{"id":46998,"date":"2022-06-01T14:55:52","date_gmt":"2022-06-01T14:55:52","guid":{"rendered":"http:\/\/9d3579ae-db62-47d6-b9ca-578420ab7ab1"},"modified":"2022-06-01T14:55:52","modified_gmt":"2022-06-01T14:55:52","slug":"cloud-computing-dominates-but-security-is-now-the-biggest-challenge","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cloud-computing-dominates-but-security-is-now-the-biggest-challenge\/","title":{"rendered":"Cloud computing dominates. But security is now the biggest challenge"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large c-shortcodeImage-hasCaption\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage\"><!----> <img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/cloud-computing-dominates-but-security-is-now-its-biggest-challenge\/\" alt=\"gettyimages-1347879996.jpg\" height=\"726.6277097078229\" width=\"1092\"><\/picture><\/div>\n<p> <!----> <!----><\/div>\n<p> <!----><figcaption readability=\"1.5\">\n<div class=\"c-CmsContent c-shortcodeImage_caption g-inner-spacing-right-small g-text-medium g-color-black\" readability=\"33\">\n<p>Cloud computing security is complicated, but now a top priority for business.<\/p>\n<\/div>\n<p> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall g-color-gray70 u-block g-text-xsmall\">Credit: Getty Images\/Charday Penn<\/span><\/figcaption><\/figure>\n<p>It&#8217;s clear that <a href=\"https:\/\/www.zdnet.com\/article\/what-is-cloud-computing-everything-you-need-to-know-about-the-cloud\/\" rel=\"follow\">cloud computing is rapidly becoming<\/a> the dominant model for used by business to host data and applications, and to develop new services.<\/p>\n<div class=\"c-shortcodePinbox c-shortcodePinbox-single g-border-thin-light-top g-border-thin-light-bottom g-outer-spacing-top-medium g-outer-spacing-bottom-medium g-inner-spacing-bottom-small\">\n<h3 class=\"c-sectionHeading\"> Special Feature <\/h3>\n<\/p><\/div>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/cloud-computing-has-won-but-we-still-dont-know-what-that-means\/\" rel=\"follow\">Adoption of cloud computing<\/a> has been growing rapidly over the past decade, and soon a tipping point will be reached, with use of cloud computing for application software, infrastructure software, business process services and system infrastructure overtaking traditional on-premises technology options within the next two or three years. <\/p>\n<p>Recent events such as the enforced shift to hybrid working have generated further momentum behind cloud services, and as cloud offerings continue to mature and evolve, it&#8217;s likely that adoption will continue to expand. <\/p>\n<p>That&#8217;s because cloud computing has some obvious advantages. Those include the ability to scale services almost infinitely based on demand without the need to buy or maintain expensive hardware, and the ability to take advantage of new applications without having teams of engineers on the payroll to deploy and manage them. <\/p>\n<p>But the switch to cloud computing also brings new challenges. And the biggest worry for many is security. <\/p>\n<p>It&#8217;s true that one of the key advantages of the cloud for businesses is the opportunity to turn their systems and data over to a cloud company with dedicated experts working to keep their systems secure. That&#8217;s certainly the case with software as a service (SaaS), which for many businesses takes away the worries and headaches around patching and maintaining software on their own servers. <\/p>\n<p>But that doesn&#8217;t mean businesses can forget about security after moving to the cloud. <\/p>\n<p>Reaping the full benefits of cloud computing means using more than one cloud company, with data and workloads moving between a company&#8217;s own data centre and the cloud, or between different clouds. <\/p>\n<p>While the move to cloud computing may have removed some basic security worries, the emergence of the hybrid cloud has introduced a whole new set. Those range from securing staff access to services, ensuring that data is encrypted and not left accidentally exposed to other cloud users, and making sure that data stays safe when moving between applications and cloud services. No two cloud services are exactly the same, and the risks increase as the use of cloud computing expands to new areas.<\/p>\n<p>This cloud computing security special report from ZDNet looks at some to the key issues and shows how cloud security is evolving. Moving to the cloud creates opportunities, but don&#8217;t ignore the security challenges.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/cloud-computing-dominates-but-security-is-now-its-biggest-challenge\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Even if cloud computing has all the momentum, there&#8217;s still plenty of work to do to secure it.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-46998","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cloud computing dominates. But security is now the biggest challenge 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cloud-computing-dominates-but-security-is-now-the-biggest-challenge\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud computing dominates. But security is now the biggest challenge 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cloud-computing-dominates-but-security-is-now-the-biggest-challenge\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-01T14:55:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/article\/cloud-computing-dominates-but-security-is-now-its-biggest-challenge\/\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-computing-dominates-but-security-is-now-the-biggest-challenge\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-computing-dominates-but-security-is-now-the-biggest-challenge\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Cloud