{"id":42830,"date":"2021-03-17T00:00:00","date_gmt":"2021-03-17T00:00:00","guid":{"rendered":"https:\/\/www.trendmicro.com\/en_us\/ciso\/21\/c\/how-cisos-can-stay-ahead-of-ransomware-attacks.html"},"modified":"2021-03-17T00:00:00","modified_gmt":"2021-03-17T00:00:00","slug":"how-cisos-can-stay-ahead-of-ransomware-attacks","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/how-cisos-can-stay-ahead-of-ransomware-attacks\/","title":{"rendered":"How CISOs can stay ahead of ransomware attacks"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/ciso\/21\/c\/how-cisos-can-stay-ahead-of-ransomware-attacks\/thumb_cisos-ransomware-attacks.jpg\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/ciso\/21\/c\/how-cisos-can-stay-ahead-of-ransomware-attacks\/thumb_cisos-ransomware-attacks.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<div readability=\"51.173040514956\">\n<p><b>Ransomware continues to hinder enterprises with targeted attacks using a myriad of techniques, including 2020\u2019s most common approach of double extortion. Organizations need to stay alert and ahead of attacks to avoid financial losses, workflow disruptions, and damage to their reputation. This article uses case studies to take a deeper look at the ransomware variants of 2020 and provides insight on how cybersecurity leaders can mitigate future attacks.<\/b><\/p>\n<p><span class=\"body-subhead-title\">Trends and themes of ransomware in 2020<\/span><\/p>\n<p>With continued growth and attack evolution, enterprises should remain vigilant against the ongoing threat of ransomware. Trend Micro observed the increase of new ransomware families and a narrower focus on targeted attacks toward high-value assets and vulnerable industries. With the global pandemic, it\u2019s unsurprising that cybercriminals upped their focus on the healthcare industry, which accounted for 14% of all ransomware attacks.<\/p>\n<p>Double extortion was a common ransomware theme due to a significant focus on data breaches of valuable organizations. Cybercriminals expanded their tactics by not only denying access to the compromised files but also threatening to expose the sensitive data unless a ransom was paid. This is a major concern for enterprises, as they have much at risk\u2014from a financial, regulatory, and image perspective.<\/p>\n<p><span class=\"body-subhead-title\">What can CISOs do?<\/span><\/p>\n<p>As ransomware attacks evolve, so should an enterprise\u2019s prevention methods\u2014especially as the workforce environment has shifted from the office to working from home. The new remote set ups have opened up additional security challenges, which require a holistic approach from organizations to secure the growing cloud network and maintain work-from-home (WFH) best practices.<\/p>\n<p>Here are some of Trend Micro\u2019s key recommendations to enhance WFH security and enable your enterprise to deal with the threat of ransomware:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Regularly back up files<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Limit access to shared\/network drives and turn off file sharing<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Employ secure authentication strategies<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Disable local admin accounts<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Update and patch regularly<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Enforce the principle of least privilege<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Enforce application control<\/span><\/li>\n<\/ul>\n<p>Although ransomware is growing in complexity, the most effective defense is simplifying your cybersecurity approach. Enterprises using multiple products and vendors can feel overwhelmed and may be limiting their threat visibility\u2014using more integrated offerings results in better visibility, detection, and response.<\/p>\n<p>Take a deeper dive into the ransomware trends from 2020 and learn about mitigation methods that can enable resilience within your organization: <a href=\"https:\/\/www.trendmicro.com\/vinfo\/tmr\/?\/us\/security\/news\/cybercrime-and-digital-threats\/the-state-of-ransomware-2020-s-catch-22\" target=\"_blank\" rel=\"noopener\">The State of Ransomware: 2020\u2019s Catch-22<\/a>.<\/p>\n<\/p><\/div>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/21\/c\/how-cisos-can-stay-ahead-of-ransomware-attacks.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With ransomware threats evolving in 2020, take a look at how you can stay ahead of the curve. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":42831,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9527,9545,9529],"class_list":["post-42830","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-ciso-expert-perspective","tag-trend-micro-ciso-report","tag-trend-micro-ciso-risk-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How CISOs can stay ahead of ransomware attacks 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/how-cisos-can-stay-ahead-of-ransomware-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How CISOs can stay ahead of ransomware attacks 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/how-cisos-can-stay-ahead-of-ransomware-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-17T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/how-cisos-can-stay-ahead-of-ransomware-attacks.