{"id":45373,"date":"2022-02-18T16:00:00","date_gmt":"2022-02-18T16:00:00","guid":{"rendered":"https:\/\/www.darkreading.com\/tech-trends\/enterprises-require-more-mfa-less-antivirus-for-remote-workers"},"modified":"2022-02-18T16:00:00","modified_gmt":"2022-02-18T16:00:00","slug":"enterprises-look-beyond-antivirus-software-for-remote-workers","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/enterprises-look-beyond-antivirus-software-for-remote-workers\/","title":{"rendered":"Enterprises Look Beyond Antivirus Software for Remote Workers"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltbc4fb198f8c7dc49\/620ea025a9407c7d495b4e15\/dr-fortinet-fig10-apps.png\" class=\"ff-og-image-inserted\"><\/div>\n<p>Now in the third year of the pandemic, organizations have adapted to the new normal of distributed work, standardizing the equipment remote employees need to do their jobs. And as IT departments adjust to real-world breaches and new technologies, some software is declining in use, such as VPNs and stand-alone antivirus programs. Meanwhile, emphasis on multifactor authentication (MFA) and whitelisting is growing.<\/p>\n<p>The results come from Dark Reading&#8217;s &#8220;2022 Endpoint Security Survey,&#8221; which polled 190 cybersecurity and IT professionals on how pandemic-related changes affect their endpoint security strategies.<\/p>\n<p>In the above graphic, the darker blue bars represent results from the 2022 survey, while the lighter blue shows 2021 numbers. At first glance, antivirus software is clearly the security measure required by the most organizations, at 83%. However, that&#8217;s down 6% from 2021&#8217;s 89%, as the chart shows; the full report states that in 2020, it was 92%. It&#8217;s not that IT departments aren&#8217;t interested in protecting against viruses; however, the report attributes the decline to &#8220;a trend toward the growing integration of malware-detection functions in other technologies, such as endpoint detection and response (EDR) products, operating systems, and cloud technologies.&#8221; The 8% jump in requiring EDR software, from 35% in 2021 to 43% in 2022, supports that interpretation.<\/p>\n<p>After EDR, the next-highest rise in requirements is for MFA, which rose 7% from 51% in 2021 to 58% in 2022. That comes as <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/google-cuts-account-compromises-in-half-with-simple-change\" target=\"_blank\" rel=\"noopener\">Google<\/a> and <a href=\"https:\/\/www.darkreading.com\/operations\/microsoft-multifactor-adoption-remains-low\" target=\"_blank\" rel=\"noopener\">Microsoft<\/a> began pushing MFA for their users, and it makes sense as an effective measure against account breaches such as those in <a href=\"https:\/\/www.darkreading.com\/omdia\/kaseya-hacked-via-authentication-bypass\" target=\"_blank\" rel=\"noopener\">the Kaseya hack<\/a>.<\/p>\n<p>Application whitelisting saw the steepest increase in required use, from 23% to 35%. Whitelisting can <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/rise-in-opportunistic-hacks-and-info-sharing-imperil-industrial-networks-critical-infrastructure\" target=\"_blank\" rel=\"noopener\">head off malware execution<\/a> by not allowing unauthorized programs to run, although the technique <a href=\"https:\/\/www.darkreading.com\/application-security\/zoom-vulnerabilities-demonstrated-in-def-con-talk\" target=\"_blank\" rel=\"noopener\">can be sidestepped<\/a> in some circumstances.<\/p>\n<p>What used to be the gold standard in remote network access security, the VPN, fell from 72% requiring VPNs in 2021 to 67% in 2022. While the report makes no pronouncements about the reason for the 5% drop, cyberattackers often focus on <a href=\"https:\/\/www.darkreading.com\/perimeter\/attackers-heavily-targeting-vpn-vulnerabilities\" target=\"_blank\" rel=\"noopener\">gaining VPN access<\/a>, including the notorious <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/colonial-pipeline-ceo-ransomware-attack-started-via-pilfered-legacy-vpn-account\" target=\"_blank\" rel=\"noopener\">Colonial Pipeline breach<\/a>.<\/p>\n<p>For more, <a href=\"https:\/\/www.informationweek.com\/whitepaper\/cybersecurity\/endpoint-security\/how-enterprises-plan-to-address-endpoint-security-threats-in-a-post-pandemic-world\/436653?gset=yes&amp;\" target=\"_blank\" rel=\"noopener\">read the full report<\/a>.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/tech-trends\/enterprises-require-more-mfa-less-antivirus-for-remote-workers\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Priorities are shifting, with growing emphasis on endpoint detection and response (EDR) software and multifactor authentication (MFA), a recent survey of IT professionals shows.Read More <a href=\"https:\/\/www.darkreading.com\/tech-trends\/enterprises-require-more-mfa-less-antivirus-for-remote-workers\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-45373","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Enterprises Look Beyond Antivirus Software for Remote Workers 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/enterprises-look-beyond-antivirus-software-for-remote-workers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Enterprises Look Beyond Antivirus Software for Remote Workers 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/enterprises-look-beyond-antivirus-software-for-remote-workers\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-18T16:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltbc4fb198f8c7dc49\/620ea025a9407c7d495b4e15\/dr-fortinet-fig10-apps.png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/enterprises-look-beyond-antivirus-software-for-remote-workers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/enterprises-look-beyond-antivirus-software-for-remote-workers\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Enterprises