{"id":46479,"date":"2022-05-04T00:00:00","date_gmt":"2022-05-04T00:00:00","guid":{"rendered":"urn:uuid:7add9de9-234f-82ae-7e43-be012ba446a5"},"modified":"2022-05-04T00:00:00","modified_gmt":"2022-05-04T00:00:00","slug":"workshop-simplifying-network-security-in-the-cloud","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/workshop-simplifying-network-security-in-the-cloud\/","title":{"rendered":"Workshop: Simplifying Network Security in the Cloud"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/22\/e\/workshop--simplifying-network-security-in-the-cloud\/simple-network-sec-devops-tn.jpg\"><\/p>\n<h2 id=\"simplifying-network-security-in-the-cloud-with-trend-micro-cloud-one\">Simplifying Network Security in the Cloud with Trend Micro &#8211; Cloud One<\/h2>\n<p><img decoding=\"async\" src=\"https:\/\/cloudone-net.awsworkshop.io\/images\/logo.png\" alt=\"TrendMicro\"><\/p>\n<p>In this workshop, you\u2019ll learn how to leverage edge protection deployment with Cloud One &#8211; Network Security to provide a powerful network security layer which can be deployed seamlessly into your existing AWS architecture, making it easier and simpler to apply cloud security. This technology inspects inbound and outbound traffic, detecting and preventing malicious payloads and attacks against your application running in AWS, and enabling organizations to securely achieve their business goals.<\/p>\n<p>Using <strong>Trend Micro &#8211; Cloud One, AWS Internet Gateway, AWS NAT Gateway, AWS CloudWatch<\/strong>, and other AWS services, you\u2019ll get hands-on experience implementing Network Security via CloudFormation to automate deployment, security and compliance workflows.<\/p>\n<hr>\n<h2 id=\"workshop-structure\">Workshop Structure<\/h2>\n<p>The workshop is divided into the sections listed below. Plan on setting aside 2 hours to complete the full workshop.<\/p>\n<p><span><i class=\"fas fa-check fa-xs\"><\/i><\/span> <b> 1. Introduction &#8211; (10 minutes)<\/b><\/p>\n<p><span><i class=\"fas fa-check fa-xs\"><\/i><\/span> <b> 2. Networking Security Architectures (15 minutes)<\/b><\/p>\n<p><span><i class=\"fas fa-check fa-xs\"><\/i><\/span> <b> 3. Prerequisites (15 minutes)<\/b><\/p>\n<p><span><i class=\"fas fa-check fa-xs\"><\/i><\/span> <b> 4. Deploying Network Security (60 minutes)<\/b><\/p>\n<p><span><i class=\"fas fa-check fa-xs\"><\/i><\/span> <b> 5. Testing Security Features (15 minutes)<\/b><\/p>\n<p><span><i class=\"fas fa-check fa-xs\"><\/i><\/span> <b> 6. CleanUp (15 minutes)<\/b><\/p>\n<hr>\n<h2 id=\"learning-objectives\">Learning Objectives<\/h2>\n<ul>\n<li>Cloud workloads frequently require internet access and, as we know, anything accessing the internet can be breached. This workshop explores simple tactics that can be used to protect internet connections to your AWS services and connections between VPCs.<\/li>\n<li>Learn how to protect your cloud network and meet compliance requirements<\/li>\n<li>Simplify the deployment of Network Security, while making it seamless and transparent for your organization<\/li>\n<li>Partner confidently with your security provider: Trend Micro\u2122 Research and Trend Micro\u2122 Zero Day Initiative\u2122, who directly provide filters for Network Security customers, so you can protect, detect, and respond to threats faster and with greater knowledge.<\/li>\n<\/ul>\n<hr>\n<h2 id=\"who-should-attend\">Who should attend<\/h2>\n<ul>\n<li>DevOps Engineers<\/li>\n<li>Cloud Architects<\/li>\n<li>Solution Architects<\/li>\n<li>Network Security Analysts<\/li>\n<li>Network Security Architects<\/li>\n<li>Information Security teams<\/li>\n<li>GRC teams<\/li>\n<li>Tech Leads and Program Managers (PM)<\/li>\n<\/ul>\n<hr>\n<h3 id=\"background-knowledge-for-the-workshop\"><strong>Background knowledge for the Workshop<\/strong><\/h3>\n<ul>\n<li>Basic knowledge of AWS<\/li>\n<li>Basic security knowledge<\/li>\n<\/ul>\n<hr>\n<h3 id=\"additional-help\"><strong>Additional Help<\/strong><\/h3>\n<p>For any additional help please reach out to:<\/p>\n<ul>\n<li>Fernando Cardoso &#8211; Email: fernando_cardoso@trendmicro.com<\/li>\n<li>Felipe Costa &#8211; Email: felipe_costa@trendmicro.com<\/li>\n<li>Franzvitor Fiorim &#8211; Email: franzvitor_fiorim@trendmicro.com<\/li>\n<li>Justin Perkins &#8211; Email: justin_perkins@trendmicro.com<\/li>\n<\/ul>\n<p>\n<a href=\"mailto:fernando_cardoso@trendmicro.com;felipe_costa@trendmicro.com;franzvitor_fiorim@trendmicro.com;justin_perkins@trendmicro.com?subject=Simplifying%20Network%20Security%20in%20the%20Cloud%20with%20Trend%20Micro%20-%20Cloud%20One\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"btn btn-default\"> Talk to us <i class=\"fas fa-paper-plane\"><\/i><br \/>\n<\/a> <a href=\"https:\/\/github.com\/aws-samples\/aws-modernization-with-cloud-one-network-security\/issues\/new\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"btn btn-default\"> <i class=\"fas fa-bug\"><\/i> Report an issue or feature request<br \/>\n<\/a>\n<\/p>\n<p>Built with <i class=\"far fa-heart\"><\/i> by Trend Micro team<\/p>\n<hr>\n<p>Before we dive in, let\u2019s go through a refresher on the core concepts explored in this workshop.<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/devops\/22\/e\/workshop-simplifying-network-security-in-the-cloud.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this workshop, you will learn how to leverage Trend Micro Cloud One\u2122 &#8211; Network Security to provide a powerful network security layer which can be deployed seamlessly into your existing AWS architecture. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":46480,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9505,9530,9501,9986,9676],"class_list":["post-46479","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-devops-aws","tag-trend-micro-devops-best-practices","tag-trend-micro-devops-cloud-native","tag-trend-micro-devops-free-trials","tag-trend-micro-devops-network-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Workshop: Simplifying Network Security in the Cloud 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/workshop-simplifying-network-security-in-the-cloud\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Workshop: Simplifying Network Security in the Cloud 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/workshop-simplifying-network-security-in-the-cloud\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-04T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/22\/e\/workshop--simplifying-network-security-in-the-cloud\/simple-network-sec-devops-tn.