{"id":31901,"date":"2019-11-19T14:12:03","date_gmt":"2019-11-19T14:12:03","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=543409"},"modified":"2019-11-19T14:12:03","modified_gmt":"2019-11-19T14:12:03","slug":"how-to-be-an-informed-skeptic-about-security-predictions","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/how-to-be-an-informed-skeptic-about-security-predictions\/","title":{"rendered":"How To Be An Informed Skeptic About Security Predictions"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/11\/img-cybersecurity-300x300.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"2020 Predictions\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/11\/img-cybersecurity-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/11\/img-cybersecurity-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/11\/img-cybersecurity-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/11\/img-cybersecurity-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/11\/img-cybersecurity-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/11\/img-cybersecurity-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/11\/img-cybersecurity-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><\/p>\n<p>It doesn\u2019t take a wily prediction to see that the cycles of tech procurement and planning are increasingly compressed. In enterprise IT, the two largest forces at play are business changes and technology changes. These two major forces are somewhat independent; a lot of tech change happened during the last economic downturn, and in fact the best predictions during that period involved using tech to navigate the downturn. So watching and understanding both large forces matter.<\/p>\n<p>Security predictions however have both those large forces (business and tech), and the added third large force of The Threat. It\u2019s a common misconception that security predictions are only about threat. Security predictions need to watch tech trends because security doesn\u2019t exist in a vacuum: Security is applied to technology and if tech changes, so too must security. How the business will change is a unique lens for security: remote workforces, new payment methods, cloud adoption, open banking standards, and new regulations are examples of how business changes drove security in new directions. And the third major force of threat trends is the special territory of security and is linked to the other two forces.<\/p>\n<p>Security predictions aren\u2019t just headline fodder. Successful enterprise security leaders do look to the future \u2013 as they must. But, they are highly skeptical of the majority of security predictions, because most of the predictions are weak. Leaders latch onto those few meaningful predictions as rudders for moving their security organizations forward.<\/p>\n<p>So what makes for a good security prediction? Here\u2019s the characteristics:<\/p>\n<p><strong>Near-Term But Not Long Term<\/strong><\/p>\n<p>Predictions of security in the far future are fun but not useful. The slice of time for utility in security predictions has a near term wall of about 6 months \u2013 this is the reality of procurement actions, and of how long it takes to move the tiller to meaningful change.<\/p>\n<p>A next-day prediction is also cool, but it is either a tactical observation or not something that action can be taken based on. And the far wall I believe is 12-24 months. Anything longer term is likely jetpacks and flying cars given how much can change in business, tech or the threat. I can\u2019t recall a meaningful recent prediction that wasn\u2019t within this 6-24 months window.<\/p>\n<p><strong>Likelihood and Geography<\/strong><\/p>\n<p>No prediction is a sure thing, otherwise it is a fact. How likely is it that the prediction will occur? Even a prediction with a very low likelihood is useful, intimating that the event is unlikely to occur and therefore action likely need not be taken, or at least not in great proportion. The weakest predictions are those that are so watered down in specifics because of weak analysis combined with doubt. \u201cA Bad Thing Will Happen Next Year\u201d is never wrong, and never helpful.<\/p>\n<p>Geography is helpful. Not all threats, business trends or tech adoptions are global, or at least not proportioned equally across the globe. Some great security predictions have watched trends develop in one region and extended the analysis to assess whether the trend would or wouldn\u2019t expand to other regions.<\/p>\n<p><strong>Actionable Is Everything<\/strong><\/p>\n<p>Information is only useful if it can be acted upon. The timeliness window mentioned above touches on the keystone of security predictions:&nbsp; actionability. In addition to being within that golden time window, a prediction must have give rise to something that can be done, something concrete. A great number of bad predictions are concerning threat trends.&nbsp; Changes in some aspect of the threat landscape that don\u2019t actually give rise to some action you can take are pointless commentary. One long running security predictions joke is \u201cNext Year Will Be the Year of PKI\u201d and the prediction is repeated every year.<\/p>\n<p><strong>Beware The Self-Serving Prediction<\/strong><\/p>\n<p>\u201cThe threat our product counters will increase 1000-fold.\u201d Hmmm. Vendor predictions should not be automatically accepted or discounted any more than other predictions; however, there is an added onus on vendor predictions to explain what they base the prediction on. Predictions from vendors must show their work. But, if it is not explained carefully or is too generic it should be filed under \u201cmarketing\u201d rather than \u201cprediction.\u201d As some vendors have large threat research teams and very large numbers of customers, predictions based on that unique data can be highly useful, sometimes more useful than predictions from disinterested third parties who don\u2019t have that pool of data to base it upon. Predictions made in that kind of vacuum of data or deployment reality are usually quickly dismissed by enterprises who live in that reality daily.<\/p>\n<p><strong>Water Is Wet, And the \u201cSo What?\u201d Filter<\/strong><\/p>\n<p>\u201cThreats will happen next year\u201d is a Captain Obvious prediction of no use. Too many security predictions are of the \u201cthreats are bad,\u201d and \u201cattacks will happen\u201d category. This falls afoul of the Actionable test, but it also a sign of lazy thinking. These \u201cUnpredictions\u201d often have a kernel of high use and actionability that only takes some work to uncover. I call this the \u201cSo What Filter.\u201d When there isn\u2019t anything highly actionable in the assertion, I keep asking \u201cSo What?\u201d until what goes through the filter has meaning.<\/p>\n<p>For example. Last year one data set showed threats on the increase. So What? The majority of the increase was Cryptomining. OK, slightly interesting, but So What? Ransomware was on the decline for that quarter, but increased next quarter while Cryptomining took a relative dip. Ahhhh\u2026 So What? The cause of that event was that Bitcoin-to-dollar exchange took a dip, meaning Cryptomining is less popular when it is less profitable based on that exchange. We\u2019re getting there\u2026 So What? Cryptomining increases at the expense of Ransomware when Bitcoin rates are high, as ransoms can set their own price. Bingo. Action can be taken on this, including having a new security metric to watch \u2013 Bitcoin exchange rates.