{"id":25439,"date":"2019-02-20T15:21:50","date_gmt":"2019-02-20T15:21:50","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=542660"},"modified":"2019-02-20T15:21:50","modified_gmt":"2019-02-20T15:21:50","slug":"a-game-of-risk-with-broadcasters-cyber-felons-and-dragons","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons\/","title":{"rendered":"A Game of Risk with Broadcasters, Cyber Felons and Dragons"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/20180416195815927-257-VIOchAp-800-300x200.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/20180416195815927-257-VIOchAp-800-300x200.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/20180416195815927-257-VIOchAp-800-768x512.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/20180416195815927-257-VIOchAp-800-640x426.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/20180416195815927-257-VIOchAp-800-440x293.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/20180416195815927-257-VIOchAp-800-380x253.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/20180416195815927-257-VIOchAp-800.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"\/><\/p>\n<p><em>Submitted<\/em><em>\u00a0by Steve Ng, Lead, Digital Platform Operations, Mediacorp<\/em><\/p>\n<p>Where there\u2019s money, there has always been crime. But what if money came in the form of intangible digital assets and crime in the form of cyber adversaries? In fantasy role-playing game <em>Dungeons &amp; Dragons<\/em>, dragons are intelligent, mythical foes defined by their fiery prowess \u2013 boasting magic resistance beyond just claws and bites.<\/p>\n<p>As digital TV takes centrestage with new over-the-top (OTT) platforms for content consumption across mobile, TV and radio, broadcasters must stay one step ahead of emerging risks or \u2018evolved dragons\u2019 to ensure digital ecosystems \u2013 and ultimately the end-user \u2013 emerge unscathed.<\/p>\n<p><strong>Dungeons are at stake<\/strong><\/p>\n<p>Fast forwarding to present day, the broadcaster in question is Mediacorp \u2013 a Singapore-based media and entertainment company that pioneered the development of Singapore\u2019s broadcasting industry with a vested stake in radio, TV and digital publishing.<\/p>\n<p>To put things into perspective, Mediacorp reaches 99% of Singapore\u2019s 5.6 million population weekly across its integrated media platforms.<\/p>\n<p>Now imagine the risks involved should cybercrime find its way into this fortress? The defacement of digital assets, proliferation of false propaganda can and will threaten to derail an entire broadcast network \u2013 from satellite distribution channels, to IP packets and ultimately the end-user.<\/p>\n<p><strong>Building sturdier, virtual dungeons \u2013 in the skies<\/strong><\/p>\n<p>We are well aware of how breach detection and forensics experts are needed to discover and mitigate cyber risks. But the idea of a perimeter and a castle keep is an old-fashioned view of cybersecurity.<\/p>\n<p>The cyber kill chain dictates that we must also build dungeons within those castles. Rather than endorsing security models that drive us to construct additional defences and filters that have an increasingly slim chance of stopping advanced threats, the focus within IT development and security must shift to emphasize more aggressive and proactive self-assessment. In other words, \u201coffense can inform defence.\u201d<\/p>\n<p>Continuous diagnostics and mitigation are first steps in addressing the use of intelligent metrics to empower greater cyber-situational awareness within our broadcasting network. For instance, we enlisted the help of Trend Micro to improve our security defences \u2013 by identifying suspicious IPs, we were able to fend off cyber felons almost immediately after detection.<\/p>\n<p>Our broadcast business runs on-premise whilst our digital TV business is hosted entirely on the cloud. From creation to consumption, media production networks and media storage locations need to be access-controlled in order to defend from intrusion, particularly as reputational risk is tremendous in broadcasting.<\/p>\n<p>The future of cybersecurity will be grounded in continuous monitoring and increasing the level of our adversaries\u2019 discomfort, so they no longer attack and\/or remain persistent within our networks. To this end, we engage Trend Micro\u2122\u00a0Deep Security\u2122 platform as our underlying foundation for server security both on-premise and in the cloud. This is critical as Mediacorp has a diversified range of operating systems and Trend Micro provides end-to-end solutions that safeguard all our operating layers.<\/p>\n<p><strong>Evolving risks and human links<\/strong><\/p>\n<p>Perhaps more than anything else, organisations need to see cyberattacks as a business risk and leadership at the\u00a0highest levels have to take accountability, so we can move the needle on keeping such incidences at bay.<\/p>\n<p>The danger is that the eyes of the C-suite will often glaze over at too much talk of technology and then recoil at mentions of cost \u2013 money that would not be available for funding marketing or growth.<\/p>\n<p>This needs to change.<\/p>\n<p>To reinforce their dungeons, broadcasters need to do more than just adopt technical standards. They must also revise their overall approach to security at a human and logistical level.<\/p>\n<p>Internally, we have cybersecurity awareness programs in place to upskill employees \u2013 encompassing the C-level \u2013 over lunch-and-learn sessions and formal training programs for accreditation. On an infrastructure level, we make sure we are always on our toes by conducting regular, authorized simulated attacks on computer systems to evaluate our security preparedness in a virtual setting.<\/p>\n<p>Only then can we prevent content delivery from becoming a tragic misadventure.<\/p>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons-2\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Submitted\u00a0by Steve Ng, Lead, Digital Platform Operations, Mediacorp Where there\u2019s money, there has always been crime. But what if money came in the form of intangible digital assets and crime in the form of cyber adversaries? In fantasy role-playing game Dungeons &#38; Dragons, dragons are intelligent, mythical foes defined by their fiery prowess \u2013 boasting&#8230;<br \/>\nThe post A Game of Risk with Broadcasters, Cyber Felons and Dragons appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":25440,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[375,3100,550,5895,307,5377],"class_list":["post-25439","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-business","tag-cyberattacks","tag-cybercrime","tag-mediacorp","tag-security","tag-server-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A Game of Risk with Broadcasters, Cyber Felons and Dragons 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Game of Risk with Broadcasters, Cyber Felons and Dragons 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-20T15:21:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"A Game of Risk with Broadcasters, Cyber Felons and Dragons\",\"datePublished\":\"2019-02-20T15:21:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons\\\/\"},\"wordCount\":672,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons.jpg\",\"keywords\":[\"Business\",\"cyberattacks\",\"Cybercrime\",\"Mediacorp\",\"Security\",\"server security\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons\\\/\",\"name\":\"A Game of Risk with Broadcasters, Cyber Felons and Dragons 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons.jpg\",\"datePublished\":\"2019-02-20T15:21:50+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons.jpg\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Business\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/business\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"A Game of Risk with Broadcasters, Cyber Felons and Dragons\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Game of Risk with Broadcasters, Cyber Felons and Dragons 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons\/","og_locale":"en_US","og_type":"article","og_title":"A Game of Risk with Broadcasters, Cyber Felons and Dragons 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-02-20T15:21:50+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"A Game of Risk with Broadcasters, Cyber Felons and Dragons","datePublished":"2019-02-20T15:21:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons\/"},"wordCount":672,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons.jpg","keywords":["Business","cyberattacks","Cybercrime","Mediacorp","Security","server security"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons\/","url":"https:\/\/www.threatshub.org\/blog\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons\/","name":"A Game of Risk with Broadcasters, Cyber Felons and Dragons 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons.jpg","datePublished":"2019-02-20T15:21:50+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons.jpg","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/a-game-of-risk-with-broadcasters-cyber-felons-and-dragons\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Business","item":"https:\/\/www.threatshub.org\/blog\/tag\/business\/"},{"@type":"ListItem","position":3,"name":"A Game of Risk with Broadcasters, Cyber Felons and Dragons"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25439","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=25439"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25439\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/25440"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=25439"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=25439"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=25439"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}