{"id":39280,"date":"2021-01-25T17:00:39","date_gmt":"2021-01-25T17:00:39","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=92635"},"modified":"2021-01-25T17:00:39","modified_gmt":"2021-01-25T17:00:39","slug":"identity-governance-the-power-of-why-not","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/identity-governance-the-power-of-why-not\/","title":{"rendered":"Identity governance: The power of \u201cWhy not?\u201d"},"content":{"rendered":"<p><i><span data-contrast=\"auto\">Innovation requires the courage to take risks and the leadership skills to show others that risks are worth taking.&nbsp;<\/span><\/i><i><span data-contrast=\"auto\">That\u2019s<\/span><\/i><i><span data-contrast=\"auto\">&nbsp;why I love working with people like Joe&nbsp;<\/span><\/i><i><span data-contrast=\"auto\">Dadzie<\/span><\/i><i><span data-contrast=\"auto\">, a partner group program manager in identity governance. Joe has a long history of championing disruptive technology breakthroughs and delivering for our customers.&nbsp;<\/span><\/i><i><span data-contrast=\"auto\">He\u2019s<\/span><\/i><i><span data-contrast=\"auto\">&nbsp;never shied away from pushing boundaries or breaking free from \u201cthe way we\u2019ve always done things\u201d to build better solutions. By his example, he inspires fearlessness in his team and in those he mentors. Joe\u2019s achievements remind all of us in identity that when we focus on the needs of our customers, everyone wins. I hope you enjoy his remarkable story.<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<h3><strong>The power of \u201cWhy not?\u201d&nbsp;<\/strong><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-92639\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/01\/joe-headshot-2-1024x929.jpg\" alt=\"A profile headshot of Joe&nbsp;Dadzie, wearing a grey shirt against a cream-colored wall. \" width=\"357\" height=\"324\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/01\/joe-headshot-2-1024x929.jpg 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/01\/joe-headshot-2-300x272.jpg 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/01\/joe-headshot-2-768x697.jpg 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/01\/joe-headshot-2.jpg 1070w\" sizes=\"auto, (max-width: 357px) 100vw, 357px\"><\/p>\n<p><span data-contrast=\"auto\">The first time Joe&nbsp;<\/span><span data-contrast=\"auto\">Dadzie<\/span><span data-contrast=\"auto\"> traveled outside his native Ghana, in 1991, he flew to Boston on a one-way ticket. \u201cI had no freaking clue what the <\/span>U.S. was like,\u201d he laughs. Inspired by a U.S.<span data-contrast=\"auto\">&nbsp;State Department advisor whose husband was the first Ghanaian ever to attend Dartmouth, Joe was heading to the New Hampshire-based college to study engineering. \u201cI didn\u2019t know anything about computers,\u201d he admits. \u201cAnd I had <\/span><i><span data-contrast=\"auto\">no<\/span><\/i><span data-contrast=\"auto\">&nbsp;idea New Hampshire would be so cold!\u201d<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">Thirty years later, Joe works in a warmer climate, designing governance technologies in the identity division at Microsoft. \u201cOrganizations have security and compliance requirements,\u201d he explains. \u201cThey need to reduce the risk of data loss or leakage, and if they\u2019re in regulated industries, they have to pass audits. At the same time, they need to empower their employees to work effectively, with the fewest possible constraints. My team designs tools to help them.\u201d<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">Every project Joe\u2019s ever worked on started the same way\u2014with some customer challenge he became fixated on solving. \u201cI\u2019m never going to be a computer science dude,\u201d the twenty-five-year software industry veteran confesses. He finds \u201csuper hard problems\u201d infinitely more fascinating than technology. \u201cUtility is more interesting to me because when I look at the groundbreaking technologies I\u2019ve worked on over the years, they rose up, and now some of them are gone.\u201d <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">The successive extinctions of technology paradigms in favor of the \u201chottest new thing\u201d form the mile markers of Joe\u2019s career: from floppies to CDs, from the FAT file system to NTFS, from shrink-wrapped software to cloud-based services. He not only takes change in stride,&nbsp;<\/span><span data-contrast=\"auto\">he<\/span><span data-contrast=\"auto\">&nbsp;pushes it, leading more than one manager to question his sanity.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">\u201cWhen we proposed Windows Update, the whole notion that you could install things over the Internet didn\u2019t exist,\u201d he recalls. People worried about the optics of taking control of people\u2019s machines for automatic updates. \u201cAre you guys&nbsp;<\/span><i><span data-contrast=\"auto\">crazy<\/span><\/i><span data-contrast=\"auto\">? Nobody wants that!\u201d he remembers his colleagues shrieking.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">\u201cWhen we did that first Windows service pack, 250 megabytes over the internet, that was revolutionary,\u201d Joe asserts. \u201cWere we going to bring the internet down? We&nbsp;<\/span><span data-contrast=\"auto\">didn\u2019t<\/span><span data-contrast=\"auto\">. And now, Windows Update is baked in for securing users around the world. It just happens.\u201d Software updates that once started with tearing the plastic off the latest release and inserting a disk happen today<\/span><span data-contrast=\"auto\">&nbsp;<\/span><span data-contrast=\"auto\">whenever someone launches a program. Twenty years after Windows Update first started patching PCs, the whole world goes \u201ccrazy\u201d every day.