{"id":36109,"date":"2020-07-16T13:16:37","date_gmt":"2020-07-16T13:16:37","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=544339"},"modified":"2020-07-16T13:16:37","modified_gmt":"2020-07-16T13:16:37","slug":"fixing-cloud-migration-what-goes-wrong-and-why","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/fixing-cloud-migration-what-goes-wrong-and-why\/","title":{"rendered":"Fixing cloud migration: What goes wrong and why?"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"166\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/07\/LetsTalk-300x166.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/07\/LetsTalk-300x166.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/07\/LetsTalk-640x353.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/07\/LetsTalk-440x243.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/07\/LetsTalk-380x210.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/07\/LetsTalk.jpg 717w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"> <\/p>\n<p>The cloud space has been evolving for almost a decade. As a company we\u2019re a major cloud user ourselves. That means we\u2019ve built up a huge amount of in-house expertise over the years around cloud migration \u2014 including common challenges and perspectives on how organizations can best approach projects to improve success rates.<\/p>\n<p>As part of our <a href=\"https:\/\/trendtalks.fyi\/cloud\/\">#LetsTalkCloud <\/a>series, we\u2019ve focused on sharing some of this expertise through conversations with our own experts and folks from the industry. To kick off the series, we discussed some of the security challenges solution architects and security engineers face with customers <a href=\"https:\/\/trendtalks.fyi\/cloud\/2019\/real-world-problems\/\">when discussing cloud migrations<\/a>. Spoiler\u2026these challenges may not be what you expect.<\/p>\n<p><strong>&nbsp;<\/strong><\/p>\n<p><strong>Drag and drop<\/strong><\/p>\n<p>This lack of strategy and planning from the start is symptomatic of a broader challenge in many organizations: There\u2019s no big-picture thinking around cloud, only short-term tactical efforts. Sometimes we get the impression that a senior exec has just seen a \u2018cool\u2019 demo at a cloud vendor\u2019s conference and now wants to migrate a host of apps onto that platform. There\u2019s no consideration of how difficult or otherwise this would be, or even whether it\u2019s necessary and desirable.<\/p>\n<p>These issues are compounded by organizational siloes. The larger the customer, the larger and more established their individual teams are likely to be, which can make communication a major challenge. Even if you have a dedicated cloud team to work on a project, they may not be talking to other key stakeholders in DevOps or security, for example.<\/p>\n<p>The result is that, in many cases, tools, applications, policies, and more are forklifted over from on-premises environments to the cloud. This ends up becoming incredibly expensive. as these organizations are not really changing anything. All they are doing is adding an extra middleman, without taking advantage of the benefits of cloud-native tools like microservices, containers, and serverless.<\/p>\n<p>There\u2019s often no visibility or control. Organizations don\u2019t understand they need to lockdown all their containers and sanitize APIs, for example. Plus, there\u2019s no authority given to cloud teams around governance, cost management, and policy assignment, so things just run out of control. Often, shared responsibility isn\u2019t well understood, especially in the new world of DevOps pipelines, so security isn\u2019t applied to the right areas.<\/p>\n<p><strong>&nbsp;<\/strong><\/p>\n<p><strong>Getting it right<\/strong><\/p>\n<p>These aren\u2019t easy problems to solve. From a security perspective, it seems we still have a job to do in educating the market about shared responsibility in the cloud, especially when it comes to newer technologies, like serverless and containers. Every time there\u2019s a new way of deploying an app, it seems like people make the same mistakes all over again \u2014 presuming the vendors are in charge of security.<\/p>\n<p>Automation is a key ingredient of successful migrations. Organizations should be automating everywhere, including policies and governance, to bring more consistency to projects and keep costs under control. In doing so, they must realize that this may require a redesign of apps, and a change in the tools they use to deploy and manage those apps.<\/p>\n<p>Ultimately, you can migrate apps to the cloud in a couple of clicks. But the governance, policy, and management that must go along with this is often forgotten. That\u2019s why you need clear strategic objectives and careful planning to secure more successful outcomes. It may not be very sexy, but it\u2019s the best way forward.<\/p>\n<p>To learn more about cloud migration, check out our <a href=\"https:\/\/blog.trendmicro.com\/principles-of-a-cloud-migration-from-step-one-to-done\/\">blog series<\/a>. And catch up on all <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/campaigns\/art-of-cybersecurity\/devops.html?utm_campaign=DIG2020_Hybrid-Cloud_AW_DvOp&amp;utm_medium=Display&amp;utm_source=Prospecting_Publisher_Nativo&amp;utm_content=Blog_July\">of the latest trends in DevOps <\/a>to learn more about securing your cloud environment.<!-- AddThis Advanced Settings above via filter on the_content --><!-- AddThis Advanced Settings below via filter on the_content --><!-- AddThis Button BEGIN --><\/p>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/fixing-cloud-migration-what-goes-wrong-and-why\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#160; The cloud space has been evolving for almost a decade. As a company we\u2019re a major cloud user ourselves. That means we\u2019ve built up a huge amount of in-house expertise over the years around cloud migration \u2014 including common challenges and perspectives on how organizations can best approach projects to improve success rates. As&#8230;<br \/>\nThe post Fixing cloud migration: What goes wrong and why? appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":36110,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[1252,1253,8568,536],"class_list":["post-36109","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-cloud","tag-cloud-computing","tag-cloud-migration","tag-cloud-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Fixing cloud migration: What goes wrong and why? 