{"id":39911,"date":"2021-03-08T11:00:00","date_gmt":"2021-03-08T11:00:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/cybersecurity-in-2021-stopping-the-madness\/"},"modified":"2021-03-08T11:00:00","modified_gmt":"2021-03-08T11:00:00","slug":"cybersecurity-in-2021-stopping-the-madness","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cybersecurity-in-2021-stopping-the-madness\/","title":{"rendered":"Cybersecurity in 2021: Stopping the madness"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2021\/03\/spot_cybersecurity_01_cso_overview_hands_cradle_virtual_security_matrix_by_alexsl_gettyimages-1140974750-100879632-large.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Marc Andreessen had it right \u2013 software has eaten the world. As a result, the world can be hacked.<\/p>\n<p>Just look at the past few months. The <a href=\"https:\/\/www.csoonline.com\/article\/3601508\/solarwinds-supply-chain-attack-explained-why-organizations-were-not-prepared.html\">SolarWinds caper<\/a> \u2013 the \u201clargest and most sophisticated attack the world has ever seen\u201d according to Microsoft president Brad Smith \u2013 gave its Russian perps months of free reign across untold US government agencies and private companies. But stupid also works: Last month in Florida, a water treatment plant\u2019s cybersecurity was so lax, anyone could have been behind a clumsy attempt to <a href=\"https:\/\/www.theverge.com\/2021\/2\/10\/22277300\/florida-water-treatment-chemical-tamper-teamviewer-shared-password\" rel=\"nofollow\">poison the local water supply<\/a>. Meanwhile, miscreants bearing <a href=\"https:\/\/www.csoonline.com\/article\/3236183\/what-is-ransomware-how-it-works-and-how-to-remove-it.html\">ransomware<\/a> have made hospitals their favorite target; in October 2020, six US hospitals fell prey within 24 hours.<\/p>\n<aside class=\"sidebar medium\">\n<h3 class=\"body\">Tech Spotlight: <a href=\"https:\/\/www.csoonline.com\/article\/3610369\/cybersecurity-in-2021-stopping-the-madness.html\">Security<\/a><\/h3>\n<\/aside>\n<p>Cybersecurity wins the award for Most Dismal Science. But if suffering attacks now amounts to a cost of doing business, then the time-honored approach of prioritizing risk and limiting damage when breaches occur still offers reason for hope. This collection of articles from CSO, Computerworld, CIO, InfoWorld, and Network World delivers specific guidance on best security practices across the enterprise, from the C-suite to developer laptops.<\/p>\n<p>Writing for CSO, contributor Stacey Collette addresses the age-old question of how to focus upper management&#8217;s attention on security in \u201c<a href=\"https:\/\/www.csoonline.com\/article\/3609094\/4-ways-to-keep-the-cybersecurity-conversation-going-after-the-crisis.html\">4 ways to keep the cybersecurity conversation going after the crisis has passed<\/a>.\u201d The thesis is that five-alarm debacles like the SolarWinds attack can serve as useful wakeup calls. Collette suggests seizing the moment to convince the board to match the company business model with an appropriate risk mitigation framework \u2013 and to use <a href=\"https:\/\/www.csoonline.com\/article\/3406505\/what-is-an-isac-or-isao-how-these-cyber-threat-information-sharing-organizations-improve-security.html\">information sharing and analysis centers<\/a> to exchange information on industry-specific threats and defensive measures.<\/p>\n<p>CIO\u2019s contribution, \u201c<a href=\"https:\/\/www.cio.com\/article\/3609831\/mitigating-the-hidden-risks-of-digital-transformation.html\">Mitigating the hidden risks of digital transformation<\/a>\u201d by Bob Violino, surfaces a problem hiding in plain sight: Digital innovation almost always increases risk. Everyone understands the transformative power of the cloud, for example, but each IaaS or SaaS provider seems to have a different security model, raising the odds of calamitous misconfiguration. Likewise, digital integration with partners promises all kinds of new efficiencies \u2013 and by definition heightens <a href=\"https:\/\/www.csoonline.com\/article\/3445417\/third-party-risk-management-a-getting-started-guide.html\">third-party risk<\/a>. And does it even need to be said that launching an <a href=\"https:\/\/www.networkworld.com\/article\/3207535\/what-is-iot-the-internet-of-things-explained.html\">internet of things<\/a> initiative will vastly expand your attack surface area?<\/p>\n<p>A second story written by Violino, this one for Computerworld, explores the cybersecurity obsession of our era: \u201c<a href=\"https:\/\/www.computerworld.com\/article\/3609596\/wfh-security-lessons-from-the-pandemic.html\">WFH security lessons from the pandemic<\/a>.