computing dominates. But security is now the biggest challenge\",\"datePublished\":\"2022-06-01T14:55:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-computing-dominates-but-security-is-now-the-biggest-challenge\\\/\"},\"wordCount\":444,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-computing-dominates-but-security-is-now-the-biggest-challenge\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/cloud-computing-dominates-but-security-is-now-its-biggest-challenge\\\/\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-computing-dominates-but-security-is-now-the-biggest-challenge\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-computing-dominates-but-security-is-now-the-biggest-challenge\\\/\",\"name\":\"Cloud computing dominates. But security is now the biggest challenge 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-computing-dominates-but-security-is-now-the-biggest-challenge\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-computing-dominates-but-security-is-now-the-biggest-challenge\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/cloud-computing-dominates-but-security-is-now-its-biggest-challenge\\\/\",\"datePublished\":\"2022-06-01T14:55:52+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-computing-dominates-but-security-is-now-the-biggest-challenge\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-computing-dominates-but-security-is-now-the-biggest-challenge\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-computing-dominates-but-security-is-now-the-biggest-challenge\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/cloud-computing-dominates-but-security-is-now-its-biggest-challenge\\\/\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/cloud-computing-dominates-but-security-is-now-its-biggest-challenge\\\/\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-computing-dominates-but-security-is-now-the-biggest-challenge\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud computing dominates. But security is now the biggest challenge\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloud computing dominates. But security is now the biggest challenge 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cloud-computing-dominates-but-security-is-now-the-biggest-challenge\/","og_locale":"en_US","og_type":"article","og_title":"Cloud computing dominates. But security is now the biggest challenge 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cloud-computing-dominates-but-security-is-now-the-biggest-challenge\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-06-01T14:55:52+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/article\/cloud-computing-dominates-but-security-is-now-its-biggest-challenge\/","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cloud-computing-dominates-but-security-is-now-the-biggest-challenge\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cloud-computing-dominates-but-security-is-now-the-biggest-challenge\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Cloud computing dominates. But security is now the biggest challenge","datePublished":"2022-06-01T14:55:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cloud-computing-dominates-but-security-is-now-the-biggest-challenge\/"},"wordCount":444,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cloud-computing-dominates-but-security-is-now-the-biggest-challenge\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/cloud-computing-dominates-but-security-is-now-its-biggest-challenge\/","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cloud-computing-dominates-but-security-is-now-the-biggest-challenge\/","url":"https:\/\/www.threatshub.org\/blog\/cloud-computing-dominates-but-security-is-now-the-biggest-challenge\/","name":"Cloud computing dominates. But security is now the biggest challenge 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cloud-computing-dominates-but-security-is-now-the-biggest-challenge\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cloud-computing-dominates-but-security-is-now-the-biggest-challenge\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/cloud-computing-dominates-but-security-is-now-its-biggest-challenge\/","datePublished":"2022-06-01T14:55:52+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cloud-computing-dominates-but-security-is-now-the-biggest-challenge\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cloud-computing-dominates-but-security-is-now-the-biggest-challenge\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cloud-computing-dominates-but-security-is-now-the-biggest-challenge\/#primaryimage","url":"https:\/\/www.zdnet.com\/article\/cloud-computing-dominates-but-security-is-now-its-biggest-challenge\/","contentUrl":"https:\/\/www.zdnet.com\/article\/cloud-computing-dominates-but-security-is-now-its-biggest-challenge\/"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cloud-computing-dominates-but-security-is-now-the-biggest-challenge\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cloud computing dominates. But security is now the biggest challenge"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46998","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=46998"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46998\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=46998"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=46998"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=46998"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}