{"id":45864,"date":"2022-03-24T00:00:00","date_gmt":"2022-03-24T00:00:00","guid":{"rendered":"urn:uuid:805dbeca-4b10-c788-7fa6-83e51ff2b662"},"modified":"2022-03-24T00:00:00","modified_gmt":"2022-03-24T00:00:00","slug":"cyber-threat-intelligence-risk-management-strategies","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cyber-threat-intelligence-risk-management-strategies\/","title":{"rendered":"Cyber Threat Intelligence: Risk Management Strategies"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/ciso\/22\/c\/risk-management-strategies-to-stop-cyber-threats\/risk-management-strategies-blog-image.png\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/ciso\/22\/c\/risk-management-strategies-to-stop-cyber-threats\/risk-management-strategies-blog-image.png\" class=\"ff-og-image-inserted\"><\/div>\n<p>4. Old vulnerabilities remain relevant<\/p>\n<p>While <a href=\"https:\/\/www.trendmicro.com\/en_us\/apache-log4j-vulnerability.html\">Apache Log4Shell (Log4j)<\/a> was arguably the most prominent zero-day vulnerability of 2021, older flaws remained relevant and effective as well. Data from Trend Micro\u2122 TippingPoint\u2122 shows that the greatest number of detections (75 million) this year were of CVE-2019-1225, a memory disclosure flaw in Microsoft\u2019s Remote Desktop Services (RDS) discovered in August 2019.<\/p>\n<p><span class=\"body-subhead-title\">Explaining cyber risk to the board<\/span><\/p>\n<p>As the digital attack surface expands due to the accelerated shift toward the cloud, enhancing security for more effective cyber risk management is a must. And while you may understand that, getting the board to see it your way can be challenging.<\/p>\n<p>By definition, cyber risk is the financial loss, disruption, or damage to the reputation of an organization resulting from the failure of its IT systems. Make sure the c-suite understands what you mean by cyber risk\u2014poor security leading to financial losses. Look for security tools that can help you get your message across; by aligning security with the bottom line, and even demonstrating how savings can be optimized for business goals, the board will get on board.<\/p>\n<p><span class=\"body-subhead-title\">Mitigation strategies<\/span><\/p>\n<p>To secure your rapidly expanding digital attack surface, you need comprehensive visibility and continuous threat monitoring. In the cloud and across your IT infrastructure, point products are often unable to provide security teams with the complete picture and threat data needed to effectively understand, communicate, and mitigate cyber risk.<\/p>\n<p>We suggest a unified cybersecurity platform with broad third-party integration into your existing ecosystem. Ideally, the platform should automate security as much as possible and provide remediation guidance\u2014not only will this reduce your cyber risk, but it will also relieve overstretched security teams and free them to focus on only the most critical events.<\/p>\n<p>To address top threats like ransomware, cloud misconfigurations, email attacks, and vulnerabilities, look for a platform with the following capabilities and features:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Modern technologies like pre-execution machine learning to find unknown malware hidden in office files attached to emails combined with artificial intelligence to check email behavior, intention, and authorship to identify BEC attacks.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Support for the <a href=\"https:\/\/www.trendmicro.com\/en_us\/what-is\/what-is-zero-trust.html\">Zero Trust approach<\/a>, which requires all users, devices, and applications to be authenticated before granting access and continuously monitored for any suspicious behavior. This will stop attackers from flying under the radar after compromising credentials.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Automated scanning to continuously discover your digital attack surface and alert security teams of any cloud misconfigurations.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Deep threat intelligence and research for up-to-date vulnerability disclosures as well as virtual patching to proactively limit the scope of an attack (like Log4j) before a vendor patch is released.<\/span><\/li>\n<li><span class=\"rte-red-bullet\"><a href=\"https:\/\/www.trendmicro.com\/en_us\/what-is\/xdr.html\">Extended detection and response (XDR)<\/a> to collect and correlate deep threat data across network, cloud, endpoints, users, and workloads to shore up fewer, but higher-confidence alerts.<\/span><\/li>\n<\/ul>\n<p>For more insights into threat trends and the benefits of leveraging a unified cybersecurity platform, check out these resources:<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/22\/c\/cyber-threat-intelligence-risk-management-strategies.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The ever-expanding attack surface of the cloud calls for effective cyber risk management to enable enterprises to innovate and meet business objectives. Discover how to better understand, communicate, and mitigate cyber risk across the enterprise. