{"id":25368,"date":"2019-02-14T15:00:00","date_gmt":"2019-02-14T15:00:00","guid":{"rendered":"https:\/\/www.darkreading.com\/endpoint\/security-spills-9-problems-causing-the-most-stress\/d\/d-id\/1333874"},"modified":"2019-02-14T15:00:00","modified_gmt":"2019-02-14T15:00:00","slug":"security-spills-9-problems-causing-the-most-stress","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/security-spills-9-problems-causing-the-most-stress\/","title":{"rendered":"Security Spills: 9 Problems Causing the Most Stress"},"content":{"rendered":"<header>\n<\/header>\n<p><span class=\"strong black\">Security practitioners reveal what&#8217;s causing them the most frustration in their roles.<\/span> <\/p>\n<div>\n<div><span class=\"smaller blue\"><img decoding=\"async\" src=\"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-gray-left.png\" alt=\"Previous\"\/><\/span><\/p>\n<p><span class=\"smaller blue\">1 of 10<\/span><\/p>\n<p><span class=\"smaller blue\"><a href=\"https:\/\/www.darkreading.com\/endpoint\/security-spills-9-problems-causing-the-most-stress\/d\/d-id\/1333874?image_number=2\" title=\"Next\"><img decoding=\"async\" src=\"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-black-right.png\" alt=\"Next\"\/><\/a><\/span><\/div>\n<\/div>\n<div class=\"docimage\" align=\"center\" readability=\"3.9545454545455\"><a href=\"https:\/\/www.darkreading.com\/endpoint\/security-spills-9-problems-causing-the-most-stress\/d\/d-id\/1333874?_mc=rss%5Fx%5Fdrr%5Fedt%5Faud%5Fdr%5Fx%5Fx%2Drss%2Dsimple&amp;image_number=1\" target=\"new\"><img decoding=\"async\" class=\"docimage\" src=\"https:\/\/img.deusm.com\/darkreading\/SecurityStress\/Stressed-intro.jpg\" alt=\"(Image: Milanmarkovic78 - stock.adobe.com)\" border=\"0\"\/><\/a> <\/div>\n<p>Cybersecurity isn&#8217;t an easy gig. It&#8217;s tough to keep track of the most stressful problems because adversaries are constantly evolving their tactics and security threats are constantly changing.<\/p>\n<p>In fact, the rapid evolution of threats is one of many issues plaguing security pros. The onslaught of emerging threats is made more difficult by lack of resources. All the while, employees are bringing unsecured smartphones and devices into office environments.<\/p>\n<p>&#8220;You can&#8217;t predict what you can&#8217;t see, and so the adoption of BYOD policies at companies, combined with an increasingly complex network environment, leave organizations susceptible to attack,&#8221; says YL Ventures principal John Brennan.<\/p>\n<p>Movement to the cloud, vulnerability management, data governance, and choosing, implementing, and managing new security products compound the challenges and give security teams even more to worry about. For small organizations, where one person is responsible for securing everything on his or her own, the list of issues can be overwhelming.<\/p>\n<p>Here, security pros across the industry share what&#8217;s most stressful about their jobs. What is most stressful about your job? Feel free to jump in the comments section, below, and add to the list.<\/p>\n<p> <span class=\"italic\">Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance &amp; Technology, where she covered financial &#8230; <a href=\"https:\/\/www.darkreading.com\/author-bio.asp?author_id=837\">View Full Bio<\/a><\/span> <\/p>\n<div>\n<div><span class=\"smaller blue\"><img decoding=\"async\" src=\"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-gray-left.png\" alt=\"Previous\"\/><\/span><\/p>\n<p><span class=\"smaller blue\">1 of 10<\/span><\/p>\n<p><span class=\"smaller blue\"><a href=\"https:\/\/www.darkreading.com\/endpoint\/security-spills-9-problems-causing-the-most-stress\/d\/d-id\/1333874?image_number=2\" title=\"Next\"><img decoding=\"async\" src=\"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-black-right.png\" alt=\"Next\"\/><\/a><\/span><\/div>\n<\/div>\n<p><span class=\"smaller strong red allcaps\">More Insights<\/span><\/p>\n<p> Read More <a href=\"https:\/\/www.darkreading.com\/endpoint\/security-spills-9-problems-causing-the-most-stress\/d\/d-id\/1333874?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security practitioners reveal what&#8217;s causing them the most frustration in their roles. Read More <a href=\"https:\/\/www.darkreading.com\/endpoint\/security-spills-9-problems-causing-the-most-stress\/d\/d-id\/1333874?