<\/p>\n<p><strong>Bottom Line<\/strong><\/p>\n<p>Don\u2019t discount all security predictions, and be an informed consumer of those you adopt as part of your planning. Security predictions can be very powerful in demonstrating to management and the business why your security plan is structured in a certain way, and to justify either the investments or the absence of investment. The three major forces change, so your attachment to trends and predictions must be frequently adjusted.<\/p>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/how-to-be-an-informed-skeptic-about-security-predictions\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It doesn\u2019t take a wily prediction to see that the cycles of tech procurement and planning are increasingly compressed. In enterprise IT, the two largest forces at play are business changes and technology changes. These two major forces are somewhat independent; a lot of tech change happened during the last economic downturn, and in fact&#8230;<br \/>\nThe post How To Be An Informed Skeptic About Security Predictions appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":31902,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[307,5151,8279],"class_list":["post-31901","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-security","tag-security-predictions","tag-technology-predictions"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How To Be An Informed Skeptic About Security Predictions 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/how-to-be-an-informed-skeptic-about-security-predictions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How To Be An Informed Skeptic About Security Predictions 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/how-to-be-an-informed-skeptic-about-security-predictions\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-19T14:12:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/how-to-be-an-informed-skeptic-about-security-predictions.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-to-be-an-informed-skeptic-about-security-predictions\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-to-be-an-informed-skeptic-about-security-predictions\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"How To Be An Informed Skeptic About Security Predictions\",\"datePublished\":\"2019-11-19T14:12:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-to-be-an-informed-skeptic-about-security-predictions\/\"},\"wordCount\":1064,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-to-be-an-informed-skeptic-about-security-predictions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/how-to-be-an-informed-skeptic-about-security-predictions.jpg\",\"keywords\":[\"Security\",\"security predictions\",\"technology predictions\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-to-be-an-informed-skeptic-about-security-predictions\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/how-to-be-an-informed-skeptic-about-security-predictions\/\",\"name\":\"How To Be An Informed Skeptic About Security Predictions 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-to-be-an-informed-skeptic-about-security-predictions\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-to-be-an-informed-skeptic-about-security-predictions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/how-to-be-an-informed-skeptic-about-security-predictions.jpg\",\"datePublished\":\"2019-11-19T14:12:03+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-to-be-an-informed-skeptic-about-security-predictions\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/how-to-be-an-informed-skeptic-about-security-predictions\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-to-be-an-informed-skeptic-about-security-predictions\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/how-to-be-an-informed-skeptic-about-security-predictions.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/how-to-be-an-informed-skeptic-about-security-predictions.jpg\",\"width\":300,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-to-be-an-informed-skeptic-about-security-predictions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How To Be An Informed Skeptic About Security Predictions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How To Be An Informed Skeptic About Security Predictions 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/how-to-be-an-informed-skeptic-about-security-predictions\/","og_locale":"en_US","og_type":"article","og_title":"How To Be An Informed Skeptic About Security Predictions 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/how-to-be-an-informed-skeptic-about-security-predictions\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-11-19T14:12:03+00:00","og_image":[{"width":300,"height":300,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/how-to-be-an-informed-skeptic-about-security-predictions.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/how-to-be-an-informed-skeptic-about-security-predictions\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-be-an-informed-skeptic-about-security-predictions\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"How To Be An Informed Skeptic About Security Predictions","datePublished":"2019-11-19T14:12:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-be-an-informed-skeptic-about-security-predictions\/"},"wordCount":1064,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-be-an-informed-skeptic-about-security-predictions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/how-to-be-an-informed-skeptic-about-security-predictions.jpg","keywords":["Security","security predictions","technology predictions"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/how-to-be-an-informed-skeptic-about-security-predictions\/","url":"https:\/\/www.threatshub.org\/blog\/how-to-be-an-informed-skeptic-about-security-predictions\/","name":"How To Be An Informed Skeptic About Security Predictions 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-be-an-informed-skeptic-about-security-predictions\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-be-an-informed-skeptic-about-security-predictions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/how-to-be-an-informed-skeptic-about-security-predictions.jpg","datePublished":"2019-11-19T14:12:03+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-be-an-informed-skeptic-about-security-predictions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/how-to-be-an-informed-skeptic-about-security-predictions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/how-to-be-an-informed-skeptic-about-security-predictions\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/how-to-be-an-informed-skeptic-about-security-predictions.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/how-to-be-an-informed-skeptic-about-security-predictions.jpg","width":300,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/how-to-be-an-informed-skeptic-about-security-predictions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.threatshub.org\/blog\/tag\/security\/"},{"@type":"ListItem","position":3,"name":"How To Be An Informed Skeptic About Security Predictions"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/31901","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=31901"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/31901\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/31902"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=31901"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=31901"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=31901"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}