{"id":32542,"date":"2019-12-30T19:51:00","date_gmt":"2019-12-30T19:51:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/most-popular-tech-stories-of-2019\/"},"modified":"2019-12-30T19:51:00","modified_gmt":"2019-12-30T19:51:00","slug":"most-popular-tech-stories-of-2019","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/most-popular-tech-stories-of-2019\/","title":{"rendered":"Most popular tech stories of 2019"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2018\/06\/nw_ss_top_ten_supercomputers_2018_slide_01_1200x800-100762093-large.3x2.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Thanks for being part of our inaugural season. Since launching Insider Pro in late July, our goal has been to provide readers with premium content across a wide spectrum of topics. Our coverage ranges from career advice and certification guides to how-to articles and reviews to in-depth reporting from leading tech journalists.<\/p>\n<p>You\u2019ve rewarded us with your time and your subscriptions. We know you\u2019re busy and you may have missed an article or two over the past five months, so we\u2019ve compiled this list of the Top 10 articles based on engagement numbers from our subscribers.<\/p>\n<p>If we missed your favorite or if there are topics you want us to cover in 2020, <a href=\"mailto:dan_muse@idg.com\" rel=\"nofollow\">please let me know<\/a>.<\/p>\n<h2><strong>Top 10 articles of 2019<\/strong><\/h2>\n<h3 class=\"body\"><strong>1. &nbsp;<\/strong><strong><a href=\"https:\/\/www.idginsiderpro.com\/article\/3409100\/insider-pro-tech-resume-template-library.html\">Tech Resume Library: 10 downloadable templates for IT pros<\/a><\/strong><\/h3>\n<p>Getting your resume &#8216;just right&#8217; in order to attract recruiters, HR pros and hiring managers is as daunting as it is critical. To jump start the process, Insider Pro has assembled this collection of real resumes revamped by professional resume writers.<\/p>\n<p>By Insider Pro staff, December 1, 2019 (updated)<\/p>\n<h3 class=\"body\"><strong>2.&nbsp;<a href=\"https:\/\/www.idginsiderpro.com\/article\/3437042\/cloud-security-inside-the-shared-responsibility-model.html\">Cloud security: Inside the shared responsibility model<\/a><\/strong><\/h3>\n<p>The Capital One security fiasco has underlined that securing the cloud is both a complicated technology and contractual problem.<\/p>\n<p>By <a href=\"https:\/\/www.idginsiderpro.com\/author\/Steven-J.-Vaughan_Nichols\/\">Steven J. Vaughan-Nichols<\/a>. September 9, 2019<\/p>\n<h3 class=\"body\"><strong>3. <a href=\"https:\/\/www.idginsiderpro.com\/article\/3449437\/7-mobile-security-threats-that-may-catch-you-by-surprise.html\">7 mobile security threats that may catch you by surprise<\/a><\/strong><\/h3>\n<p>Even if you&#8217;re usually savvy about cybersecurity, anyone can have a vulnerable moment (in our writer&#8217;s case, it was his mother&#8217;s funeral).<\/p>\n<p>By <a href=\"https:\/\/www.idginsiderpro.com\/author\/James-A.-Martin\/\">James A. Martin<\/a>, November 27, 2019<\/p>\n<h3 class=\"body\"><strong>4. <a href=\"https:\/\/www.idginsiderpro.com\/article\/3438144\/10-steps-to-a-successful-digital-transformation.html\">10 steps to a successful digital transformation<\/a><\/strong><\/h3>\n<p>Digital leaders must identify future technology and customer expectation trends and then muster the courage to dismantle existing structures. Failure could leave them victims of fast-moving all-digital startups.<\/p>\n<p>By <a href=\"https:\/\/www.idginsiderpro.com\/author\/Jonny-Evans\/\">Jonny Evans<\/a>, September 16, 2019<\/p>\n<h3 class=\"body\"><strong>5. <a href=\"https:\/\/www.idginsiderpro.com\/article\/3454276\/fighting-holiday-fraud-5-ways-ecommerce-retailers-can-boost-security.html\">Fighting holiday fraud: 5 ways ecommerce retailers can boost security<\/a><\/strong><\/h3>\n<p>Everyone loves online shopping &#8212; especially cybercriminals. If you\u2019re a small or midsize ecommerce retailer you are the biggest target this holiday season, but it\u2019s not too late to protect yourself and your customers.<\/p>\n<p>By <a href=\"https:\/\/www.idginsiderpro.com\/author\/Sharon-Goldman\/\">Sharon Goldman<\/a>,|November 18, 2019<\/p>\n<h3 class=\"body\"><strong>6. <a href=\"https:\/\/www.idginsiderpro.com\/article\/3446503\/career-roadmap-network-architect.html\">Career roadmap: Network architect<\/a><\/strong><\/h3>\n<p>With the growing use of mobile devices and apps, edge computing,and IoT, the network architect role has become more complex and more important to the success of the enterprise.<\/p>\n<p>By <a href=\"https:\/\/www.idginsiderpro.com\/author\/Bob-Violino\/\">Bob Violino<\/a>, October 31, 2019<\/p>\n<h3 class=\"body\"><strong>7. <a href=\"https:\/\/www.idginsiderpro.com\/article\/3410799\/state-of-the-cloud-in-2019.html\">State of the cloud in 2019<\/a><\/strong><\/h3>\n<p>The cloud is the perennial metatrend of enterprise tech, yet it remains poorly understood. Peek under the hood and today\u2019s real benefits emerge.<\/p>\n<p>By <a href=\"https:\/\/www.idginsiderpro.com\/author\/Eric-Knorr\/\">Eric Knorr<\/a>, July 30, 2019<\/p>\n<h3 class=\"body\"><strong>8. <a href=\"https:\/\/www.idginsiderpro.com\/article\/3482096\/good-tech-talent-is-still-hard-to-find-how-to-bridge-the-gap.html\">Good tech talent is still hard to find (how to bridge the gap)<\/a><\/strong><\/h3>\n<p>Companies have big plans for digital transformation, but the lack of skilled IT talent remains an obstacle. Here\u2019s how to cope.<\/p>\n<p>By <a href=\"https:\/\/www.idginsiderpro.com\/author\/Beth-Stackpole\/\">Beth Stackpole<\/a>, December 3, 2019<\/p>\n<h3 class=\"body\"><strong>9. <a href=\"https:\/\/www.idginsiderpro.com\/article\/3408337\/guide-to-top-security-certifications.html\">Guide to top security certifications<\/a><\/strong><\/h3>\n<p>Security professionals are in demand and with the right certification, you\u2019re in even higher demand. To help you decide which certs are for you, we\u2019ve compiled a list of top security certifications &#8212; broken down by category (entry-level, intermediate and advanced).<\/p>\n<p>By <a href=\"https:\/\/www.idginsiderpro.com\/author\/Neal-Weinberg\/\">Neal Weinberg<\/a>, July 29, 2019<\/p>\n<h3 class=\"body\"><strong>10. <a href=\"https:\/\/www.idginsiderpro.com\/article\/3452839\/why-kubernetes-is-vital-for-your-business.html\">Why Kubernetes is vital for your business<\/a><\/strong><\/h3>\n<p>To manage moving all your server applications to the cloud in containers you\u2019ll need to do some container orchestration, that&#8217;s where Kubernetes comes in.