Look Beyond Antivirus Software for Remote Workers\",\"datePublished\":\"2022-02-18T16:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/enterprises-look-beyond-antivirus-software-for-remote-workers\\\/\"},\"wordCount\":340,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/enterprises-look-beyond-antivirus-software-for-remote-workers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltbc4fb198f8c7dc49\\\/620ea025a9407c7d495b4e15\\\/dr-fortinet-fig10-apps.png\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/enterprises-look-beyond-antivirus-software-for-remote-workers\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/enterprises-look-beyond-antivirus-software-for-remote-workers\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/enterprises-look-beyond-antivirus-software-for-remote-workers\\\/\",\"name\":\"Enterprises Look Beyond Antivirus Software for Remote Workers 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/enterprises-look-beyond-antivirus-software-for-remote-workers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/enterprises-look-beyond-antivirus-software-for-remote-workers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltbc4fb198f8c7dc49\\\/620ea025a9407c7d495b4e15\\\/dr-fortinet-fig10-apps.png\",\"datePublished\":\"2022-02-18T16:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/enterprises-look-beyond-antivirus-software-for-remote-workers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/enterprises-look-beyond-antivirus-software-for-remote-workers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/enterprises-look-beyond-antivirus-software-for-remote-workers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltbc4fb198f8c7dc49\\\/620ea025a9407c7d495b4e15\\\/dr-fortinet-fig10-apps.png\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltbc4fb198f8c7dc49\\\/620ea025a9407c7d495b4e15\\\/dr-fortinet-fig10-apps.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/enterprises-look-beyond-antivirus-software-for-remote-workers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Enterprises Look Beyond Antivirus Software for Remote Workers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Enterprises Look Beyond Antivirus Software for Remote Workers 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/enterprises-look-beyond-antivirus-software-for-remote-workers\/","og_locale":"en_US","og_type":"article","og_title":"Enterprises Look Beyond Antivirus Software for Remote Workers 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/enterprises-look-beyond-antivirus-software-for-remote-workers\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-02-18T16:00:00+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltbc4fb198f8c7dc49\/620ea025a9407c7d495b4e15\/dr-fortinet-fig10-apps.png","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/enterprises-look-beyond-antivirus-software-for-remote-workers\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/enterprises-look-beyond-antivirus-software-for-remote-workers\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Enterprises Look Beyond Antivirus Software for Remote Workers","datePublished":"2022-02-18T16:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/enterprises-look-beyond-antivirus-software-for-remote-workers\/"},"wordCount":340,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/enterprises-look-beyond-antivirus-software-for-remote-workers\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltbc4fb198f8c7dc49\/620ea025a9407c7d495b4e15\/dr-fortinet-fig10-apps.png","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/enterprises-look-beyond-antivirus-software-for-remote-workers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/enterprises-look-beyond-antivirus-software-for-remote-workers\/","url":"https:\/\/www.threatshub.org\/blog\/enterprises-look-beyond-antivirus-software-for-remote-workers\/","name":"Enterprises Look Beyond Antivirus Software for Remote Workers 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/enterprises-look-beyond-antivirus-software-for-remote-workers\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/enterprises-look-beyond-antivirus-software-for-remote-workers\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltbc4fb198f8c7dc49\/620ea025a9407c7d495b4e15\/dr-fortinet-fig10-apps.png","datePublished":"2022-02-18T16:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/enterprises-look-beyond-antivirus-software-for-remote-workers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/enterprises-look-beyond-antivirus-software-for-remote-workers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/enterprises-look-beyond-antivirus-software-for-remote-workers\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltbc4fb198f8c7dc49\/620ea025a9407c7d495b4e15\/dr-fortinet-fig10-apps.png","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltbc4fb198f8c7dc49\/620ea025a9407c7d495b4e15\/dr-fortinet-fig10-apps.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/enterprises-look-beyond-antivirus-software-for-remote-workers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Enterprises Look Beyond Antivirus Software for Remote Workers"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45373","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=45373"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45373\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=45373"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=45373"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=45373"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}