{"id":38994,"date":"2021-01-05T07:00:12","date_gmt":"2021-01-05T07:00:12","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it\/"},"modified":"2021-01-05T07:00:12","modified_gmt":"2021-01-05T07:00:12","slug":"think-youre-hot-stuff-when-it-comes-to-infosec-prove-it","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it\/","title":{"rendered":"Think you\u2019re hot stuff when it comes to infosec? Prove it"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2019\/10\/11\/shutterstock_woman_cliche_hacker.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><span data-label=\"promo\">Promo<\/span> You know you\u2019re good in the trenches when it comes to cybersecurity. You might even have done a stack load of courses to ensure that you\u2019ve filled in any gaps in your knowledge. Your colleagues know they can depend on you.<\/p>\n<p>But when it comes to the world at large, and future employers in particular, are you sure they\u2019ll happily take your word on just how handy you are?<\/p>\n<p>The fact is that having the right certification gives employers, partners, and other interested parties, the reassurance that you\u2019re not just talking a good game, but that you can play cybersec hardball with the rest of them.<\/p>\n<p>And when it comes to cybersec certifications, <a target=\"_blank\" href=\"https:\/\/go.theregister.com\/k\/sans_institute_giac\" rel=\"noopener noreferrer\">GIAC<\/a> is the gold standard. The organisation takes pride in certifications that \u201crather than skimming the surface of different skillsets\u2026are a mile deep for specialised job-focused tasks.\u201d And GIAC exams with Cyberlive don\u2019t just test you on the theory, but show you\u2019ve proven your skills in lab-based situations. You can see the full line up right <a target=\"_blank\" href=\"https:\/\/go.theregister.com\/k\/sans_institute-giac\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n<p>Crucially, GIAC\u2019s certifications are valid for four years. A lot can happen in that time, and by keeping your qualifications up to date, you, and your colleagues, and your employers or clients, can be sure that your skills are sharp enough to deal with today\u2019s problems, not the problems of four years ago.<\/p>\n<p>And if that has you pondering whether to add to your skills armoury, you might want to consider that research by Fortinet recently revealed the hardest to hire for position at present is Cloud Security Architect. And yes, 2020 saw the debut of GIAC\u2019s GCSA: <a target=\"_blank\" href=\"https:\/\/go.theregister.com\/k\/sans_gcsa\" rel=\"noopener noreferrer\">GIAC Cloud Security Architect<\/a>, which is associated with <a target=\"_blank\" href=\"https:\/\/go.theregister.com\/k\/secure-devops-cloud-application-security\" rel=\"noopener noreferrer\">SANS\u2019 Cloud Security and DevOps Automation course<\/a>.<\/p>\n<p>In fact, most SANS courses, which are considered the cutting edge in infosec training, have a corresponding GIAC certification, and you can usually register for certification at the same time you book your course.<\/p>\n<p>As the world goes into winter hibernation, you\u2019re probably going to take a little time to reflect on your ambitions and skillsets. You might even do a little online training, just to keep your hand in. But, as you\u2019re taking down your holiday cards this week, just ask yourself whether a freshly minted GIAC certification is just the thing to hang up in its space.<\/p>\n<p><i>Brought to you by SANS Institute<\/i>.<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2021\/01\/05\/update_your_giac_certs\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This year\u2019s New Year Resolution: Update your GIAC certs Promo\u00a0 You know you\u2019re good in the trenches when it comes to cybersecurity. You might even have done a stack load of courses to ensure that you\u2019ve filled in any gaps in your knowledge. Your colleagues know they can depend on you.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":38995,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-38994","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Think you\u2019re hot stuff when it comes to infosec? Prove it 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Think you\u2019re hot stuff when it comes to infosec? Prove it 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-05T07:00:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Think you\u2019re hot stuff when it comes to infosec? Prove it\",\"datePublished\":\"2021-01-05T07:00:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it\\\/\"},\"wordCount\":415,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it\\\/\",\"name\":\"Think you\u2019re hot stuff when it comes to infosec? Prove it 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it.jpg\",\"datePublished\":\"2021-01-05T07:00:12+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it.jpg\",\"width\":1000,\"height\":667},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Think you\u2019re hot stuff when it comes to infosec? Prove it\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Think you\u2019re hot stuff when it comes to infosec? Prove it 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it\/","og_locale":"en_US","og_type":"article","og_title":"Think you\u2019re hot stuff when it comes to infosec? Prove it 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-01-05T07:00:12+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Think you\u2019re hot stuff when it comes to infosec? Prove it","datePublished":"2021-01-05T07:00:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it\/"},"wordCount":415,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it\/","url":"https:\/\/www.threatshub.org\/blog\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it\/","name":"Think you\u2019re hot stuff when it comes to infosec? Prove it 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it.jpg","datePublished":"2021-01-05T07:00:12+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it.jpg","width":1000,"height":667},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/think-youre-hot-stuff-when-it-comes-to-infosec-prove-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Think you\u2019re hot stuff when it comes to infosec? Prove it"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38994","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=38994"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38994\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/38995"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=38994"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=38994"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=38994"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}