{"id":36100,"date":"2020-07-15T16:00:43","date_gmt":"2020-07-15T16:00:43","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=91549"},"modified":"2020-07-15T16:00:43","modified_gmt":"2020-07-15T16:00:43","slug":"ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management\/","title":{"rendered":"CISO Stressbusters Post #3: 3 ways to share accountability for security risk management"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/07\/MSC17_kendallClawson_007-7-15-BANNER.png\" class=\"ff-og-image-inserted\"><\/div>\n<p><em>Jim Eckart, former Chief Information Security Officer (CISO) of The Coca-Cola Company and current Chief Security Advisor at Microsoft shares his advice for relieving stress in today\u2019s CISO Stressbuster post.<\/em><\/p>\n<p>If you are a CISO, it can feel like the responsibility for keeping the company secure rests solely on your shoulders. This may be an attitude that\u2019s shared by your organization or a mindset based on your own sense of duty, but either way, it can cause a tremendous amount of stress\u2014and it may not make your organization more secure.<\/p>\n<p>Although I currently work as a Chief Security Advisor at Microsoft, I\u2019ve spent the last decade of my career as a CISO in companies like Eli Lilly and Coca-Cola. I know first-hand how stressful this role can be. Distributing accountability can alleviate some of the pressure. It can also help you bring in new ideas and build a security culture. For the third blog in the CISO stressbusters series, here are three tips for sharing security accountability within and outside your organization.<\/p>\n<h3>1. Establish a cyber risk management governance committee<\/h3>\n<p>After a series of well-published breaches at big brands, most boards and executive teams have acknowledged that a security incident isn\u2019t just a technology risk, it\u2019s a business risk. But often security is still treated as something that gets bolted on at the end. This can result in risky decisions that may be hard to fix later.<\/p>\n<p>To effectively manage cyber risk, organizations need to evaluate the security risks of all major initiatives from the very beginning. For each project, people need to understand the risk tolerance of the company, the potential upsides of the project, and the risks in order to make smart decisions. This requires participation of business owners, security experts, and IT.<\/p>\n<p>When I was hired at Coca-Cola, one of the first things I did was re-assemble the cyber risk management committee. This is a cross-functional stakeholder group responsible for making risk decisions on behalf of the entire enterprise. By including people from across the organization, we were able to align IT projects to business risk-based decisions. It took several meetings of this committee to get the business representation right and executives working effectively together, but it was worth the time. Now people across the organization have a stake in security.<\/p>\n<h3>2. Bring in third party expertise<\/h3>\n<p>One of the toughest jobs of the CISO is influencing a culture shift. Whether you\u2019re trying to get funding for your cybersecurity strategy or convince employees not to click on links in unknown emails, you need to persuade others to take security seriously. This can be a long process that requires regular communication, but a cybersecurity consulting company can help smooth the road.<\/p>\n<p>An outside consultant can bring expertise and perspective that you and your team don\u2019t have. They also aren\u2019t restrained by the culture and internal politics in the same way that you might be. Most importantly, a third party can help you validate ideas and provide credibility. At Coca-Cola, I hired an external firm to do a top-to-bottom, independent security assessment, whose findings they ultimately presented to our Board. This drove proper strategic alignment and funding priorities for the implementation of my cybersecurity program.<\/p>\n<h3><em>3. <\/em>Join an external cybersecurity group<\/h3>\n<p>To stay up to date, compare notes, or get advice, it can be really valuable to talk to CISOs at other companies with similar challenges. This can be tricky when much of our work is highly confidential. I joined two groups that are governed by confidentiality agreements. The Gartner Information Risk Management Research Board is a collection of 35-40 Fortune 500 CISOs. I was also a member of the CIO Strategy Exchange (CIOSE). With these groups, I developed long-standing and highly trusted relationships with peers in companies as large as mine.<em>&nbsp;<\/em><\/p>\n<h3>Looking ahead<\/h3>\n<p>As a CISO you are under a lot of pressure. Even with a good support network, this is a stressful job. As you build and manage your security operation, look for ways to share accountability with others. It will help you sleep better at night, and it will strengthen your security culture. In the meantime, stay tuned for the next CISO Stressbuster post for more advice from others in the trenches.<\/p>\n<p>Did you find these insights helpful? What would you tell your fellow CISOs about overcoming obstacles?&nbsp; What works for you? Please reach out to Diana Kelley on <a href=\"https:\/\/www.linkedin.com\/in\/dianakelleysecuritycurve\/\" target=\"_blank\" rel=\"noopener noreferrer\">LinkedIn<\/a> if you\u2019re interested in being interviewed for one of our upcoming posts.<\/p>\n<p>For more information about Microsoft security solutions visit our <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" target=\"_blank\" rel=\"noopener noreferrer\">website.<\/a> Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/07\/15\/ciso-stressbusters-post-3-accountability-security-risk-management\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>CISO Stressbusters: CISO guidance and support from around the world.<br \/>\nThe post CISO Stressbusters Post #3: 3 ways to share accountability for security risk management appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":36101,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[7835,6577,6579,347,2564],"class_list":["post-36100","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-ciso","tag-ciso-series","tag-ciso-series-page","tag-cybersecurity","tag-cybersecurity-policy"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CISO Stressbusters Post #3: 3 ways to share accountability for security risk management 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISO Stressbusters Post #3: 3 ways to share accountability for security risk management 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-15T16:00:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management.png\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"263\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"CISO Stressbusters Post #3: 3 ways to share accountability for security risk management\",\"datePublished\":\"2020-07-15T16:00:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management\/\"},\"wordCount\":809,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management.png\",\"keywords\":[\"CISO\",\"CISO series\",\"Ciso series page\",\"Cybersecurity\",\"Cybersecurity Policy\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management\/\",\"name\":\"CISO Stressbusters Post #3: 3 ways to share accountability for security risk management 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management.png\",\"datePublished\":\"2020-07-15T16:00:43+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management.png\",\"width\":500,\"height\":263},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISO\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/ciso\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"CISO Stressbusters Post #3: 3 ways to share accountability for security risk management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CISO Stressbusters Post #3: 3 ways to share accountability for security risk management 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management\/","og_locale":"en_US","og_type":"article","og_title":"CISO Stressbusters Post #3: 3 ways to share accountability for security risk management 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-07-15T16:00:43+00:00","og_image":[{"width":500,"height":263,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"CISO Stressbusters Post #3: 3 ways to share accountability for security risk management","datePublished":"2020-07-15T16:00:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management\/"},"wordCount":809,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management.png","keywords":["CISO","CISO series","Ciso series page","Cybersecurity","Cybersecurity Policy"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management\/","url":"https:\/\/www.threatshub.org\/blog\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management\/","name":"CISO Stressbusters Post #3: 3 ways to share accountability for security risk management 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management.png","datePublished":"2020-07-15T16:00:43+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management.png","width":500,"height":263},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/ciso-stressbusters-post-3-3-ways-to-share-accountability-for-security-risk-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"CISO","item":"https:\/\/www.threatshub.org\/blog\/tag\/ciso\/"},{"@type":"ListItem","position":3,"name":"CISO Stressbusters Post #3: 3 ways to share accountability for security risk management"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36100","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=36100"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36100\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/36101"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=36100"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=36100"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=36100"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}