{"id":47533,"date":"2022-07-15T10:00:00","date_gmt":"2022-07-15T10:00:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/are-you-doing-enough-to-secure-your-network-infrastructure\/"},"modified":"2022-07-15T10:00:00","modified_gmt":"2022-07-15T10:00:00","slug":"are-you-doing-enough-to-secure-your-network-infrastructure","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/are-you-doing-enough-to-secure-your-network-infrastructure\/","title":{"rendered":"Are you doing enough to secure your network infrastructure?"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2018\/12\/network-security_lock_padlock_breach-100782976-large.jpg?auto=webp&amp;quality=85,70\" class=\"ff-og-image-inserted\"><\/div>\n<p>It\u2019s time to take a hard look at whether you\u2019re devoting enough resources to securing your network infrastructure. Short answer: You\u2019re probably not.<\/p>\n<p>If you work for a hyperscaler, your organization is probably doing everything it can to secure the network. For almost everyone else, it is pretty safe to assume that the answer is no.<\/p>\n<p>This is not necessarily a blameworthy failing. In many cases it is down to available resources and perceived risk: Given too little money for cybersecurity and too little time from too few people to tackle all possible risks in the network, what should network cybersecurity staff focus on? They tend to focus less on the inward-facing aspects of their networks and more on explicitly outward-facing pieces.<\/p>\n<aside class=\"fakesidebar fakesidebar-auto sidebar\">\n<p><strong> Read more: <\/strong><a href=\"https:\/\/www.networkworld.com\/article\/3660057\/6-top-network-threats-and-how-to-beat-them.html\">6 top network security threats and how to beat them<\/a><\/p>\n<\/aside>\n<p>Two big issues there, of course. \u201cInward-facing&#8221; is a shaky concept and getting shakier all the time\u2014that is, it&nbsp;is getting harder and harder to draw a bright line between what is &#8220;inside&#8221; the enterprise environment and what is &#8220;outside&#8221; of it.&nbsp; And,&nbsp;however real \u201cinside\u201d is, that is where the insider threat lives.<\/p>\n<p>What that means is, when doing risk assessments, IT folks should be thinking of securing <em>all <\/em>of their network infrastructure much the same way they think of securing the more obviously directly Internet-facing parts of it. Campus <a href=\"https:\/\/www.networkworld.com\/article\/3584876\/what-is-a-network-switch-and-how-does-it-work.html\">switches<\/a>, in other words, are just as much a part of the enterprise attack surface as the main Internet router or application delivery controller.<\/p>\n<p>So, network security folks should probably be investing more time to improve security in their network infrastructure and therefore the security of the enterprise as a whole. Here are four ways to do that.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id> <\/aside>\n<p>None of these approaches is free. They all cost IT staff time at the very least, and staff time is precious and scarce. But the stakes continue to ratchet up for cybersecurity, especially in the age of ubiquitous phishing and low-and-slow ransomware woven into broad, adaptive, persistent attack campaigns.<\/p>\n<p>Some of this advice might seem familiar and obvious, but don\u2019t disengage because you already know you ought to be doing it\u2014think it through anew.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id> <\/aside>\n<h2>Stop sharing generic credentials<\/h2>\n<p>No one really needs to be told any more that this is a bad idea, but a shocking number of IT shops still do this: have an account, or sometimes a number of them, that network folks can log into as needed to get administrative access to switches and the like.<\/p>\n<p>This is a bad idea for many reasons, but here let\u2019s highlight three: It makes more difficult, or impossible, tracking administrative actions to specific people; it greatly increases the chance that the credentials will be compromised; and it greatly increases the chance that someone on the inside who should no longer have access to the account will continue to be able to use it. (That last actually sneaks in a fourth point: It won\u2019t just be insiders who no longer need access that retain it, it will also be recently terminated staff.) Fundamentally, once things are set up this way, there is simply no way to know who has access to the network anymore.<\/p>\n<p>Every person who needs access should have an account of their own. The time for turning a blind eye to the network team on this front is long since over.<\/p>\n<h2>Reduce the number of people with access<\/h2>\n<p>One aspect of securing the infrastructure that is almost impossible without account-per-person access management is restricting access to those who actually need it. An audit of accounts with access to network infrastructure almost always turns up accounts for folks who no longer need the access because their job has changed, and usually turns up some still-active accounts associated with former employees.<\/p>\n<aside class=\"nativo-promo nativo-promo-2 tablet desktop smartphone\" id> <\/aside>\n<p>IT must audit empowered accounts regularly. This should be suspenders to the belt of making it standard process to review all accounts associated with a position whenever it is filled or vacated, and disabling empowered accounts whenever a person leaves the company.