{"id":41996,"date":"2021-07-27T00:00:00","date_gmt":"2021-07-27T00:00:00","guid":{"rendered":"https:\/\/www.trendmicro.com\/en_us\/research\/21\/g\/newark-releases-latest-global-iot-trends-report.html"},"modified":"2021-07-27T00:00:00","modified_gmt":"2021-07-27T00:00:00","slug":"newark-releases-latest-global-iot-trends-report","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/newark-releases-latest-global-iot-trends-report\/","title":{"rendered":"Newark Releases Latest Global IoT Trends Report"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/g\/newark-releases-latest-global-iot-trends-report\/newark-releases-global-Iot.jpg\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/g\/newark-releases-latest-global-iot-trends-report\/newark-releases-global-Iot.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Newark, a high-service distributor of technology products, services, and solutions for electronics system design, maintenance, and repair, recently released its&nbsp;<a href=\"https:\/\/www.newark.com\/iot-trends-2021\" target=\"_blank\" rel=\"noopener\">Global IoT Trends Report for 2021<\/a>.&nbsp;<\/p>\n<p>The results are based on an IoT survey conducted from September 2020 and December 2020, involving over 2,000 completed questionnaires from over 60 countries.<\/p>\n<p>Asked about the top IoT trends in the next five years, participants said that three industries that will lead the way in IoT implementation are Industrial Automation and Control (25%), Home Automation (18%), and Artificial Intelligence (12%).&nbsp;<\/p>\n<p>The report also revealed that ease of development, the need for open standards, and connectivity standards will help accelerate the adoption of IoT.&nbsp;<\/p>\n<p>\u201cOne of the reasons IoT adoption is slow is that there are no global standards for the different devices to communicate with each other; each set of devices adhere to different protocols. The pace of innovation in the IoT is rapid and capturing this tremendous market opportunity requires interoperability among all industries, connecting customers, businesses, products, and the Internet of Things,\u201d the report explained.<\/p>\n<p>The current pandemic has greatly affected the way we live and use technology. It has increased flexibility that many people enjoy at work. However, it has also negatively affected our daily lives. Participants expected healthcare, remote asset access, and wearable apps to take center stage in the future as a result of the impact of the COVID-19 pandemic in IoT. These new advancements will benefit society\u2019s well-being and health.<\/p>\n<p><b>Security continues to become a top concern in IoT and Industry 4.0<\/b><\/p>\n<p>Due to the increased vulnerabilities and complexities of systems, cybersecurity continues to be one of the biggest concerns in IoT implementations. Thirty-six percent of the respondents said that they faced challenges related to security while adopting connected technology for IoT. Connectivity and interoperability are also key concerns, garnering 27% and 23% of respondents, respectively.<\/p>\n<p>Moreover, the slow growth of Industry 4.0 despite IoT technology advancement could be attributed to security concerns.&nbsp;<\/p>\n<p>According to Newark\u2019s report, the two biggest reasons for the slow growth are concern regarding data security (32%) and a lack of business strategy (30%). Because more advanced manufacturing processes are more interconnected than ever, more machines, equipment, and employees are supported by internet-connected sensors that stream throughout an organization.<\/p>\n<p>Additionally, issues may arise when enterprises don\u2019t understand the information that is shared across their networks or how to use it to enhance their business strategy.<\/p>\n<p>Future-proofing an enterprise\u2019s security systems are important for improved IoT and industry 4.0, which will aid in growing its business. Having a robust cybersecurity solution in place will also keep vulnerabilities and risks from interrupting operations, which may lead to loss of profit.<\/p>\n<p>To learn more about mitigating risks when adopting IoT and Industry 4.0 technologies, check out&nbsp;<a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/solutions\/iot\/smart-factory.html\">Trend Micro\u2019s complete cybersecurity solution for smart factories<\/a>.<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/g\/newark-releases-latest-global-iot-trends-report.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The latest trend report also said that security concerns negatively impact the adoption of IoT technologies and the growth of Industry 4.0 Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9461,9466,77,9465,9495],"class_list":["post-41996","post","type-post","status-publish","format-standard","hentry","category-trendmicro","tag-articles-news-reports","tag-compliancerisks","tag-iot","tag-latest-news","tag-smart-factories"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Newark Releases Latest Global IoT Trends Report 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/newark-releases-latest-global-iot-trends-report\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Newark Releases Latest Global IoT Trends Report 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/newark-releases-latest-global-iot-trends-report\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-27T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/g\/newark-releases-latest-global-iot-trends-report\/newark-releases-global-Iot.