{"id":43514,"date":"2021-10-20T19:57:30","date_gmt":"2021-10-20T19:57:30","guid":{"rendered":"https:\/\/www.darkreading.com\/edge-articles\/removing-friction-for-the-enterprise-with-trusted-access"},"modified":"2021-10-20T19:57:30","modified_gmt":"2021-10-20T19:57:30","slug":"removing-friction-for-the-enterprise-with-trusted-access","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/removing-friction-for-the-enterprise-with-trusted-access\/","title":{"rendered":"Removing Friction for the Enterprise With Trusted Access"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltb3135c684eac7bb1\/6170605ea2e4e263c24459c8\/phone-authentication-trust-2D5MGWE.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Technological transformations for the workforce have increased productivity, but they&#8217;ve also introduced more complexity. A digital worker in an enterprise organization in the United States now has 50-plus applications to access&nbsp;and at least two devices to access these applications from, according to the&nbsp;<a href=\"http:\/\/duo.sc\/tar-2021\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=http:\/\/duo.sc\/tar-2021&amp;source=gmail&amp;ust=1634395974093000&amp;usg=AFQjCNEZFxiQ8_h4e-gRs8sv_gpOTib_Lg\" rel=\"noopener\"><em>2021 Duo Trusted Access Report<\/em><\/a>. Remembering the URLs, user names, and passwords for all these applications is a challenge, and it&#8217;s not getting easier.<\/p>\n<p>On the other side, IT and security teams are struggling to comply with regulations and constantly prevent attackers from breaching their environments. The obvious solution is to enforce more security controls for all access requests, but the downside is the friction these controls introduce for the end user. <\/p>\n<p>What\u2019s the right balance and approach to offer trusted access for your workforce? Here are three recommendations we learned by deploying easy and secure access for more than 30,000 organizations around the world.<\/p>\n<p><strong>1. Strong User Authentication for All Users and Applications<br \/><\/strong>Having strong user authentication for every application and every user significantly reduces the risk of a breach. After all, passwords are easy to compromise.&nbsp;<\/p>\n<p>Multifactor authentication (MFA) offers strong control even when a password is compromised. Most organizations have MFA, but it\u2019s not enabled for every application. Security is only as good as the weakest link. Have a road map to enable MFA for every login request in your organization. No exceptions. Of course, you can leverage single sign-on and adaptive authentication policies to avoid MFA fatigue for the end user. You can challenge a user for authentication only when something changes or when the risk is high.<\/p>\n<p>The authentication factors you use for MFA matter. For example, one-time passcodes (OTP) delivered through SMS are no longer reliable because attackers can steal them through man-in-the-middle-type techniques or with a hacker tool to trick users into disclosing the OTPs. Still, it\u2019s better than not having any MFA. <\/p>\n<p>We recommend stronger authentication factors, such as mobile push or U2F key. You can also consider modern passwordless solutions that eliminate dependency on passwords and leverage U2F and biometrics built into devices for strong authentication.<\/p>\n<p><strong>2. Inspect the End User Device Before Granting Access to Applications<br \/><\/strong>Maintaining up-to-date operating systems and browsers for all of your end user devices offers you the biggest bang for your buck. Microsoft, Apple, and Google control the majority of the operating systems and browsers and release patches frequently. IT and security teams need to think about enabling the end users to maintain their devices. <\/p>\n<p>For example, you can leverage authentication technologies that tell the end user when they need to update their device. Security-conscious organizations block devices from accessing critical applications if the device is not up to date. <\/p>\n<p>Inspecting the device to see whether the disk-level encryption is enabled and the host-level firewall is turned on is also critical. Make a list of attributes you need to inspect, and establish a device posture program. For example, you can make installation of your corporate approved antivirus agent a requirement for any device to get access to your on-premises network or applications. It\u2019s like the rides in Disney World \u2013 you need to be <em>this <\/em>tall to get on the ride.<\/p>\n<p><strong>3. Think About Reducing Friction for the End User at Every Step<br \/><\/strong>Your employees just want to get their work done. They don\u2019t want to think about security and compliance all the time. What if the easiest way to get work done is the most secure way? <\/p>\n<p>For example, in a traditional organization the user needs to login into a virtual private network (VPN) to access a custom on-premises application. Logging into a VPN adds friction. If not properly configured, you are also giving the user excessive access to the entire network instead of limiting them to just the application they need. <\/p>\n<p>VPN-less remote-access solutions enable you to publish your on-premises applications as a cloud app. So the user just logs into them without using a VPN the way they log into a cloud application.<\/p>\n<p>Modern trusted access solutions inspect the user, the device, and the user&#8217;s behavior in real time to decide&nbsp;whether to grant access. These platforms are evolving to evaluate attributes post-login and offer continuous trusted access. <\/p>\n<p>A future where trusted access and actions are enabled with the least amount of friction for the end user looks promising.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/edge-articles\/removing-friction-for-the-enterprise-with-trusted-access\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our work lives are supposed to be simpler and easier because of technology. At least that\u2019s the promise.Read More <a href=\"https:\/\/www.darkreading.com\/edge-articles\/removing-friction-for-the-enterprise-with-trusted-access\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-43514","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Removing Friction for the Enterprise With Trusted Access 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/removing-friction-for-the-enterprise-with-trusted-access\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Removing Friction for the Enterprise With Trusted Access 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/removing-friction-for-the-enterprise-with-trusted-access\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-20T19:57:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltb3135c684eac7bb1\/6170605ea2e4e263c24459c8\/phone-authentication-trust-2D5MGWE.