{"id":24941,"date":"2019-02-04T17:00:12","date_gmt":"2019-02-04T17:00:12","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/announcing-the-new-security-engineering-website\/"},"modified":"2019-02-04T17:00:12","modified_gmt":"2019-02-04T17:00:12","slug":"announcing-the-new-security-engineering-website","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/announcing-the-new-security-engineering-website\/","title":{"rendered":"Announcing the new Security Engineering website"},"content":{"rendered":"<p><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/securityengineering\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-88411 size-full\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2019\/02\/SDL_BLog_Feb2019.jpg\" alt=\"\" width=\"1229\" height=\"342\" srcset=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2019\/02\/SDL_BLog_Feb2019.jpg 1229w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2019\/02\/SDL_BLog_Feb2019-300x83.jpg 300w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2019\/02\/SDL_BLog_Feb2019-768x214.jpg 768w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2019\/02\/SDL_BLog_Feb2019-1024x285.jpg 1024w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2019\/02\/SDL_BLog_Feb2019-330x92.jpg 330w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2019\/02\/SDL_BLog_Feb2019-800x223.jpg 800w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2019\/02\/SDL_BLog_Feb2019-400x111.jpg 400w\" sizes=\"auto, (max-width: 1229px) 100vw, 1229px\"\/><\/a><\/p>\n<p>To meet users\u2019 expectations for security when using a product or cloud service, security must be an integral part of all aspects of the lifecycle. We all know this, and yet time has proven that this is far easier said than done because there is no single approach nor silver bullet that works in every situation. However, Microsoft\u2019s long commitment to security has demonstrated that there are a number of security practices that have survived the passage of time, and when applied flexibly in harmony with many approaches, will improve the security of products or cloud services.<\/p>\n<p>We are sharing the results of our experiences through our new <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/securityengineering\" rel=\"noopener\">Security Engineering<\/a> website, which includes updated Microsoft Security Development Lifecycle (SDL) practices that focus on development teams and what we believe to be the basic minimum steps for addressing security concerns when using open source. Additionally, we\u2019ve included more specific Operational Security Assurance (OSA) practices, aligned with the operational lifecycle of cloud services, and we touch on how these can be brought together to deliver Secure DevOps.<\/p>\n<p>There are four main sections to the new site:<\/p>\n<h2>Security Development Lifecycle (SDL)<\/h2>\n<p>The new <a target=\"_blank\" href=\"https:\/\/microsoft.com\/sdl\" rel=\"noopener\">The Security Development Lifecycle (SDL)<\/a> site offers <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/securityengineering\/sdl\/practices\" rel=\"noopener\">updated practices<\/a> that should be used during the development process, to build more secure software by reducing the number and severity of vulnerabilities accidentally introduced into software. The practices cover a broad range of topics, from <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/securityengineering\/sdl\/practices#practice1\" rel=\"noopener\">training<\/a> and <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/securityengineering\/sdl\/practices#practice4\" rel=\"noopener\">threat modeling<\/a>, to <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/securityengineering\/sdl\/practices#practice7\" rel=\"noopener\">managing the security risk of using third-party components<\/a>, and <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/securityengineering\/sdl\/practices#practice9\" rel=\"noopener\">security testing<\/a>.<\/p>\n<h2>Operational Security Assurance (OSA)<\/h2>\n<p>The <a target=\"_blank\" href=\"https:\/\/microsoft.com\/osa\" rel=\"noopener\">Operational Security Assurance (OSA)<\/a> section outlines <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/securityengineering\/osa\/practices\" rel=\"noopener\">aligned practices<\/a> to apply during the operational lifecycle of cloud services, making them more resilient to attack from real and potential cybersecurity threats. These include elements such as <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/securityengineering\/osa\/practices#practice2\" rel=\"noopener\">using Multi-Factor Authentication (MFA)<\/a>, <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/securityengineering\/osa\/practices#practice4\" rel=\"noopener\">protecting secrets<\/a>, <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/securityengineering\/osa\/practices#practice9\" rel=\"noopener\">protecting against DDOS attacks<\/a>, and <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/securityengineering\/osa\/practices#practice11\" rel=\"noopener\">penetration testing<\/a>.<\/p>\n<h2>Secure DevOps<\/h2>\n<p>The <a target=\"_blank\" href=\"https:\/\/microsoft.com\/devsecops\" rel=\"noopener\">Secure DevOps<\/a> model provides a great foundation to improve security. SDL and OSA practices aligned with automation, monitoring, collaboration, and fast and early feedback provide a great opportunity to improve security. Practices outlined here include <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/securityengineering\/devsecops#Automation\" rel=\"noopener\">tooling and automation<\/a> and <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/securityengineering\/devsecops#Monitoring\" rel=\"noopener\">continuous learning and monitoring<\/a>.<\/p>\n<h2>Open Source Security<\/h2>\n<p>The <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/securityengineering\/opensource\" rel=\"noopener\">Open Source Security<\/a> section outlines the minimum steps necessary to begin to address security concerns when using open source components. Here the practices cover topics such as <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/securityengineering\/opensource?activetab=security+analysis%3aprimaryr3#Inventory\" rel=\"noopener\">inventorying open source<\/a>, <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/securityengineering\/opensource?activetab=security+analysis%3aprimaryr3#uptodate\" rel=\"noopener\">updating components<\/a>, and <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/securityengineering\/opensource?activetab=security+analysis%3aprimaryr3#alignprocess\" rel=\"noopener\">aligning security response processes<\/a>, and aligns with the SDL practice of managing the security risk of using third-party components.