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">The \u201ctry it\u201d&nbsp;<\/span><\/b><b><span data-contrast=\"auto\">spirit<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/h3>\n<p><span data-contrast=\"auto\">Joe is not, in fact, crazy.&nbsp;<\/span><span data-contrast=\"auto\">He\u2019s<\/span><span data-contrast=\"auto\">&nbsp;simply incurably optimistic, responding to each no-one-has-done-this-before challenge with an unassuming \u201cWhy not?\u201d&nbsp;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">He\u2019s<\/span><span data-contrast=\"auto\">&nbsp;greeted challenges this way since an early age. \u201cWhere I grew up, nobody applied to the top high schools,\u201d Joe says. \u201cI thought it was weird. Why does the teacher say that nobody from our elementary school should apply to this high school? Why not? I think I\u2019m smart enough.\u201d Joe did apply, and he ended up at a top high school in Ghana, where he became a top student\u2014one of the few who achieved a perfect score on the national Ordinary Level&nbsp;<\/span><span data-contrast=\"auto\">General Certificate of Education<\/span><span data-contrast=\"auto\">&nbsp;exam.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">He credits his parents with instilling in him the \u201cyou should be able to try stuff\u201d spirit that got him where he is today. \u201cBoth of them actually left Ghana to study,\u201d Joe says. \u201cThey took this leap of going to England to try something new, did okay, and came back.\u201d Following their lead, Joe applied to colleges in the United States with support from local mentors.<\/span><span data-contrast=\"auto\">&nbsp;<\/span><span data-contrast=\"auto\">The U.S. State Department advisor reassured him that scholarships would cover the tuition he <\/span><span data-contrast=\"auto\">couldn\u2019t<\/span><span data-contrast=\"auto\">&nbsp;afford. An eye surgeon and Stanford University professor who worked with his mom, a nurse, covered his SAT test and college application fees.&nbsp;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">\u201cI got into Dartmouth and told myself to take the leap of faith,\u201d Joe recalls. \u201c<\/span><i><span data-contrast=\"auto\">Try&nbsp;<\/span><\/i><span data-contrast=\"auto\">this. I may not know where it goes, but&nbsp;<\/span><span data-contrast=\"auto\">what\u2019s<\/span><span data-contrast=\"auto\">&nbsp;the worst that could happen? I would go back to Ghana.\u201d<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Maximizing opportunity<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/h3>\n<p><span data-contrast=\"auto\">Before matriculating at Dartmouth, Joe had never used computers. He was stunned to learn that the engineering department required all students to buy one\u2014a Mac. \u201cI was like, what the heck is this thing?\u201d he jokes. While other students arrived already knowing how to code, Joe started with basic computer science classes, his sense of obligation fueling his work ethic.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">\u201cI was conscious of not wasting the opportunity that I had,\u201d Joe says. He literally did the math, calculating how much a skipped class would cost in scholarship dollars\u2014a lot of money when converted to Ghanaian currency. \u201cLook,\u201d he reasons, \u201cif you\u2019ve got into someplace through the help of others, maximize it and focus on performance.\u201d<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">At first, Joe had no interest in the software industry. \u201cI did a project with a physics professor that ended up being a computer project,\u201d he says. That project, listed on Joe\u2019s resume, caught the eye of a recruiter who encouraged him to attend an info session about<\/span><span data-contrast=\"auto\">&nbsp;Microsoft\u2019s summer internship program.<\/span><span data-contrast=\"auto\">&nbsp;Intrigued by the prospect of visiting the American West Coast, he applied. \u201cHey, I may not get it because I\u2019m not a computer science guy, but why not try it out?\u201d he told himself. He flew to Redmond, did the interview, and got an offer.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">His summer project\u2014figuring out how to make the software setup process easier for customers\u2014established the tone for the rest of his career. \u201cThat internship was fun,\u201d he reminisces. \u201cI got to learn new things, didn\u2019t have to dress up for work, and got to play soccer every lunchtime.\u201d By the end of the internship, Joe was sold on a career in software. He turned down <\/span><span data-contrast=\"auto\">higher-paying<\/span><span data-contrast=\"auto\">&nbsp;offers from consulting and Wall Street firms to return to Microsoft, casual attire, and lunchtime scrimmages.&nbsp;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Advocating for customers<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/h3>\n<p><span data-contrast=\"auto\">In 2000, after working on Windows Update for several months, Joe proposed a corporate version in a paper he submitted for Bill Gates\u2019&nbsp;<\/span><span data-contrast=\"auto\">ThinkWeek<\/span><span data-contrast=\"auto\">.&nbsp;<\/span><span data-contrast=\"auto\">\u201cEnterprise customers were telling us that they wanted a way to manage updates themselves. I got an email about&nbsp;<\/span><span data-contrast=\"auto\">ThinkWeek<\/span><span data-contrast=\"auto\"> that said anybody can submit an idea. I said, \u2018Okay,&nbsp;<\/span><span data-contrast=\"auto\">let\u2019s<\/span><span data-contrast=\"auto\">&nbsp;submit something.