{"id":39811,"date":"2021-03-02T23:35:00","date_gmt":"2021-03-02T23:35:00","guid":{"rendered":"https:\/\/www.darkreading.com\/threat-intelligence\/policy-group-calls-for-public-private-cyber-defense-program\/d\/d-id\/1340308"},"modified":"2021-03-02T23:35:00","modified_gmt":"2021-03-02T23:35:00","slug":"policy-group-calls-for-public-private-cyber-defense-program","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/policy-group-calls-for-public-private-cyber-defense-program\/","title":{"rendered":"Policy Group Calls for Public-Private Cyber-Defense Program"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/img.deusm.com\/darkreading\/dr_staff_125x125.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<header><\/header>\n<p><span class=\"strong black\">The proposed National Cyber Response Network would link federal agencies, companies, and local governments, allowing collaboration during a cyberattack.<\/span><\/p>\n<p class>Creating plausible scenarios of cyberattacks launched by nations such as China or Iran, or by domestic terrorists and hacktivists, a policy group has concluded that too many roadblocks hinder the effective response to a major attack on US government agencies or private industry.&nbsp;<\/p>\n<p>In a report published last week, the New York Cyber Task Force (NYCTF) \u2014 a group of policy makers, private industry, and consultants \u2014 recommended that the United States create a National Cyber Response Network, linking together existing government and industry groups into collaborative network that could speed response to any attack. The task force, sponsored by Columbia University&#8217;s School of International and Public Affairs (SIPA), brings together government cyber experts, policymakers, and private industry professionals to address the national cybersecurity challenges that the United States will face in the future.<\/p>\n<p>The group concluded that the US is not prepared to effectively respond to a national cyber crisis, says Gregory Rattray, the executive director of the NYCTF and co-founder and partner at cyber consultancy Next Peak.<\/p>\n<p>&#8220;We need to make ourselves more resilient,&#8221; he says. &#8220;We know, in terms of policy, that we have to break down a lot of barriers for the private sector to work with the government, and both sides need to really invest in cyber in a serious way.&#8221;<\/p>\n<p>The <a href=\"https:\/\/nextpeak.net\/nyctf-operational-collaboration-press-release\/\" target=\"_blank\" rel=\"noopener noreferrer\">report notes<\/a> that interconnected devices and machine learning are becoming pervasive, with broadband Internet delivered from space, next-generation cellular networks, and artificial intelligence all being integrated into society&#8217;s technological fabric. In a previous study published by the group, they focused on technologies and policies that could benefit cyber defenders.&nbsp;<\/p>\n<p>The latest report, published on Feb. 26, outlines the challenges that remain, created four scenarios of possible disruptive attacks, and outlined five recommendations, including the creation of the National Cyber Response Network (NCRN) managed by an agency that will be designated by the cabinet-level National Cyber Director.&nbsp;<\/p>\n<p>A number of recent attacks underscore the need for such an effort, from the <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/7-things-we-know-so-far-about-the-solarwinds-attacks\/d\/d-id\/1340134\" target=\"_blank\" rel=\"noopener noreferrer\">massive supply chain compromise involving SolarWinds software<\/a> to the <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/water-utility-hack-could-inspire-more-intruders\/d\/d-id\/1340163\" target=\"_blank\" rel=\"noopener noreferrer\">relatively unsophisticated water-treatment plant hack<\/a>, says Rattray.<\/p>\n<p>&#8220;If we are going to withstand a cyberattack, we are going to have to invest an order of magnitude more in all the things that are necessary to be able to respond as a nation \u2014 both private sector and public \u2014 when an adversary unleashes what is clearly technically possible,&#8221; he says. &#8220;If the Russians sent a disruptive command using the access that they had through the SolarWinds software, stuff would have crumbled all over the place.&#8221;<\/p>\n<p>The New York Cyber Task Force created four scenarios and created exercises to test the potential responses. The scenarios included Iran attacking local critical infrastructure to increase pressure on US policymakers, China hobbling technology industries, and domestic protestors using disruptive attacks. An important contribution of the NYCTF was testing some of the core recommendations of the Cyberspace Solarium Commission, particularly those that focused on public-private collaboration.&nbsp;<\/p>\n<p>&#8220;The fact that the task force&#8217;s rigorous process validated those recommendations only further reinforces the critical importance of improving how the US government works with the private sector on shared cyber threats,&#8221; Erica Borghard, senior fellow with the New American Engagement Initiative at the Atlantic Council&#8217;s Scowcroft Center for Strategy and Security, said in a statement issued with the report. &#8220;It also demonstrates the urgency of nominating a National Cyber Director and empowering that position to be the focal point within the Federal government for collaboration with the private sector.&#8221;<\/p>\n<p>The United States also needs to take a more aggressive approach to undermining the capabilities of attackers before those capabilities are used in an attack, Rattray says. The ability of adversaries to attack the national and commercial infrastructures without resistance needs to change, he says.&nbsp;<\/p>\n<p>&#8220;The Solarium Commission, if you read their recommendations on the offensive side of things, they get it right,&#8221; he says. &#8220;We need to use our ability to move outside of our own cyberspace to make it hard to attack us. We need to disrupt the setup and execution of an adversary&#8217;s ability to put us at risk. That is different than proactively attacking others.&#8221;<\/p>\n<p>The report assumes a slow international escalation of tensions in cyberspace. For companies hoping that nations will develop some international treaty setting norms for cyberspace, it&#8217;s time to face reality, Rattray says.<\/p>\n<p>&#8220;If you are a defender, you have to assume that norms are not going to save you,&#8221; he says. &#8220;That, if the US irritates an adversary, and you are a US company &#8230; some adversaries might come after you as a way of forcing the hand of the United States.