\u201d Some of the article covers familiar ground, such as ensuring effective endpoint protection and multifactor authentication for remote workers. But Violino also highlights more advanced solutions, such as <a href=\"https:\/\/www.computerworld.com\/article\/3562731\/odds-are-well-all-soon-move-to-desktop-as-a-service.html\">cloud desktops<\/a> and&nbsp;<a href=\"https:\/\/www.csoonline.com\/article\/3247848\/what-is-zero-trust-a-model-for-more-effective-security.html\">zero-trust network access<\/a>. He warns that a new wave of preparation will be required for <a href=\"https:\/\/www.computerworld.com\/article\/3568186\/qa-cbt-architects-cio-sees-a-hybrid-remote-work-plan-as-harder-than-wfh.html\">hybrid work scenarios<\/a>, in which employees alternate between office and home to ensure social distancing at work. The pandemic has proven that remote work at scale is viable \u2013 but new solutions, such as <a href=\"https:\/\/www.idc.com\/getdoc.jsp?containerId=US46075520\" rel=\"nofollow\">pervasive data defense and response platforms<\/a>, will be necessary to secure our new perimeterless world.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id> <\/aside>\n<p>That goes for companies with many distributed offices as well. As contributor Maria Korlov reports in the Network World article \u201c<a href=\"https:\/\/www.networkworld.com\/article\/3609672\/wan-challenges-steer-sixt-to-cloud-native-sase-deployment.html\">WAN challenges steer Sixt to cloud-native SASE deployment<\/a>, adoption is accelerating for secure access service edge (<a href=\"https:\/\/www.networkworld.com\/article\/3574014\/what-is-sase-a-cloud-service-that-marries-sd-wan-with-security.html\">SASE<\/a>), an architecture that combines <a href=\"https:\/\/www.networkworld.com\/article\/3031279\/sd-wan-what-it-is-and-why-you-ll-use-it-one-day.html\">SD-WAN<\/a> with various security measures, from encryption to zero trust authentication. According to Korlov, for the rental car company Sixt, the result was \u201ca 15% to 20% reduction in costs for network maintenance, security, and capacity planning.\u201d At Sixt\u2019s 80 branch offices, downtime purportedly averages a tenth of what it used to be.<\/p>\n<p>In \u201c<a href=\"https:\/\/www.infoworld.com\/article\/3607914\/6-security-risks-in-software-development-and-how-to-address-them.html\">6 security risks in software development and how to address them<\/a>,\u201d InfoWorld contributing editor Isaac Sacolick reminds us that modern cybersecurity means secure code, too. An <a href=\"https:\/\/info.veracode.com\/survey-report-esg-modern-application-development-security.html\" rel=\"nofollow\">ESG survey<\/a> cited in the article reveals that nearly half of respondents admitted they release vulnerable code into production on a regular basis. Thanks to Sacolick\u2019s hands-on experience with development teams, he\u2019s able to offer a trove of practical remediations for developer managers to embrace, from explicitly documenting code security acceptance criteria to ensuring version control repositories are fully locked down.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id> <\/aside>\n<p>The SolarWinds fiasco has proven that enforcing such policies is no longer optional. Coverage of the attack has focused on the backdoor that Russian hackers inserted in SolarWinds\u2019 Orion products, instantly compromising customers who installed the software. Less attention has been paid to the custom malware the hackers created to slip into SolarWinds development process undetected and implant that backdoor. Can any software development shop say with confidence that it can withstand such a sophisticated, concerted effort?<\/p>\n<p>Software firms are asking themselves that question right now \u2013 while at the same time governments and private enterprises seen as high-value targets are furiously vetting their operations to see if they\u2019ve fallen victim to other compromised code. True, this is merely the latest battlefront against a global horde of cybercriminals, from script kiddies to malicious hackers to state-sponsored masterminds. But no one can accept anything other than the strongest defenses affordable in a war without end.<\/p>\n<div class=\"end-note\"> <!-- blx4 #2004 blox4.html --> <\/p>\n<div id class=\"blx blxParticleendnote blxM2004 blox4_html blxC51120\">\n<aside> <strong>Next read this<\/strong> <\/aside>\n<\/p><\/div>\n<\/p><\/div>\n<p> READ MORE <a href=\"https:\/\/www.csoonline.com\/article\/3610369\/cybersecurity-in-2021-stopping-the-madness.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The challenges are greater than ever. But security pros have learned a lot \u2013 and with luck, the right strategic defenses can help even the highest-value targets withstand severe attacks. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":39912,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[9255,1741,9256,1888,1061,9257,307],"class_list":["post-39911","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-android-security","tag-application-security","tag-data-and-information-security","tag-devsecops","tag-network-security","tag-remote-access-security","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity in 2021: Stopping the madness 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cybersecurity-in-2021-stopping-the-madness\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity in 2021: Stopping the madness 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cybersecurity-in-2021-stopping-the-madness\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-08T11:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/cybersecurity-in-2021-stopping-the-madness.