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/fixing-cloud-migration-what-goes-wrong-and-why\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fixing cloud migration: What goes wrong and why? 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/fixing-cloud-migration-what-goes-wrong-and-why\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-16T13:16:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/fixing-cloud-migration-what-goes-wrong-and-why.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"166\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/fixing-cloud-migration-what-goes-wrong-and-why\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/fixing-cloud-migration-what-goes-wrong-and-why\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Fixing cloud migration: What goes wrong and why?\",\"datePublished\":\"2020-07-16T13:16:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/fixing-cloud-migration-what-goes-wrong-and-why\/\"},\"wordCount\":614,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/fixing-cloud-migration-what-goes-wrong-and-why\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/fixing-cloud-migration-what-goes-wrong-and-why.jpg\",\"keywords\":[\"cloud\",\"cloud computing\",\"cloud migration\",\"Cloud Security\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/fixing-cloud-migration-what-goes-wrong-and-why\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/fixing-cloud-migration-what-goes-wrong-and-why\/\",\"name\":\"Fixing cloud migration: What goes wrong and why? 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/fixing-cloud-migration-what-goes-wrong-and-why\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/fixing-cloud-migration-what-goes-wrong-and-why\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/fixing-cloud-migration-what-goes-wrong-and-why.jpg\",\"datePublished\":\"2020-07-16T13:16:37+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/fixing-cloud-migration-what-goes-wrong-and-why\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/fixing-cloud-migration-what-goes-wrong-and-why\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/fixing-cloud-migration-what-goes-wrong-and-why\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/fixing-cloud-migration-what-goes-wrong-and-why.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/fixing-cloud-migration-what-goes-wrong-and-why.jpg\",\"width\":300,\"height\":166},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/fixing-cloud-migration-what-goes-wrong-and-why\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"cloud\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/cloud\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Fixing cloud migration: What goes wrong and why?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fixing cloud migration: What goes wrong and why? 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/fixing-cloud-migration-what-goes-wrong-and-why\/","og_locale":"en_US","og_type":"article","og_title":"Fixing cloud migration: What goes wrong and why? 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/fixing-cloud-migration-what-goes-wrong-and-why\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-07-16T13:16:37+00:00","og_image":[{"width":300,"height":166,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/fixing-cloud-migration-what-goes-wrong-and-why.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/fixing-cloud-migration-what-goes-wrong-and-why\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/fixing-cloud-migration-what-goes-wrong-and-why\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Fixing cloud migration: What goes wrong and why?","datePublished":"2020-07-16T13:16:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/fixing-cloud-migration-what-goes-wrong-and-why\/"},"wordCount":614,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/fixing-cloud-migration-what-goes-wrong-and-why\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/fixing-cloud-migration-what-goes-wrong-and-why.jpg","keywords":["cloud","cloud computing","cloud migration","Cloud Security"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/fixing-cloud-migration-what-goes-wrong-and-why\/","url":"https:\/\/www.threatshub.org\/blog\/fixing-cloud-migration-what-goes-wrong-and-why\/","name":"Fixing cloud migration: What goes wrong and why? 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/fixing-cloud-migration-what-goes-wrong-and-why\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/fixing-cloud-migration-what-goes-wrong-and-why\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/fixing-cloud-migration-what-goes-wrong-and-why.jpg","datePublished":"2020-07-16T13:16:37+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/fixing-cloud-migration-what-goes-wrong-and-why\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/fixing-cloud-migration-what-goes-wrong-and-why\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/fixing-cloud-migration-what-goes-wrong-and-why\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/fixing-cloud-migration-what-goes-wrong-and-why.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/fixing-cloud-migration-what-goes-wrong-and-why.jpg","width":300,"height":166},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/fixing-cloud-migration-what-goes-wrong-and-why\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"cloud","item":"https:\/\/www.threatshub.org\/blog\/tag\/cloud\/"},{"@type":"ListItem","position":3,"name":"Fixing cloud migration: What goes wrong and why?"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36109","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=36109"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36109\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/36110"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=36109"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=36109"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=36109"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}