<\/p>\n<p>By <a href=\"https:\/\/www.idginsiderpro.com\/author\/Steven-J.-Vaughan_Nichols\/\">Steven J. Vaughan-Nichols<\/a>, November 13, 2019<\/p>\n<p> READ MORE <a href=\"https:\/\/www.idginsiderpro.com\/article\/3511958\/most-popular-tech-stories-of-2019.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Insider Pro subscribers pick the Top 10 articles published in our debut year. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":32543,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[1310,1253,1309,7780,163,762,307,8308],"class_list":["post-32542","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-careers","tag-cloud-computing","tag-it-leadership","tag-it-strategy","tag-mobile","tag-networking","tag-security","tag-skills-and-training"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Most popular tech stories of 2019 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/most-popular-tech-stories-of-2019\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Most popular tech stories of 2019 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/most-popular-tech-stories-of-2019\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-30T19:51:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/most-popular-tech-stories-of-2019.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/most-popular-tech-stories-of-2019\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/most-popular-tech-stories-of-2019\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Most popular tech stories of 2019\",\"datePublished\":\"2019-12-30T19:51:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/most-popular-tech-stories-of-2019\\\/\"},\"wordCount\":543,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/most-popular-tech-stories-of-2019\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/most-popular-tech-stories-of-2019.jpg\",\"keywords\":[\"Careers\",\"cloud computing\",\"IT Leadership\",\"IT Strategy\",\"Mobile\",\"Networking\",\"Security\",\"Skills and Training\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/most-popular-tech-stories-of-2019\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/most-popular-tech-stories-of-2019\\\/\",\"name\":\"Most popular tech stories of 2019 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/most-popular-tech-stories-of-2019\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/most-popular-tech-stories-of-2019\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/most-popular-tech-stories-of-2019.jpg\",\"datePublished\":\"2019-12-30T19:51:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/most-popular-tech-stories-of-2019\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/most-popular-tech-stories-of-2019\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/most-popular-tech-stories-of-2019\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/most-popular-tech-stories-of-2019.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/most-popular-tech-stories-of-2019.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/most-popular-tech-stories-of-2019\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Careers\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/careers\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Most popular tech stories of 2019\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Most popular tech stories of 2019 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/most-popular-tech-stories-of-2019\/","og_locale":"en_US","og_type":"article","og_title":"Most popular tech stories of 2019 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/most-popular-tech-stories-of-2019\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-12-30T19:51:00+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/most-popular-tech-stories-of-2019.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/most-popular-tech-stories-of-2019\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/most-popular-tech-stories-of-2019\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Most popular tech stories of 2019","datePublished":"2019-12-30T19:51:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/most-popular-tech-stories-of-2019\/"},"wordCount":543,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/most-popular-tech-stories-of-2019\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/most-popular-tech-stories-of-2019.jpg","keywords":["Careers","cloud computing","IT Leadership","IT Strategy","Mobile","Networking","Security","Skills and Training"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/most-popular-tech-stories-of-2019\/","url":"https:\/\/www.threatshub.org\/blog\/most-popular-tech-stories-of-2019\/","name":"Most popular tech stories of 2019 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/most-popular-tech-stories-of-2019\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/most-popular-tech-stories-of-2019\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/most-popular-tech-stories-of-2019.jpg","datePublished":"2019-12-30T19:51:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/most-popular-tech-stories-of-2019\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/most-popular-tech-stories-of-2019\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/most-popular-tech-stories-of-2019\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/most-popular-tech-stories-of-2019.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/most-popular-tech-stories-of-2019.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/most-popular-tech-stories-of-2019\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Careers","item":"https:\/\/www.threatshub.org\/blog\/tag\/careers\/"},{"@type":"ListItem","position":3,"name":"Most popular tech stories of 2019"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32542","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=32542"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32542\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/32543"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=32542"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=32542"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=32542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}