{"id":44266,"date":"2021-12-03T20:40:00","date_gmt":"2021-12-03T20:40:00","guid":{"rendered":"https:\/\/www.darkreading.com\/operations\/igi-cybersecurity-introduces-ciso-team-as-a-service"},"modified":"2021-12-03T20:40:00","modified_gmt":"2021-12-03T20:40:00","slug":"igi-cybersecurity-introduces-ciso-team-as-a-service","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/igi-cybersecurity-introduces-ciso-team-as-a-service\/","title":{"rendered":"IGI Cybersecurity Introduces CISO Team-as-a-Service"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/beta.darkreading.com\/images\/og-image.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>PITTSFORD, NY \/ Dec. 2, 2021\u2014Infinite Group, Inc. (IGI) (OTCQB:IMCI)&nbsp;has added a new service to its portfolio to give customers access to its full team of security experts. CISO Team-as-a-Service\u2122 (TaaS) is designed to help customers meet their business requirements around cybersecurity, leadership, risk management,&nbsp;and compliance.<\/p>\n<p>IGI\u2019s CISO TaaS\u2122 includes access to a high-performance team of CISOs and security experts with more than 20 years of experience per team member. Each team member has extensive expertise in developing, implementing, and managing technical and operational security plans that align with business objectives, and are trusted advisors to C-Suite and Board of Directors.<\/p>\n<p>\u201cWith the traditional role of a CISO evolving, companies can\u2019t expect one person to meet all their business needs,\u201d said Chad Walter, IGI\u2019s VP of Sales and Marketing. \u201cWe designed a program that helps align cybersecurity with their business goals and gives them a level of service they can\u2019t get with a single employee or consultant.\u201d<\/p>\n<p>The evolution of this service, formerly called Virtual CISO or vCISO, to a team approach is based on the changing nature of the CISO role. Since security risks and breaches can disrupt the entire company\u2019s operations, the role of the CISO in business is no longer only technical in nature.&nbsp;The CISO is now much more involved in the overall risk management and business leadership of an organization.<\/p>\n<p>\u201cThe CISO, or CISO team, now must be&nbsp;familiar with the business as a whole and tie security initiatives into the business,\u201d said Andrew Hoyen, President and COO of IGI Cybersecurity. \u201cCISOs are expected to have both breadth and depth of knowledge in key security areas\u2014and understand how security affects the overall business. IGI\u2019s new CISO TaaS provides our customers a security team&nbsp;but at a fraction of the price&nbsp;of a CISO.\u201d<\/p>\n<p>The CISO TaaS is a customized program that is focused on strategy, partnership, and execution. Included services are based on the customer\u2019s individual needs, and may include policies and procedures, risk assessments, vulnerability scanning, penetration testing, incident response, and more.&nbsp;The team\u2019s security certifications include CISSP, CRISC, CDPSE, CISA, and more.<\/p>\n<p>Learn more at&nbsp;<a href=\"https:\/\/info.igicybersecurity.com\/e3t\/Btc\/ON+113\/cpKr704\/VVNRGm89FSJLN10nKnsdXFS7W1HN78y4BBWrZN8JCsD73lLB3V1-WJV7CgC56W1xJq9J3KQP5qW24LY0V84pNRrW1f4gmS14w2DqW7v8YTJ1kpqZNW5613y14vNyKNW2QXbKv3cLGpnW7N3rz-6bpX53W6FKrJM6FttSpW2mwKfr6czZczW8PDC-z6h681BW1ttZpg3vyy4SW1dyqzd38Dhk1W3jG-4Z2ljGgWVN7hD16Jtd3HW2LTf-j9c0Dq4W6K16zQ4GYFg7W1f6tR95K7-8ZW41wlz43qbsm6W5nQbb62T0GDkW66hCTF55kDN831dY1\">www.IGIcybersecurity.com<\/a>. Email&nbsp;<a href=\"https:\/\/www.darkreading.com\/cdn-cgi\/l\/email-protection#f0b9a2b09997998583de939f9d\"><span class=\"__cf_email__\" data-cfemail=\"db92899bb2bcb2aea8f5b8b4b6\">[email&nbsp;protected]<\/span><\/a>&nbsp;for investment inquiries.<\/p>\n<p><strong>About IGI Cybersecurity<\/strong><\/p>\n<p>Headquartered in Rochester, NY with a remote workforce spanning across the United States, IGI Cybersecurity delivers people-driven cybersecurity for personalized, resilient cyber defense focused on individualized business strategy, enterprise-wide expertise and unshakeable partnership. We are The Cybersecurity People\u2122.<\/p>\n<p>IGI Cybersecurity is also the OEM of the Nodeware\u00ae vulnerability management solution, an award-winning SaaS platform that continuously scans networks to identify critical vulnerabilities. Learn more at&nbsp;<a href=\"http:\/\/igicybersecurity.com\/\">igicybersecurity.com<\/a>&nbsp;and&nbsp;<a href=\"http:\/\/nodeware.com\/\">nodeware.com<\/a>.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/operations\/igi-cybersecurity-introduces-ciso-team-as-a-service\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Service gives customers access to a CISO-led team of practitioners with a variety of skills and expertise.Read More <a href=\"https:\/\/www.darkreading.com\/operations\/igi-cybersecurity-introduces-ciso-team-as-a-service\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-44266","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IGI Cybersecurity Introduces CISO Team-as-a-Service 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/igi-cybersecurity-introduces-ciso-team-as-a-service\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IGI Cybersecurity Introduces CISO Team-as-a-Service 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/igi-cybersecurity-introduces-ciso-team-as-a-service\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-03T20:40:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/beta.darkreading.com\/images\/og-image.