{"id":24237,"date":"2019-01-08T13:50:04","date_gmt":"2019-01-08T13:50:04","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019\/"},"modified":"2019-01-08T13:50:04","modified_gmt":"2019-01-08T13:50:04","slug":"fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019\/","title":{"rendered":"Fill the gaps in your security knowledge at SANS London April 2019"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2017\/10\/20\/security_shutterstock.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<p><strong class=\"trailer\">Promo<\/strong> As data thieves and hackers become more numerous, more inventive and more destructive, learning to protect themselves against cybercrime is ever higher on the list of companies&#8217; priorities.<\/p>\n<p>SANS London 2019 <a target=\"_blank\" href=\"https:\/\/go.theregister.co.uk\/k\/sans-london-april\">from 8-13 April<\/a> promises to provide the training that security professionals at all levels need to defend their organisations. A choice of nine lab-heavy courses is on offer, along with a chance to gain valuable GIAC Certification. Attendees are assured they will be able to put their newfound skills into practice immediately.<\/p>\n<p>The choices include:<\/p>\n<ul>\n<li><strong>Enterprise threat and vulnerability assessment<\/strong><br \/>A new course aimed at professionals securing 10,000 or more systems in mid-sized to large organisations. Newfound skills are put to the test on the final day against an enterprise-grade cyber range.<\/li>\n<li><strong>Open-source intelligence (OSINT) gathering and analysis<\/strong><br \/>How to find and analyse internet data, focusing on the techniques used by threat intelligence analysts, private investigators, insurance claims investigators and law enforcement officers. Hands-on labs will explore the live internet and dark web.<\/li>\n<li><strong>Security essentials bootcamp style<\/strong><br \/>Would you be able to find compromised systems on your network? Do you know if each security device is configured correctly? Are proper security metrics set up and understood by your executives?<\/li>\n<li><strong>Hacker tools, techniques, exploits, and incident handling<\/strong><br \/>Follow a step-by-step response to computer incidents and learn about legal issues such as employee monitoring, working with law enforcement and handling evidence.<\/li>\n<li><strong>Cloud security architecture and operations<\/strong><br \/>A brief introduction to cloud security fundamentals followed by the critical concepts of cloud policy and governance. Learn about adapting security processes to the cloud and delve into incident handling, forensics, event management and application security.<\/li>\n<li><strong>SIEM with tactical analytics<\/strong><br \/>Logging systems collect vast amounts of data which require an understanding of the varied sources for proper analysis. Discover the when, what and why behind the logs. Lab work uses SOF-ELK, a free security information and event management (SIEM) solution.<\/li>\n<li><strong>Windows forensic analysis<\/strong><br \/>Learn how to recover and analyse forensic data on Windows systems and track user activity on your network for incident response and investigations.<\/li>\n<li><strong>Advanced digital forensics, incident response, and threat hunting<\/strong><br \/>Defenders need to catch intrusions in progress, rather than after attackers have done their worst. Learn to recognise adversary behaviours to spot new data breaches.<\/li>\n<li><strong>Advanced smartphone forensics<\/strong><br \/>An in-depth course revealing the techniques investigators use to recover and interpret evidence from mobile devices.<\/li>\n<\/ul>\n<p>Find out more and <a target=\"_blank\" href=\"https:\/\/go.theregister.co.uk\/k\/sans-london-april\">sign up here<\/a>.<\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/01\/08\/fill_the_gaps_in_your_security_knowledge_at_sans_london_april_2019\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>New and tested training courses cover every angle Promo\u00a0 As data thieves and hackers become more numerous, more inventive and more destructive, learning to protect themselves against cybercrime is ever higher on the list of companies&#8217; priorities.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":24238,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-24237","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Fill the gaps in your security knowledge at SANS London April 2019 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fill the gaps in your security knowledge at SANS London April 2019 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-08T13:50:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"432\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Fill the gaps in your security knowledge at SANS London April 2019\",\"datePublished\":\"2019-01-08T13:50:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019\\\/\"},\"wordCount\":413,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019\\\/\",\"name\":\"Fill the gaps in your security knowledge at SANS London April 2019 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019.jpg\",\"datePublished\":\"2019-01-08T13:50:04+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019.jpg\",\"width\":648,\"height\":432},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fill the gaps in your security knowledge at SANS London April 2019\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fill the gaps in your security knowledge at SANS London April 2019 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019\/","og_locale":"en_US","og_type":"article","og_title":"Fill the gaps in your security knowledge at SANS London April 2019 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-01-08T13:50:04+00:00","og_image":[{"width":648,"height":432,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Fill the gaps in your security knowledge at SANS London April 2019","datePublished":"2019-01-08T13:50:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019\/"},"wordCount":413,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019\/","url":"https:\/\/www.threatshub.org\/blog\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019\/","name":"Fill the gaps in your security knowledge at SANS London April 2019 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019.jpg","datePublished":"2019-01-08T13:50:04+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019.jpg","width":648,"height":432},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/fill-the-gaps-in-your-security-knowledge-at-sans-london-april-2019\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Fill the gaps in your security knowledge at SANS London April 2019"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/24237","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=24237"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/24237\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/24238"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=24237"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=24237"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=24237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}