\u2019 I didn\u2019t know if anyone would read it, but I wanted to respond to customer feedback, and the&nbsp;<\/span><span data-contrast=\"auto\">ThinkWeek<\/span><span data-contrast=\"auto\">&nbsp;paper seemed like an opportunity to do that.\u201d&nbsp;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">Reviewers, including Gates, liked the idea of what became the Software Update Service (SUS). Within six months,&nbsp;<\/span><span data-contrast=\"auto\">Joe<\/span><span data-contrast=\"auto\">&nbsp;and his small team of \u201cone other program manager and two or three developers\u201d shipped a beta. Customers responded to SUS with a request that Microsoft extend it to help them manage updates to devices for remote employees and road warriors. Thus,&nbsp;<\/span><a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/microsoft-endpoint-manager%22%20\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">Intune<\/span><\/a><span data-contrast=\"auto\">&nbsp;<\/span><span data-contrast=\"auto\">was born. Joe proudly recalls the \u201cawesome customer feedback\u201d they received when Intune shipped. \u201cThey wanted to use it!\u201d he enthuses.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">A decade later, Joe returned to Ghana for his sabbatical. \u201cIt was 2011. When I talked to people, I realized that I was way too Microsoft-insular.\u201d He noticed, for example, that much of the technology others now used had no Microsoft bits in them. When he returned to work, he struggled to reconcile what customers were telling him they wanted with the strategy his leaders wanted to follow. His father\u2019s death in February 2012 forced him to reassess his priorities, and after seventeen years at Microsoft, he left.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">With no clear plans on what to do next, Joe spent the next two years on a soccer field, training with his pre-teen son, and \u201clearning the non-Microsoft stack\u201d by developing an app for managing soccer teams. For about a year, he also worked on the loyalty platform for a major retailer.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">Then serendipity struck again.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">A new mission<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/h3>\n<p><span data-contrast=\"auto\">A Facebook post from a Microsoft friend that said, \u201cWhen your CEO asks you to take on a new job, you can\u2019t say no,\u201d piqued Joe\u2019s curiosity. \u201cI had been hearing people say that Satya was changing the Microsoft culture,\u201d he says. \u201cSo, I reached out.\u201d After talking with several Microsoft managers about potential roles, he decided to take another leap of faith: rejoining the company.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">Although he had an offer from one of his previous teams, Joe liked the identity division\u2019s customer-centric culture and the allure of the unfamiliar. He missed the thrill of seeing a new product area come to life. \u201cAll of my previous successes had come from listening to customers, and I liked the idea of taking an unknown thing, then pulling in disparate data to figure it out, plan, and just go solve it.\u201d&nbsp;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">When Joe joined the identity effort, he inherited a single program manager and an on-premises governance tool,&nbsp;<\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-identity-manager\/microsoft-identity-manager-2016\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">Microsoft Identity Manager (MIM<\/span><\/a><span data-contrast=\"auto\">). The first thing he did was to resurrect the process that had served him so well in the past: listen to customers, spot the trend, and propose big bold solutions to address it.&nbsp;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">\u201cI knew nothing about identity, so I was like, okay, go on a listening tour,\u201d Joe muses. \u201cWhat issues did people have with this tool that I own? All the customers were saying, \u2018It requires a bunch of consultants. The UI is complicated,\u2019 et cetera.\u201d Microsoft partners told Joe they&nbsp;<\/span><span data-contrast=\"auto\">didn\u2019t<\/span><span data-contrast=\"auto\">&nbsp;use any of the governance capabilities in MIM because they were too complex and not fully integrated. \u201cBut even though people complained about MIM, almost every large company had deployed it in some critical area,\u201d Joe reveals. \u201cWe concluded that making governance tools easier to use and more integrated would probably solve their problems.\u201d<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">An integrated approach&nbsp;<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/h3>\n<p><span data-contrast=\"auto\">When Joe embarked on his new mission, the industry had been treating&nbsp;<\/span><span data-contrast=\"auto\">identity governance<\/span><span data-contrast=\"auto\">&nbsp;as separate from&nbsp;<\/span><span data-contrast=\"auto\">access management<\/span><span data-contrast=\"auto\">. Joe&nbsp;<\/span><span data-contrast=\"auto\">doesn\u2019t<\/span><span data-contrast=\"auto\">&nbsp;feel an obligation to preserve their dictionary definitions by insisting the two functions stay separate. \u201cIf you focus on the customer problem that governance is a means to help reduce access risk in an organization,\u201d he contends, \u201cthen all the things you need in access management and governance have to form a continuum. It cannot be two separate things.