&#8221;<\/p>\n<p><span class=\"italic\">Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT&#8217;s Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline &#8230; <a href=\"https:\/\/www.darkreading.com\/author-bio.asp?author_id=1161\">View Full Bio<\/a><\/span><\/p>\n<p><strong>Recommended Reading:<\/strong><\/p>\n<p><span class=\"smaller strong red allcaps\">More Insights<\/span><\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/policy-group-calls-for-public-private-cyber-defense-program\/d\/d-id\/1340308?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The proposed National Cyber Response Network would link federal agencies, companies, and local governments, allowing collaboration during a cyberattack. Read More <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/policy-group-calls-for-public-private-cyber-defense-program\/d\/d-id\/1340308?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-39811","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Policy Group Calls for Public-Private Cyber-Defense Program 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/policy-group-calls-for-public-private-cyber-defense-program\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Policy Group Calls for Public-Private Cyber-Defense Program 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/policy-group-calls-for-public-private-cyber-defense-program\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-02T23:35:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/img.deusm.com\/darkreading\/dr_staff_125x125.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/policy-group-calls-for-public-private-cyber-defense-program\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/policy-group-calls-for-public-private-cyber-defense-program\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Policy Group Calls for Public-Private Cyber-Defense Program\",\"datePublished\":\"2021-03-02T23:35:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/policy-group-calls-for-public-private-cyber-defense-program\\\/\"},\"wordCount\":848,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/policy-group-calls-for-public-private-cyber-defense-program\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/img.deusm.com\\\/darkreading\\\/dr_staff_125x125.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/policy-group-calls-for-public-private-cyber-defense-program\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/policy-group-calls-for-public-private-cyber-defense-program\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/policy-group-calls-for-public-private-cyber-defense-program\\\/\",\"name\":\"Policy Group Calls for Public-Private Cyber-Defense Program 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/policy-group-calls-for-public-private-cyber-defense-program\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/policy-group-calls-for-public-private-cyber-defense-program\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/img.deusm.com\\\/darkreading\\\/dr_staff_125x125.jpg\",\"datePublished\":\"2021-03-02T23:35:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/policy-group-calls-for-public-private-cyber-defense-program\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/policy-group-calls-for-public-private-cyber-defense-program\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/policy-group-calls-for-public-private-cyber-defense-program\\\/#primaryimage\",\"url\":\"https:\\\/\\\/img.deusm.com\\\/darkreading\\\/dr_staff_125x125.jpg\",\"contentUrl\":\"https:\\\/\\\/img.deusm.com\\\/darkreading\\\/dr_staff_125x125.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/policy-group-calls-for-public-private-cyber-defense-program\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Policy Group Calls for Public-Private Cyber-Defense Program\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Policy Group Calls for Public-Private Cyber-Defense Program 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/policy-group-calls-for-public-private-cyber-defense-program\/","og_locale":"en_US","og_type":"article","og_title":"Policy Group Calls for Public-Private Cyber-Defense Program 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/policy-group-calls-for-public-private-cyber-defense-program\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-03-02T23:35:00+00:00","og_image":[{"url":"https:\/\/img.deusm.com\/darkreading\/dr_staff_125x125.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/policy-group-calls-for-public-private-cyber-defense-program\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/policy-group-calls-for-public-private-cyber-defense-program\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Policy Group Calls for Public-Private Cyber-Defense Program","datePublished":"2021-03-02T23:35:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/policy-group-calls-for-public-private-cyber-defense-program\/"},"wordCount":848,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/policy-group-calls-for-public-private-cyber-defense-program\/#primaryimage"},"thumbnailUrl":"https:\/\/img.deusm.com\/darkreading\/dr_staff_125x125.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/policy-group-calls-for-public-private-cyber-defense-program\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/policy-group-calls-for-public-private-cyber-defense-program\/","url":"https:\/\/www.threatshub.org\/blog\/policy-group-calls-for-public-private-cyber-defense-program\/","name":"Policy Group Calls for Public-Private Cyber-Defense Program 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/policy-group-calls-for-public-private-cyber-defense-program\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/policy-group-calls-for-public-private-cyber-defense-program\/#primaryimage"},"thumbnailUrl":"https:\/\/img.deusm.com\/darkreading\/dr_staff_125x125.jpg","datePublished":"2021-03-02T23:35:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/policy-group-calls-for-public-private-cyber-defense-program\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/policy-group-calls-for-public-private-cyber-defense-program\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/policy-group-calls-for-public-private-cyber-defense-program\/#primaryimage","url":"https:\/\/img.deusm.com\/darkreading\/dr_staff_125x125.jpg","contentUrl":"https:\/\/img.deusm.com\/darkreading\/dr_staff_125x125.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/policy-group-calls-for-public-private-cyber-defense-program\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Policy Group Calls for Public-Private Cyber-Defense Program"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39811","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=39811"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39811\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=39811"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=39811"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=39811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}