","keywords":["Interview"],"articleSection":["Intego"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/intego-interviewed-about-home-centric-shift-in-cybersecurity\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/06\/SafetyDetectives-interview-Intego-Josh-Long-2020-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-nSk","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/91780"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=91780"}],"version-history":[{"count":5,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/91780\/revisions"}],"predecessor-version":[{"id":91794,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/91780\/revisions\/91794"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/91783"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=91780"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=91780"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=91780"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}