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-25368","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security Spills: 9 Problems Causing the Most Stress 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/security-spills-9-problems-causing-the-most-stress\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Spills: 9 Problems Causing the Most Stress 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/security-spills-9-problems-causing-the-most-stress\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-14T15:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-gray-left.png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/security-spills-9-problems-causing-the-most-stress\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/security-spills-9-problems-causing-the-most-stress\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Security Spills: 9 Problems Causing the Most Stress\",\"datePublished\":\"2019-02-14T15:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/security-spills-9-problems-causing-the-most-stress\/\"},\"wordCount\":263,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/security-spills-9-problems-causing-the-most-stress\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-gray-left.png\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/security-spills-9-problems-causing-the-most-stress\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/security-spills-9-problems-causing-the-most-stress\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/security-spills-9-problems-causing-the-most-stress\/\",\"name\":\"Security Spills: 9 Problems Causing the Most Stress 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/security-spills-9-problems-causing-the-most-stress\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/security-spills-9-problems-causing-the-most-stress\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-gray-left.png\",\"datePublished\":\"2019-02-14T15:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/security-spills-9-problems-causing-the-most-stress\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/security-spills-9-problems-causing-the-most-stress\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/security-spills-9-problems-causing-the-most-stress\/#primaryimage\",\"url\":\"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-gray-left.png\",\"contentUrl\":\"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-gray-left.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/security-spills-9-problems-causing-the-most-stress\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Spills: 9 Problems Causing the Most Stress\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Spills: 9 Problems Causing the Most Stress 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/security-spills-9-problems-causing-the-most-stress\/","og_locale":"en_US","og_type":"article","og_title":"Security Spills: 9 Problems Causing the Most Stress 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/security-spills-9-problems-causing-the-most-stress\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-02-14T15:00:00+00:00","og_image":[{"url":"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-gray-left.png","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/security-spills-9-problems-causing-the-most-stress\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/security-spills-9-problems-causing-the-most-stress\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Security Spills: 9 Problems Causing the Most Stress","datePublished":"2019-02-14T15:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/security-spills-9-problems-causing-the-most-stress\/"},"wordCount":263,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/security-spills-9-problems-causing-the-most-stress\/#primaryimage"},"thumbnailUrl":"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-gray-left.png","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/security-spills-9-problems-causing-the-most-stress\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/security-spills-9-problems-causing-the-most-stress\/","url":"https:\/\/www.threatshub.org\/blog\/security-spills-9-problems-causing-the-most-stress\/","name":"Security Spills: 9 Problems Causing the Most Stress 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/security-spills-9-problems-causing-the-most-stress\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/security-spills-9-problems-causing-the-most-stress\/#primaryimage"},"thumbnailUrl":"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-gray-left.png","datePublished":"2019-02-14T15:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/security-spills-9-problems-causing-the-most-stress\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/security-spills-9-problems-causing-the-most-stress\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/security-spills-9-problems-causing-the-most-stress\/#primaryimage","url":"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-gray-left.png","contentUrl":"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-gray-left.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/security-spills-9-problems-causing-the-most-stress\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Security Spills: 9 Problems Causing the Most Stress"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25368","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=25368"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25368\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=25368"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=25368"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=25368"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}