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/workshop-simplifying-network-security-in-the-cloud\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/workshop-simplifying-network-security-in-the-cloud\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Workshop: Simplifying Network Security in the Cloud\",\"datePublished\":\"2022-05-04T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/workshop-simplifying-network-security-in-the-cloud\\\/\"},\"wordCount\":386,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/workshop-simplifying-network-security-in-the-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/workshop-simplifying-network-security-in-the-cloud.png\",\"keywords\":[\"Trend Micro DevOps : AWS\",\"Trend Micro DevOps : Best Practices\",\"Trend Micro DevOps : Cloud Native\",\"Trend Micro DevOps : Free Trials\",\"Trend Micro DevOps : Network Security\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/workshop-simplifying-network-security-in-the-cloud\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/workshop-simplifying-network-security-in-the-cloud\\\/\",\"name\":\"Workshop: Simplifying Network Security in the Cloud 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/workshop-simplifying-network-security-in-the-cloud\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/workshop-simplifying-network-security-in-the-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/workshop-simplifying-network-security-in-the-cloud.png\",\"datePublished\":\"2022-05-04T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/workshop-simplifying-network-security-in-the-cloud\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/workshop-simplifying-network-security-in-the-cloud\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/workshop-simplifying-network-security-in-the-cloud\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/workshop-simplifying-network-security-in-the-cloud.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/workshop-simplifying-network-security-in-the-cloud.png\",\"width\":268,\"height\":112},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/workshop-simplifying-network-security-in-the-cloud\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro DevOps : AWS\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-devops-aws\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Workshop: Simplifying Network Security in the Cloud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Workshop: Simplifying Network Security in the Cloud 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/workshop-simplifying-network-security-in-the-cloud\/","og_locale":"en_US","og_type":"article","og_title":"Workshop: Simplifying Network Security in the Cloud 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/workshop-simplifying-network-security-in-the-cloud\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-05-04T00:00:00+00:00","og_image":[{"url":"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/22\/e\/workshop--simplifying-network-security-in-the-cloud\/simple-network-sec-devops-tn.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/workshop-simplifying-network-security-in-the-cloud\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/workshop-simplifying-network-security-in-the-cloud\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Workshop: Simplifying Network Security in the Cloud","datePublished":"2022-05-04T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/workshop-simplifying-network-security-in-the-cloud\/"},"wordCount":386,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/workshop-simplifying-network-security-in-the-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/workshop-simplifying-network-security-in-the-cloud.png","keywords":["Trend Micro DevOps : AWS","Trend Micro DevOps : Best Practices","Trend Micro DevOps : Cloud Native","Trend Micro DevOps : Free Trials","Trend Micro DevOps : Network Security"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/workshop-simplifying-network-security-in-the-cloud\/","url":"https:\/\/www.threatshub.org\/blog\/workshop-simplifying-network-security-in-the-cloud\/","name":"Workshop: Simplifying Network Security in the Cloud 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/workshop-simplifying-network-security-in-the-cloud\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/workshop-simplifying-network-security-in-the-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/workshop-simplifying-network-security-in-the-cloud.png","datePublished":"2022-05-04T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/workshop-simplifying-network-security-in-the-cloud\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/workshop-simplifying-network-security-in-the-cloud\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/workshop-simplifying-network-security-in-the-cloud\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/workshop-simplifying-network-security-in-the-cloud.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/workshop-simplifying-network-security-in-the-cloud.png","width":268,"height":112},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/workshop-simplifying-network-security-in-the-cloud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro DevOps : AWS","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-devops-aws\/"},{"@type":"ListItem","position":3,"name":"Workshop: Simplifying Network Security in the Cloud"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46479","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=46479"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46479\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/46480"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=46479"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=46479"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=46479"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}