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/removing-friction-for-the-enterprise-with-trusted-access\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/removing-friction-for-the-enterprise-with-trusted-access\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Removing Friction for the Enterprise With Trusted Access\",\"datePublished\":\"2021-10-20T19:57:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/removing-friction-for-the-enterprise-with-trusted-access\\\/\"},\"wordCount\":740,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/removing-friction-for-the-enterprise-with-trusted-access\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltb3135c684eac7bb1\\\/6170605ea2e4e263c24459c8\\\/phone-authentication-trust-2D5MGWE.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/removing-friction-for-the-enterprise-with-trusted-access\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/removing-friction-for-the-enterprise-with-trusted-access\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/removing-friction-for-the-enterprise-with-trusted-access\\\/\",\"name\":\"Removing Friction for the Enterprise With Trusted Access 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/removing-friction-for-the-enterprise-with-trusted-access\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/removing-friction-for-the-enterprise-with-trusted-access\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltb3135c684eac7bb1\\\/6170605ea2e4e263c24459c8\\\/phone-authentication-trust-2D5MGWE.jpg\",\"datePublished\":\"2021-10-20T19:57:30+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/removing-friction-for-the-enterprise-with-trusted-access\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/removing-friction-for-the-enterprise-with-trusted-access\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/removing-friction-for-the-enterprise-with-trusted-access\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltb3135c684eac7bb1\\\/6170605ea2e4e263c24459c8\\\/phone-authentication-trust-2D5MGWE.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltb3135c684eac7bb1\\\/6170605ea2e4e263c24459c8\\\/phone-authentication-trust-2D5MGWE.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/removing-friction-for-the-enterprise-with-trusted-access\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Removing Friction for the Enterprise With Trusted Access\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Removing Friction for the Enterprise With Trusted Access 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/removing-friction-for-the-enterprise-with-trusted-access\/","og_locale":"en_US","og_type":"article","og_title":"Removing Friction for the Enterprise With Trusted Access 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/removing-friction-for-the-enterprise-with-trusted-access\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-10-20T19:57:30+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltb3135c684eac7bb1\/6170605ea2e4e263c24459c8\/phone-authentication-trust-2D5MGWE.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/removing-friction-for-the-enterprise-with-trusted-access\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/removing-friction-for-the-enterprise-with-trusted-access\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Removing Friction for the Enterprise With Trusted Access","datePublished":"2021-10-20T19:57:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/removing-friction-for-the-enterprise-with-trusted-access\/"},"wordCount":740,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/removing-friction-for-the-enterprise-with-trusted-access\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltb3135c684eac7bb1\/6170605ea2e4e263c24459c8\/phone-authentication-trust-2D5MGWE.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/removing-friction-for-the-enterprise-with-trusted-access\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/removing-friction-for-the-enterprise-with-trusted-access\/","url":"https:\/\/www.threatshub.org\/blog\/removing-friction-for-the-enterprise-with-trusted-access\/","name":"Removing Friction for the Enterprise With Trusted Access 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/removing-friction-for-the-enterprise-with-trusted-access\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/removing-friction-for-the-enterprise-with-trusted-access\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltb3135c684eac7bb1\/6170605ea2e4e263c24459c8\/phone-authentication-trust-2D5MGWE.jpg","datePublished":"2021-10-20T19:57:30+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/removing-friction-for-the-enterprise-with-trusted-access\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/removing-friction-for-the-enterprise-with-trusted-access\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/removing-friction-for-the-enterprise-with-trusted-access\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltb3135c684eac7bb1\/6170605ea2e4e263c24459c8\/phone-authentication-trust-2D5MGWE.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltb3135c684eac7bb1\/6170605ea2e4e263c24459c8\/phone-authentication-trust-2D5MGWE.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/removing-friction-for-the-enterprise-with-trusted-access\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Removing Friction for the Enterprise With Trusted Access"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43514","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=43514"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43514\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=43514"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=43514"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=43514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}