{"id":24673,"date":"2019-01-25T14:00:00","date_gmt":"2019-01-25T14:00:00","guid":{"rendered":"http:\/\/07bf20ba-3f29-4717-8870-95246b5c8d48"},"modified":"2019-01-25T14:00:00","modified_gmt":"2019-01-25T14:00:00","slug":"ces-2019-cool-stuff-at-eureka-park","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/ces-2019-cool-stuff-at-eureka-park\/","title":{"rendered":"CES 2019: Cool stuff at Eureka Park"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/r\/2018\/07\/19\/333c5269-dc0b-4ac3-9c5c-bfdaf159d959\/thumbnail\/770x578\/bc2bd30dc2dd9c63e692d2f7f287a67d\/augmented-reality-glasses-technology-and-engineering.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<h3>Welt smart belt<\/h3>\n<p>Wearables weren&#8217;t as big at this year&#8217;s CES as they have been in the past, probably due to the high bar the Apple Watch has set for the segment. Ordinary fitness tracking just isn&#8217;t a big deal today.\u00a0<\/p>\n<p>But the smart belt from <a href=\"https:\/\/www.weltcorp.com\" target=\"_blank\" rel=\"noopener noreferrer\">Welt<\/a>, a spin-off from Samsung, points to a new direction for health and fitness tracking: waist-based, not wrist-based. The obvious benefit is that the belt measures you from a different perspective, your belly.\u00a0<\/p>\n<p>Most of the features of the Welt are the same as a fitness tracker. But the fact that it can measure your waist several times a day could be important &#8211; if they can document the health benefits. They do reference a short study that found that Welt users lost about \u00be of inch off their waists in a 12 week trial, but I&#8217;d like to see data from sustained usage.\u00a0<\/p>\n<p>Be that as it may, the wrist is hardly the optimal or only place to gather fitness and health data. The Welt belt points to a new alternative, which I hope will inspire other innovators to look further.<\/p>\n<h3>Ceramic 3D printer<\/h3>\n<p>The <a href=\"http:\/\/www.kwambio.com\" target=\"_blank\" rel=\"noopener noreferrer\">Kwambio<\/a> ceramic 3D printer uses a porcelain clay mixture that can be fired and glazed, as well as a glass-based material. Today there are printers that print with plastic, metal, and even sand, but ceramics offer a rigidity and durability that plastic can&#8217;t, with an ease that metal can only dream of.\u00a0<\/p>\n<p>3D printing is still in its infancy, so it&#8217;s good to see the materials palette extended to a new medium, and brought to a consumer-accessible price point. And the Kwambio team is adding more materials, to their palette, including biological materials, though they say little about that now.<\/p>\n<h3>Home (and enterprise) internet security<\/h3>\n<p>The internet was <a href=\"https:\/\/www.businessinsider.com\/google-vint-cerf-explains-why-early-internet-lacked-security-and-room-2019-1\" target=\"_blank\" rel=\"noopener noreferrer\">deliberately launched without security<\/a>, so we&#8217;re dealing with all the criminal and nation-state hacking today. I use a VPN and encrypt my data at rest, but most folks find that too onerous. It has to be easy.\u00a0<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>Two companies were showing home internet security products designed to be set-and-forget simple. One is intended for home and business users to buy and install, and the other is aimed at ISPs who want to offer customers greater security.\u00a0<\/p>\n<p>The <a href=\"http:\/\/www.izzbie.com\" target=\"_blank\" rel=\"noopener noreferrer\">izzbie ONE<\/a> uses software-defined network tech to establish secure overlays on your internet\/intranet with network virtualization over the IP layer. Or, more simply, it offers end-to-end AES 256 encryption plus many other enhancements to secure and speed your network traffic. It&#8217;s a small box that can be used singly or in a mesh network to provide services from a home to an enterprise.\u00a0<\/p>\n<p>The <a href=\"http:\/\/bitdefender.com\" target=\"_blank\" rel=\"noopener noreferrer\">Bitdefender BOX<\/a> is aimed at ISPs and billed as an IoT security platform. It bundles traditional security features with an AI enabled traffic monitor to detect and mitigate DDOS attacks, among many other features.<\/p>\n<h3>Public safety<\/h3>\n<p>The <a href=\"https:\/\/www.nist.gov\/ctl\/pscr\" target=\"_blank\" rel=\"noopener noreferrer\">Public Safety Communications Research<\/a> division of NIST was showing what they&#8217;re doing to apply AR and VR to first responders, and I was impressed.\u00a0<\/p>\n<p>Imagine you&#8217;re a fireman navigating a burning building. It&#8217;s smoky, hot, and you&#8217;re wearing 80 pounds of equipment while trying to clear the building and rescue trapped people. A augmented reality display that updates in real time can show you the building&#8217;s layout, what rooms have been searched, locate other first responders, while also displaying the progress of the fire.\u00a0<\/p>\n<p>I hope the shutdown hasn&#8217;t delayed this important work.<\/p>\n<h3>The Storage Bits take<\/h3>\n<p>CES is huge, and I only skimmed Eureka Park. But I saw enough to give me hope that despite today&#8217;s global political and climate challenges, we just might be smart enough to solve those problems and continue to improve the lives of the billions of people through a reality-based application of science and technology.\u00a0<\/p>\n<p>One can only hope.\u00a0<\/p>\n<p><strong>Courteous comments welcome, of course.