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">\u201cThe customer is trying to solve a problem that these tools will come&nbsp;<\/span><i><span data-contrast=\"auto\">together<\/span><\/i><span data-contrast=\"auto\"> to solve,\u201d he insists. \u201cIt\u2019s an end-to-end problem that\u2019s not just about compliance. We also have to enable productivity.\u201d This means simplifying the process of granting people access to resources when they need them and removing access when they&nbsp;<\/span><span data-contrast=\"auto\">don\u2019t<\/span><span data-contrast=\"auto\">&nbsp;while ensuring that IT managers have a complete history they can easily report to regulators.&nbsp;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">\u201cI<\/span><span data-contrast=\"auto\">n the governance space<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\">&nbsp;we are trying to help organizations answer four basic questions<\/span><span data-contrast=\"auto\">,\u201d Joe says. \u201c<\/span><span data-contrast=\"auto\">Who has or should have access to resources<\/span><span data-contrast=\"auto\">? W<\/span><span data-contrast=\"auto\">hat&nbsp;<\/span><span data-contrast=\"auto\">can<\/span><span data-contrast=\"auto\">&nbsp;they do with the<\/span><span data-contrast=\"auto\">ir<\/span><span data-contrast=\"auto\">&nbsp;access? Should they continue to have that access? And how do you prove that?<\/span><span data-contrast=\"auto\">\u201d<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">Customers, whether end-users or IT managers, <\/span><span data-contrast=\"auto\">shouldn\u2019t<\/span><span data-contrast=\"auto\">&nbsp;have to \u201cworry,\u201d Joe emphasizes. The system should provide answers automatically. \u201cIf there\u2019s a regulatory need to insist that people get approval before accessing a particular resource, then we\u2019ll provide those tools,\u201d he says. \u201cWe make it easy for employees to go to the resource, request access, and get that access quickly. Then we automatically remove access when the project ends.\u201d<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Embracing serendipity<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/h3>\n<p><span data-contrast=\"auto\">Joe\u2019s Microsoft career has been a series of challenges, choices, and serendipitous opportunities to work on pioneering projects: CD boot, unattended install, common installers, patch updates, Microsoft Intune, and now identity governance.&nbsp;<\/span><span data-contrast=\"auto\">He\u2019s<\/span><span data-contrast=\"auto\">&nbsp;tackled them all with the same aplomb that got him into the high school his teachers had said wasn\u2019t meant for students like him.&nbsp;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">\u201cIf you focus on the customer problem, most of the time you get it right,\u201d he offers. \u201cAnd if things get screwed up, you can fix it and move forward. So why panic and get all riled up?\u201d<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">Reflecting back<\/span><span data-contrast=\"auto\">&nbsp;on his career path, he says, \u201cSometimes it\u2019s about not being afraid of serendipitous opportunities to go learn something new and experience the good things that come out of it.\u201d&nbsp;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">He shares his own story to encourage others to take on new challenges. \u201cMy experiences may help other people do more than they think they\u2019re capable of,\u201d he says. Recalling his first flight out of Ghana, when he was a teenager heading to college in a strange land, he asks his mentees, \u201cWhat\u2019s the worst that could happen? You may fail and&nbsp;<\/span><span data-contrast=\"auto\">have to<\/span><span data-contrast=\"auto\"> start over. Or maybe you will change the world. So\u2026Why not?\u201d<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"none\">To learn more about Microsoft Identity solutions, <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/identity\" target=\"_blank\" rel=\"noopener noreferrer\">visit our website<\/a><\/span><span data-contrast=\"none\">.<\/span><span data-contrast=\"none\">\u202f Bookmark the\u202f<\/span><a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">Security blog<\/span><\/a><span data-contrast=\"none\">\u202fto keep up with our expert coverage on security matters. Also, follow us at <a href=\"https:\/\/twitter.com\/azuread\" target=\"_blank\" rel=\"noopener noreferrer\">@AzureAD<\/a> and\u202f<\/span><a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">@MSFTSecurity<\/span><\/a><span data-contrast=\"none\">\u202ffor the latest news and updates on cybersecurity.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/01\/25\/identity-governance-the-power-of-why-not\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Innovation requires the courage to take risks and the leadership skills to show others that risks are worth taking.\u00a0That\u2019s\u00a0why I love working with people like Joe\u00a0Dadzie, a partner group program manager in identity governance. Joe has a long history of championing disruptive technology breakthroughs and delivering for our customers.\u00a0He\u2019s\u00a0never shied away from pushing boundaries or&#8230;<br \/>\nThe post Identity governance: The power of \u201cWhy not?\u201d appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":39281,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[347,6696,9060],"class_list":["post-39280","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity","tag-identity-and-access-management","tag-identity-and-access-management-series"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Identity governance: The power of \u201cWhy not?