<\/p>\n<p>Throughout the site you will find useful references and resources to help. There are even <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/securityengineering\/sdl\/consulting\" rel=\"noopener\">consulting services offerings<\/a> if you need them. See our <a target=\"_blank\" href=\"https:\/\/docs.microsoft.com\/security\" rel=\"noopener\">Security documentation<\/a>, where many of these resources can be found along with other useful security research papers, guides, and references. We hope you find the new Security Engineering site useful and encourage you to explore and share with your development and operations teams.<\/p>\n<p>READ MORE <a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2019\/02\/04\/announcing-the-new-security-engineering-website\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The new Security Engineering website includes security practices to help improve the security of products or cloud services.<br \/>\nThe post Announcing the new Security Engineering website appeared first on Microsoft Secure. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":24942,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[347],"class_list":["post-24941","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Announcing the new Security Engineering website 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/announcing-the-new-security-engineering-website\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Announcing the new Security Engineering website 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/announcing-the-new-security-engineering-website\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-04T17:00:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/announcing-the-new-security-engineering-website.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1229\" \/>\n\t<meta property=\"og:image:height\" content=\"342\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/announcing-the-new-security-engineering-website\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/announcing-the-new-security-engineering-website\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Announcing the new Security Engineering website\",\"datePublished\":\"2019-02-04T17:00:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/announcing-the-new-security-engineering-website\\\/\"},\"wordCount\":481,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/announcing-the-new-security-engineering-website\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/announcing-the-new-security-engineering-website.jpg\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/announcing-the-new-security-engineering-website\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/announcing-the-new-security-engineering-website\\\/\",\"name\":\"Announcing the new Security Engineering website 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/announcing-the-new-security-engineering-website\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/announcing-the-new-security-engineering-website\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/announcing-the-new-security-engineering-website.jpg\",\"datePublished\":\"2019-02-04T17:00:12+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/announcing-the-new-security-engineering-website\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/announcing-the-new-security-engineering-website\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/announcing-the-new-security-engineering-website\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/announcing-the-new-security-engineering-website.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/announcing-the-new-security-engineering-website.jpg\",\"width\":1229,\"height\":342},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/announcing-the-new-security-engineering-website\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Announcing the new Security Engineering website\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Announcing the new Security Engineering website 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/announcing-the-new-security-engineering-website\/","og_locale":"en_US","og_type":"article","og_title":"Announcing the new Security Engineering website 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/announcing-the-new-security-engineering-website\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-02-04T17:00:12+00:00","og_image":[{"width":1229,"height":342,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/announcing-the-new-security-engineering-website.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/announcing-the-new-security-engineering-website\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/announcing-the-new-security-engineering-website\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Announcing the new Security Engineering website","datePublished":"2019-02-04T17:00:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/announcing-the-new-security-engineering-website\/"},"wordCount":481,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/announcing-the-new-security-engineering-website\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/announcing-the-new-security-engineering-website.jpg","keywords":["Cybersecurity"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/announcing-the-new-security-engineering-website\/","url":"https:\/\/www.threatshub.org\/blog\/announcing-the-new-security-engineering-website\/","name":"Announcing the new Security Engineering website 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/announcing-the-new-security-engineering-website\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/announcing-the-new-security-engineering-website\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/announcing-the-new-security-engineering-website.jpg","datePublished":"2019-02-04T17:00:12+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/announcing-the-new-security-engineering-website\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/announcing-the-new-security-engineering-website\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/announcing-the-new-security-engineering-website\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/announcing-the-new-security-engineering-website.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/announcing-the-new-security-engineering-website.jpg","width":1229,"height":342},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/announcing-the-new-security-engineering-website\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Announcing the new Security Engineering website"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/24941","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=24941"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/24941\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/24942"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=24941"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=24941"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=24941"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}