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"641\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-cisos-can-stay-ahead-of-ransomware-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-cisos-can-stay-ahead-of-ransomware-attacks\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"How CISOs can stay ahead of ransomware attacks\",\"datePublished\":\"2021-03-17T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-cisos-can-stay-ahead-of-ransomware-attacks\/\"},\"wordCount\":397,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-cisos-can-stay-ahead-of-ransomware-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/how-cisos-can-stay-ahead-of-ransomware-attacks.jpg\",\"keywords\":[\"Trend Micro CISO : Expert Perspective\",\"Trend Micro CISO : Report\",\"Trend Micro CISO : Risk Management\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-cisos-can-stay-ahead-of-ransomware-attacks\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/how-cisos-can-stay-ahead-of-ransomware-attacks\/\",\"name\":\"How CISOs can stay ahead of ransomware attacks 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-cisos-can-stay-ahead-of-ransomware-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-cisos-can-stay-ahead-of-ransomware-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/how-cisos-can-stay-ahead-of-ransomware-attacks.jpg\",\"datePublished\":\"2021-03-17T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-cisos-can-stay-ahead-of-ransomware-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/how-cisos-can-stay-ahead-of-ransomware-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-cisos-can-stay-ahead-of-ransomware-attacks\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/how-cisos-can-stay-ahead-of-ransomware-attacks.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/how-cisos-can-stay-ahead-of-ransomware-attacks.jpg\",\"width\":641,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-cisos-can-stay-ahead-of-ransomware-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro CISO : Expert Perspective\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-ciso-expert-perspective\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How CISOs can stay ahead of ransomware attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How CISOs can stay ahead of ransomware attacks 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/how-cisos-can-stay-ahead-of-ransomware-attacks\/","og_locale":"en_US","og_type":"article","og_title":"How CISOs can stay ahead of ransomware attacks 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/how-cisos-can-stay-ahead-of-ransomware-attacks\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-03-17T00:00:00+00:00","og_image":[{"width":641,"height":350,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/how-cisos-can-stay-ahead-of-ransomware-attacks.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/how-cisos-can-stay-ahead-of-ransomware-attacks\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/how-cisos-can-stay-ahead-of-ransomware-attacks\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"How CISOs can stay ahead of ransomware attacks","datePublished":"2021-03-17T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-cisos-can-stay-ahead-of-ransomware-attacks\/"},"wordCount":397,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-cisos-can-stay-ahead-of-ransomware-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/how-cisos-can-stay-ahead-of-ransomware-attacks.jpg","keywords":["Trend Micro CISO : Expert Perspective","Trend Micro CISO : Report","Trend Micro CISO : Risk Management"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/how-cisos-can-stay-ahead-of-ransomware-attacks\/","url":"https:\/\/www.threatshub.org\/blog\/how-cisos-can-stay-ahead-of-ransomware-attacks\/","name":"How CISOs can stay ahead of ransomware attacks 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-cisos-can-stay-ahead-of-ransomware-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-cisos-can-stay-ahead-of-ransomware-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/how-cisos-can-stay-ahead-of-ransomware-attacks.jpg","datePublished":"2021-03-17T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/how-cisos-can-stay-ahead-of-ransomware-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/how-cisos-can-stay-ahead-of-ransomware-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/how-cisos-can-stay-ahead-of-ransomware-attacks\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/how-cisos-can-stay-ahead-of-ransomware-attacks.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/how-cisos-can-stay-ahead-of-ransomware-attacks.jpg","width":641,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/how-cisos-can-stay-ahead-of-ransomware-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro CISO : Expert Perspective","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-ciso-expert-perspective\/"},{"@type":"ListItem","position":3,"name":"How CISOs can stay ahead of ransomware attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42830","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=42830"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42830\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/42831"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=42830"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=42830"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=42830"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}