\u201d 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/identity-governance-the-power-of-why-not\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identity governance: The power of \u201cWhy not?\u201d 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/identity-governance-the-power-of-why-not\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-25T17:00:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/identity-governance-the-power-of-why-not.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"929\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/identity-governance-the-power-of-why-not\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/identity-governance-the-power-of-why-not\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Identity governance: The power of \u201cWhy not?\u201d\",\"datePublished\":\"2021-01-25T17:00:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/identity-governance-the-power-of-why-not\\\/\"},\"wordCount\":2372,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/identity-governance-the-power-of-why-not\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/identity-governance-the-power-of-why-not.jpg\",\"keywords\":[\"Cybersecurity\",\"Identity and access management\",\"Identity and access management series\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/identity-governance-the-power-of-why-not\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/identity-governance-the-power-of-why-not\\\/\",\"name\":\"Identity governance: The power of \u201cWhy not?\u201d 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/identity-governance-the-power-of-why-not\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/identity-governance-the-power-of-why-not\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/identity-governance-the-power-of-why-not.jpg\",\"datePublished\":\"2021-01-25T17:00:39+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/identity-governance-the-power-of-why-not\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/identity-governance-the-power-of-why-not\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/identity-governance-the-power-of-why-not\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/identity-governance-the-power-of-why-not.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/identity-governance-the-power-of-why-not.jpg\",\"width\":1024,\"height\":929},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/identity-governance-the-power-of-why-not\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Identity governance: The power of \u201cWhy not?\u201d\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Identity governance: The power of \u201cWhy not?\u201d 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/identity-governance-the-power-of-why-not\/","og_locale":"en_US","og_type":"article","og_title":"Identity governance: The power of \u201cWhy not?\u201d 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/identity-governance-the-power-of-why-not\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-01-25T17:00:39+00:00","og_image":[{"width":1024,"height":929,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/identity-governance-the-power-of-why-not.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/identity-governance-the-power-of-why-not\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/identity-governance-the-power-of-why-not\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Identity governance: The power of \u201cWhy not?\u201d","datePublished":"2021-01-25T17:00:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/identity-governance-the-power-of-why-not\/"},"wordCount":2372,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/identity-governance-the-power-of-why-not\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/identity-governance-the-power-of-why-not.jpg","keywords":["Cybersecurity","Identity and access management","Identity and access management series"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/identity-governance-the-power-of-why-not\/","url":"https:\/\/www.threatshub.org\/blog\/identity-governance-the-power-of-why-not\/","name":"Identity governance: The power of \u201cWhy not?\u201d 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/identity-governance-the-power-of-why-not\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/identity-governance-the-power-of-why-not\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/identity-governance-the-power-of-why-not.jpg","datePublished":"2021-01-25T17:00:39+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/identity-governance-the-power-of-why-not\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/identity-governance-the-power-of-why-not\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/identity-governance-the-power-of-why-not\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/identity-governance-the-power-of-why-not.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/identity-governance-the-power-of-why-not.jpg","width":1024,"height":929},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/identity-governance-the-power-of-why-not\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Identity governance: The power of \u201cWhy not?\u201d"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=39280"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39280\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/39281"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=39280"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=39280"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=39280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}