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/newark-releases-latest-global-iot-trends-report\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/newark-releases-latest-global-iot-trends-report\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Newark Releases Latest Global IoT Trends Report\",\"datePublished\":\"2021-07-27T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/newark-releases-latest-global-iot-trends-report\\\/\"},\"wordCount\":473,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/newark-releases-latest-global-iot-trends-report\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.trendmicro.com\\\/content\\\/dam\\\/trendmicro\\\/global\\\/en\\\/research\\\/21\\\/g\\\/newark-releases-latest-global-iot-trends-report\\\/newark-releases-global-Iot.jpg\",\"keywords\":[\"Articles, News, Reports\",\"Compliance&amp;Risks\",\"IoT\",\"Latest News\",\"Smart Factories\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/newark-releases-latest-global-iot-trends-report\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/newark-releases-latest-global-iot-trends-report\\\/\",\"name\":\"Newark Releases Latest Global IoT Trends Report 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/newark-releases-latest-global-iot-trends-report\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/newark-releases-latest-global-iot-trends-report\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.trendmicro.com\\\/content\\\/dam\\\/trendmicro\\\/global\\\/en\\\/research\\\/21\\\/g\\\/newark-releases-latest-global-iot-trends-report\\\/newark-releases-global-Iot.jpg\",\"datePublished\":\"2021-07-27T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/newark-releases-latest-global-iot-trends-report\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/newark-releases-latest-global-iot-trends-report\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/newark-releases-latest-global-iot-trends-report\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.trendmicro.com\\\/content\\\/dam\\\/trendmicro\\\/global\\\/en\\\/research\\\/21\\\/g\\\/newark-releases-latest-global-iot-trends-report\\\/newark-releases-global-Iot.jpg\",\"contentUrl\":\"https:\\\/\\\/www.trendmicro.com\\\/content\\\/dam\\\/trendmicro\\\/global\\\/en\\\/research\\\/21\\\/g\\\/newark-releases-latest-global-iot-trends-report\\\/newark-releases-global-Iot.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/newark-releases-latest-global-iot-trends-report\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Articles, News, Reports\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/articles-news-reports\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Newark Releases Latest Global IoT Trends Report\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Newark Releases Latest Global IoT Trends Report 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/newark-releases-latest-global-iot-trends-report\/","og_locale":"en_US","og_type":"article","og_title":"Newark Releases Latest Global IoT Trends Report 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/newark-releases-latest-global-iot-trends-report\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-07-27T00:00:00+00:00","og_image":[{"url":"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/g\/newark-releases-latest-global-iot-trends-report\/newark-releases-global-Iot.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/newark-releases-latest-global-iot-trends-report\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/newark-releases-latest-global-iot-trends-report\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Newark Releases Latest Global IoT Trends Report","datePublished":"2021-07-27T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/newark-releases-latest-global-iot-trends-report\/"},"wordCount":473,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/newark-releases-latest-global-iot-trends-report\/#primaryimage"},"thumbnailUrl":"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/g\/newark-releases-latest-global-iot-trends-report\/newark-releases-global-Iot.jpg","keywords":["Articles, News, Reports","Compliance&amp;Risks","IoT","Latest News","Smart Factories"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/newark-releases-latest-global-iot-trends-report\/","url":"https:\/\/www.threatshub.org\/blog\/newark-releases-latest-global-iot-trends-report\/","name":"Newark Releases Latest Global IoT Trends Report 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/newark-releases-latest-global-iot-trends-report\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/newark-releases-latest-global-iot-trends-report\/#primaryimage"},"thumbnailUrl":"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/g\/newark-releases-latest-global-iot-trends-report\/newark-releases-global-Iot.jpg","datePublished":"2021-07-27T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/newark-releases-latest-global-iot-trends-report\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/newark-releases-latest-global-iot-trends-report\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/newark-releases-latest-global-iot-trends-report\/#primaryimage","url":"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/g\/newark-releases-latest-global-iot-trends-report\/newark-releases-global-Iot.jpg","contentUrl":"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/g\/newark-releases-latest-global-iot-trends-report\/newark-releases-global-Iot.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/newark-releases-latest-global-iot-trends-report\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"Newark Releases Latest Global IoT Trends Report"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/41996","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=41996"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/41996\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=41996"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=41996"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=41996"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}