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/igi-cybersecurity-introduces-ciso-team-as-a-service\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/igi-cybersecurity-introduces-ciso-team-as-a-service\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"IGI Cybersecurity Introduces CISO Team-as-a-Service\",\"datePublished\":\"2021-12-03T20:40:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/igi-cybersecurity-introduces-ciso-team-as-a-service\\\/\"},\"wordCount\":465,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/igi-cybersecurity-introduces-ciso-team-as-a-service\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/og-image.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/igi-cybersecurity-introduces-ciso-team-as-a-service\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/igi-cybersecurity-introduces-ciso-team-as-a-service\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/igi-cybersecurity-introduces-ciso-team-as-a-service\\\/\",\"name\":\"IGI Cybersecurity Introduces CISO Team-as-a-Service 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/igi-cybersecurity-introduces-ciso-team-as-a-service\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/igi-cybersecurity-introduces-ciso-team-as-a-service\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/og-image.jpg\",\"datePublished\":\"2021-12-03T20:40:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/igi-cybersecurity-introduces-ciso-team-as-a-service\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/igi-cybersecurity-introduces-ciso-team-as-a-service\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/igi-cybersecurity-introduces-ciso-team-as-a-service\\\/#primaryimage\",\"url\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/og-image.jpg\",\"contentUrl\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/og-image.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/igi-cybersecurity-introduces-ciso-team-as-a-service\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IGI Cybersecurity Introduces CISO Team-as-a-Service\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IGI Cybersecurity Introduces CISO Team-as-a-Service 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/igi-cybersecurity-introduces-ciso-team-as-a-service\/","og_locale":"en_US","og_type":"article","og_title":"IGI Cybersecurity Introduces CISO Team-as-a-Service 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/igi-cybersecurity-introduces-ciso-team-as-a-service\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-12-03T20:40:00+00:00","og_image":[{"url":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/igi-cybersecurity-introduces-ciso-team-as-a-service\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/igi-cybersecurity-introduces-ciso-team-as-a-service\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"IGI Cybersecurity Introduces CISO Team-as-a-Service","datePublished":"2021-12-03T20:40:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/igi-cybersecurity-introduces-ciso-team-as-a-service\/"},"wordCount":465,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/igi-cybersecurity-introduces-ciso-team-as-a-service\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/igi-cybersecurity-introduces-ciso-team-as-a-service\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/igi-cybersecurity-introduces-ciso-team-as-a-service\/","url":"https:\/\/www.threatshub.org\/blog\/igi-cybersecurity-introduces-ciso-team-as-a-service\/","name":"IGI Cybersecurity Introduces CISO Team-as-a-Service 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/igi-cybersecurity-introduces-ciso-team-as-a-service\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/igi-cybersecurity-introduces-ciso-team-as-a-service\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","datePublished":"2021-12-03T20:40:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/igi-cybersecurity-introduces-ciso-team-as-a-service\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/igi-cybersecurity-introduces-ciso-team-as-a-service\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/igi-cybersecurity-introduces-ciso-team-as-a-service\/#primaryimage","url":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","contentUrl":"https:\/\/beta.darkreading.com\/images\/og-image.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/igi-cybersecurity-introduces-ciso-team-as-a-service\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"IGI Cybersecurity Introduces CISO Team-as-a-Service"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44266","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=44266"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44266\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=44266"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=44266"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=44266"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}