<\/strong><\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/ces-2019-cool-stuff-at-eureka-park\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When I go to CES I focus on the Eureka Park, where new companies tout their wares. I look for things that may not be hits today, but point to what could be hits tomorrow. Here&#8217;s my list from CES 2019.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":24674,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-24673","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CES 2019: Cool stuff at Eureka Park 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/ces-2019-cool-stuff-at-eureka-park\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CES 2019: Cool stuff at Eureka Park 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/ces-2019-cool-stuff-at-eureka-park\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-25T14:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/ces-2019-cool-stuff-at-eureka-park.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/ces-2019-cool-stuff-at-eureka-park\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/ces-2019-cool-stuff-at-eureka-park\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"CES 2019: Cool stuff at Eureka Park\",\"datePublished\":\"2019-01-25T14:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/ces-2019-cool-stuff-at-eureka-park\/\"},\"wordCount\":659,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/ces-2019-cool-stuff-at-eureka-park\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/ces-2019-cool-stuff-at-eureka-park.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/ces-2019-cool-stuff-at-eureka-park\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/ces-2019-cool-stuff-at-eureka-park\/\",\"name\":\"CES 2019: Cool stuff at Eureka Park 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/ces-2019-cool-stuff-at-eureka-park\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/ces-2019-cool-stuff-at-eureka-park\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/ces-2019-cool-stuff-at-eureka-park.jpg\",\"datePublished\":\"2019-01-25T14:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/ces-2019-cool-stuff-at-eureka-park\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/ces-2019-cool-stuff-at-eureka-park\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/ces-2019-cool-stuff-at-eureka-park\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/ces-2019-cool-stuff-at-eureka-park.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/ces-2019-cool-stuff-at-eureka-park.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/ces-2019-cool-stuff-at-eureka-park\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CES 2019: Cool stuff at Eureka Park\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CES 2019: Cool stuff at Eureka Park 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/ces-2019-cool-stuff-at-eureka-park\/","og_locale":"en_US","og_type":"article","og_title":"CES 2019: Cool stuff at Eureka Park 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/ces-2019-cool-stuff-at-eureka-park\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-01-25T14:00:00+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/ces-2019-cool-stuff-at-eureka-park.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/ces-2019-cool-stuff-at-eureka-park\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/ces-2019-cool-stuff-at-eureka-park\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"CES 2019: Cool stuff at Eureka Park","datePublished":"2019-01-25T14:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ces-2019-cool-stuff-at-eureka-park\/"},"wordCount":659,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ces-2019-cool-stuff-at-eureka-park\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/ces-2019-cool-stuff-at-eureka-park.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/ces-2019-cool-stuff-at-eureka-park\/","url":"https:\/\/www.threatshub.org\/blog\/ces-2019-cool-stuff-at-eureka-park\/","name":"CES 2019: Cool stuff at Eureka Park 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ces-2019-cool-stuff-at-eureka-park\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ces-2019-cool-stuff-at-eureka-park\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/ces-2019-cool-stuff-at-eureka-park.jpg","datePublished":"2019-01-25T14:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/ces-2019-cool-stuff-at-eureka-park\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/ces-2019-cool-stuff-at-eureka-park\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/ces-2019-cool-stuff-at-eureka-park\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/ces-2019-cool-stuff-at-eureka-park.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/ces-2019-cool-stuff-at-eureka-park.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/ces-2019-cool-stuff-at-eureka-park\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"CES 2019: Cool stuff at Eureka Park"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/24673","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=24673"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/24673\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/24674"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=24673"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=24673"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=24673"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}