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-in-2021-stopping-the-madness\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-in-2021-stopping-the-madness\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Cybersecurity in 2021: Stopping the madness\",\"datePublished\":\"2021-03-08T11:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-in-2021-stopping-the-madness\\\/\"},\"wordCount\":825,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-in-2021-stopping-the-madness\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/cybersecurity-in-2021-stopping-the-madness.jpg\",\"keywords\":[\"Android Security\",\"Application Security\",\"Data and Information Security\",\"DevSecOps\",\"Network Security\",\"Remote Access Security\",\"Security\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-in-2021-stopping-the-madness\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-in-2021-stopping-the-madness\\\/\",\"name\":\"Cybersecurity in 2021: Stopping the madness 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-in-2021-stopping-the-madness\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-in-2021-stopping-the-madness\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/cybersecurity-in-2021-stopping-the-madness.jpg\",\"datePublished\":\"2021-03-08T11:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-in-2021-stopping-the-madness\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-in-2021-stopping-the-madness\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-in-2021-stopping-the-madness\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/cybersecurity-in-2021-stopping-the-madness.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/cybersecurity-in-2021-stopping-the-madness.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-in-2021-stopping-the-madness\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Android Security\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/android-security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity in 2021: Stopping the madness\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity in 2021: Stopping the madness 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cybersecurity-in-2021-stopping-the-madness\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity in 2021: Stopping the madness 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cybersecurity-in-2021-stopping-the-madness\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-03-08T11:00:00+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/cybersecurity-in-2021-stopping-the-madness.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-in-2021-stopping-the-madness\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-in-2021-stopping-the-madness\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Cybersecurity in 2021: Stopping the madness","datePublished":"2021-03-08T11:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-in-2021-stopping-the-madness\/"},"wordCount":825,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-in-2021-stopping-the-madness\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/cybersecurity-in-2021-stopping-the-madness.jpg","keywords":["Android Security","Application Security","Data and Information Security","DevSecOps","Network Security","Remote Access Security","Security"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-in-2021-stopping-the-madness\/","url":"https:\/\/www.threatshub.org\/blog\/cybersecurity-in-2021-stopping-the-madness\/","name":"Cybersecurity in 2021: Stopping the madness 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-in-2021-stopping-the-madness\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-in-2021-stopping-the-madness\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/cybersecurity-in-2021-stopping-the-madness.jpg","datePublished":"2021-03-08T11:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-in-2021-stopping-the-madness\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cybersecurity-in-2021-stopping-the-madness\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-in-2021-stopping-the-madness\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/cybersecurity-in-2021-stopping-the-madness.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/cybersecurity-in-2021-stopping-the-madness.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-in-2021-stopping-the-madness\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Android Security","item":"https:\/\/www.threatshub.org\/blog\/tag\/android-security\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity in 2021: Stopping the madness"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39911","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=39911"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39911\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/39912"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=39911"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=39911"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=39911"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}