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":45865,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9528,9549,9548,9527,9529],"class_list":["post-45864","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-ciso-article","tag-trend-micro-ciso-cloud","tag-trend-micro-ciso-digital-transformation","tag-trend-micro-ciso-expert-perspective","tag-trend-micro-ciso-risk-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Threat Intelligence: Risk Management Strategies 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cyber-threat-intelligence-risk-management-strategies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Threat Intelligence: Risk Management Strategies 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cyber-threat-intelligence-risk-management-strategies\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-24T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/ciso\/22\/c\/risk-management-strategies-to-stop-cyber-threats\/risk-management-strategies-blog-image.png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyber-threat-intelligence-risk-management-strategies\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyber-threat-intelligence-risk-management-strategies\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Cyber Threat Intelligence: Risk Management Strategies\",\"datePublished\":\"2022-03-24T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyber-threat-intelligence-risk-management-strategies\/\"},\"wordCount\":485,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyber-threat-intelligence-risk-management-strategies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/cyber-threat-intelligence-risk-management-strategies.png\",\"keywords\":[\"Trend Micro CISO : Article\",\"Trend Micro CISO : Cloud\",\"Trend Micro CISO : Digital Transformation\",\"Trend Micro CISO : Expert Perspective\",\"Trend Micro CISO : Risk Management\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyber-threat-intelligence-risk-management-strategies\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/cyber-threat-intelligence-risk-management-strategies\/\",\"name\":\"Cyber Threat Intelligence: Risk Management Strategies 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyber-threat-intelligence-risk-management-strategies\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyber-threat-intelligence-risk-management-strategies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/cyber-threat-intelligence-risk-management-strategies.png\",\"datePublished\":\"2022-03-24T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyber-threat-intelligence-risk-management-strategies\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/cyber-threat-intelligence-risk-management-strategies\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyber-threat-intelligence-risk-management-strategies\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/cyber-threat-intelligence-risk-management-strategies.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/cyber-threat-intelligence-risk-management-strategies.png\",\"width\":641,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyber-threat-intelligence-risk-management-strategies\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro CISO : Article\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-ciso-article\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Threat Intelligence: Risk Management Strategies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Threat Intelligence: Risk Management Strategies 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cyber-threat-intelligence-risk-management-strategies\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Threat Intelligence: Risk Management Strategies 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cyber-threat-intelligence-risk-management-strategies\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-03-24T00:00:00+00:00","og_image":[{"url":"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/ciso\/22\/c\/risk-management-strategies-to-stop-cyber-threats\/risk-management-strategies-blog-image.png","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cyber-threat-intelligence-risk-management-strategies\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-threat-intelligence-risk-management-strategies\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Cyber Threat Intelligence: Risk Management Strategies","datePublished":"2022-03-24T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-threat-intelligence-risk-management-strategies\/"},"wordCount":485,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-threat-intelligence-risk-management-strategies\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/cyber-threat-intelligence-risk-management-strategies.png","keywords":["Trend Micro CISO : Article","Trend Micro CISO : Cloud","Trend Micro CISO : Digital Transformation","Trend Micro CISO : Expert Perspective","Trend Micro CISO : Risk Management"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cyber-threat-intelligence-risk-management-strategies\/","url":"https:\/\/www.threatshub.org\/blog\/cyber-threat-intelligence-risk-management-strategies\/","name":"Cyber Threat Intelligence: Risk Management Strategies 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-threat-intelligence-risk-management-strategies\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-threat-intelligence-risk-management-strategies\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/cyber-threat-intelligence-risk-management-strategies.png","datePublished":"2022-03-24T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-threat-intelligence-risk-management-strategies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cyber-threat-intelligence-risk-management-strategies\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cyber-threat-intelligence-risk-management-strategies\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/cyber-threat-intelligence-risk-management-strategies.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/cyber-threat-intelligence-risk-management-strategies.png","width":641,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cyber-threat-intelligence-risk-management-strategies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro CISO : Article","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-ciso-article\/"},{"@type":"ListItem","position":3,"name":"Cyber Threat Intelligence: Risk Management Strategies"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45864","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=45864"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45864\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/45865"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=45864"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=45864"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=45864"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}