{"id":46965,"date":"2022-06-03T10:00:00","date_gmt":"2022-06-03T10:00:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get\/"},"modified":"2022-06-03T10:00:00","modified_gmt":"2022-06-03T10:00:00","slug":"who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get\/","title":{"rendered":"Who is selling Zero Trust Network Access (ZTNA) and what do you get?"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2021\/11\/12_zero-trust-100911242-large.jpg?auto=webp&amp;quality=85,70\" class=\"ff-og-image-inserted\"><\/div>\n<p>Enterprise interest in Zero Trust Network Access (ZTNA) has soared over the past two years among organizations trying to enable secure anywhere, anytime, any device access to IT resources for employees, contractors and third parties.<\/p>\n<p>Much of this interest has stemmed from organizations looking to replace <a href=\"https:\/\/www.networkworld.com\/article\/3268744\/understanding-virtual-private-networks-and-why-vpns-are-important-to-sd-wan.html\">VPNs<\/a> as the primary remote access mechanism to their networks and data. But it is also being driven by organizations seeking to bolster security in an environment where enterprise data is scattered across on-premises and multi-cloud environments, and being accessed in more ways than ever before.<\/p>\n<p>&#8220;There are two kinds of firms adopting&nbsp;Zero&nbsp;Trust,&#8221; says David Holmes, senior analyst at Forrester Research. &#8220;The work-from-home exodus of the pandemic overloaded many corporate VPNs, causing IT to reach for Zero Trust Network Access solutions primarily as a VPN replacement,&#8221; he says.<\/p>\n<aside class=\"fakesidebar\"><a href=\"https:\/\/www.networkworld.com\/article\/3643670\/how-to-buy-sase.html\">How to buy SASE<\/a><\/aside>\n<p>While <a href=\"https:\/\/www.networkworld.com\/article\/3611530\/zero-trust-network-access-the-evolution-of-vpn.html\">ZTNA<\/a> is primarily a security approach, half of the organizations that Forrester encountered adopted it for performance, citing the latency of their VPN technology &#8220;You could legitimately say that remote work was the killer app for&nbsp;Zero&nbsp;Trust&nbsp;over the last two years,&#8221; Holmes says.<\/p>\n<p>The second kind of organization that Forrester has begun seeing more of recently are those taking a strategic approach to Zero Trust and using it to secure access to their network, applications, and data, he says. &#8220;Many federal agencies have a mandate from last year\u2019s Biden Executive Order and we\u2019re working with many of them to create roadmaps to increase their Zero Trust maturity,&#8221;&nbsp;he adds.&nbsp;<\/p>\n<h2>What is Zero Trust Network Access?<\/h2>\n<p>Zero Trust is essentially a security approach where all access requests to enterprise applications and IT resources are authenticated and monitored on a continuous basis, regardless of whether the access is from inside the perimeter or outside.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id> <\/aside>\n<p>The model assumes a default deny position for all access requests and is designed to ensure least privileged access to resources on an as-needed basis. While most organizations are currently applying Zero Trust to network access, the model can also be applied to protect data, applications, and the infrastructure via <a href=\"https:\/\/www.networkworld.com\/search?q=microsegmentation#gsc.tab=0&amp;gsc.q=microsegmentation&amp;gsc.page=1\">microsegmentation<\/a>.<\/p>\n<p>Gartner analyst John Watts says many organizations currently are implementing Zero Trust tactically as a VPN replacement approach. The primary use cases for these organizations are to enable secure access to internal apps for remote workers; to provide remote access for the extended workforce; and to provide secure access to users of privileged accounts. Some are also applying a Zero Trust model for on-premises access, he says.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id> <\/aside>\n<p>Zero Trust technologies that support the first use case typically involve the use of an agent, an on-premises or cloud security gateway, and a secure connector between the enterprise and the gateway, Watts says. Technologies for extended workforce access are typically clientless and browser or portal based, while those for the other use cases can include both agent-based and agent-less approaches, he notes.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3663011\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nEnterprise interest in Zero Trust Network Access (ZTNA) has soared over the past two years among organizations trying to enable secure anywhere, anytime, any device access to IT resources for employees, contractors and third parties.Much of this interest has stemmed from organizations looking to replace VPNs as the primary remote access mechanism to their networks and data. But it is also being driven by organizations seeking to bolster security in an environment where enterprise data is scattered across on-premises and multi-cloud environments, and being accessed in more ways than ever before.To read this article in full, please click here READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":46966,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[3259,4098,539,10041,1061,3124,307],"class_list":["post-46965","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-access-control","tag-akamai","tag-cisco-systems","tag-citrix-systems","tag-network-security","tag-remote-access","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Who is selling Zero Trust Network Access (ZTNA) and what do you get? 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Who is selling Zero Trust Network Access (ZTNA) and what do you get? 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-03T10:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.idgesg.net\/images\/article\/2021\/11\/12_zero-trust-100911242-large.jpg?auto=webp&amp;quality=85,70\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Who is selling Zero Trust Network Access (ZTNA) and what do you get?\",\"datePublished\":\"2022-06-03T10:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get\/\"},\"wordCount\":501,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/06\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get.jpg\",\"keywords\":[\"access control\",\"akamai\",\"Cisco systems\",\"Citrix Systems\",\"Network Security\",\"remote access\",\"Security\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get\/\",\"name\":\"Who is selling Zero Trust Network Access (ZTNA) and what do you get? 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/06\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get.jpg\",\"datePublished\":\"2022-06-03T10:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/06\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/06\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"access control\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/access-control\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Who is selling Zero Trust Network Access (ZTNA) and what do you get?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Who is selling Zero Trust Network Access (ZTNA) and what do you get? 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get\/","og_locale":"en_US","og_type":"article","og_title":"Who is selling Zero Trust Network Access (ZTNA) and what do you get? 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-06-03T10:00:00+00:00","og_image":[{"url":"https:\/\/images.idgesg.net\/images\/article\/2021\/11\/12_zero-trust-100911242-large.jpg?auto=webp&amp;quality=85,70","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Who is selling Zero Trust Network Access (ZTNA) and what do you get?","datePublished":"2022-06-03T10:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get\/"},"wordCount":501,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/06\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get.jpg","keywords":["access control","akamai","Cisco systems","Citrix Systems","Network Security","remote access","Security"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get\/","url":"https:\/\/www.threatshub.org\/blog\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get\/","name":"Who is selling Zero Trust Network Access (ZTNA) and what do you get? 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/06\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get.jpg","datePublished":"2022-06-03T10:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/06\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/06\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/who-is-selling-zero-trust-network-access-ztna-and-what-do-you-get\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"access control","item":"https:\/\/www.threatshub.org\/blog\/tag\/access-control\/"},{"@type":"ListItem","position":3,"name":"Who is selling Zero Trust Network Access (ZTNA) and what do you get?"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46965","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=46965"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46965\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/46966"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=46965"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=46965"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=46965"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}