<\/p>\n<h2>Go multi-factor authentication<\/h2>\n<p>No one really needs to be persuaded any more that multi-factor authentication (MFA) is a vast improvement in security for most systems, significantly increasing the difficulty of getting in where one is not wanted. This is just as true for the infrastructure as it is for a banking application. (And of course, compromising the network can end in compromise of all the applications in a worst-case scenario.)<\/p>\n<p>Network teams should be pointing their switches at MFA-capable identity services, via RADIUS or TACACS+.<\/p>\n<h2>Go software-defined perimeter<\/h2>\n<p>Implementing a software-defined perimeter system would allow IT to layer additional protections around one-person\/one-account access with MFA. For example, the SDP software could allow admin access to network nodes only from company-controlled laptops or desktops in good health, and\/or only from specific segments of the physical network, and more. Moreover, accounts with no right to manage network nodes could be prevented even from seeing them on the network; they would be invisible to unauthorized users or systems.<\/p>\n<aside class=\"nativo-promo nativo-promo-3 tablet desktop smartphone\" id> <\/aside>\n<div class=\"end-note\"> <!-- blx4 #2005 blox4.html --> <\/p>\n<div id class=\"blx blxParticleendnote blxM2005 blox4_html blxC23909\">Join the Network World communities on <a href=\"https:\/\/www.facebook.com\/NetworkWorld\/\" target=\"_blank\" rel=\"noopener\">Facebook<\/a> and <a href=\"https:\/\/www.linkedin.com\/company\/network-world\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a> to comment on topics that are top of mind. <\/div>\n<\/p><\/div>\n<p> READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3666497\/are-you-doing-enough-to-secure-your-network-infrastructure.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nIt\u2019s time to take a hard look at whether you\u2019re devoting enough resources to securing your network infrastructure. Short answer: You\u2019re probably not.If you work for a hyperscaler, your organization is probably doing everything it can to secure the network. For almost everyone else, it is pretty safe to assume that the answer is no.This is not necessarily a blameworthy failing. In many cases it is down to available resources and perceived risk: Given too little money for cybersecurity and too little time from too few people to tackle all possible risks in the network, what should network cybersecurity staff focus on? They tend to focus less on the inward-facing aspects of their networks and more on explicitly outward-facing pieces.To read this article in full, please click here READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":47534,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[1061],"class_list":["post-47533","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-network-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Are you doing enough to secure your network infrastructure? 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/are-you-doing-enough-to-secure-your-network-infrastructure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are you doing enough to secure your network infrastructure? 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/are-you-doing-enough-to-secure-your-network-infrastructure\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-15T10:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.idgesg.net\/images\/article\/2018\/12\/network-security_lock_padlock_breach-100782976-large.jpg?auto=webp&amp;quality=85,70\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/are-you-doing-enough-to-secure-your-network-infrastructure\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/are-you-doing-enough-to-secure-your-network-infrastructure\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Are you doing enough to secure your network infrastructure?\",\"datePublished\":\"2022-07-15T10:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/are-you-doing-enough-to-secure-your-network-infrastructure\/\"},\"wordCount\":873,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/are-you-doing-enough-to-secure-your-network-infrastructure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/07\/are-you-doing-enough-to-secure-your-network-infrastructure.jpg\",\"keywords\":[\"Network Security\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/are-you-doing-enough-to-secure-your-network-infrastructure\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/are-you-doing-enough-to-secure-your-network-infrastructure\/\",\"name\":\"Are you doing enough to secure your network infrastructure? 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/are-you-doing-enough-to-secure-your-network-infrastructure\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/are-you-doing-enough-to-secure-your-network-infrastructure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/07\/are-you-doing-enough-to-secure-your-network-infrastructure.jpg\",\"datePublished\":\"2022-07-15T10:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/are-you-doing-enough-to-secure-your-network-infrastructure\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/are-you-doing-enough-to-secure-your-network-infrastructure\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/are-you-doing-enough-to-secure-your-network-infrastructure\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/07\/are-you-doing-enough-to-secure-your-network-infrastructure.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/07\/are-you-doing-enough-to-secure-your-network-infrastructure.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/are-you-doing-enough-to-secure-your-network-infrastructure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Network Security\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/network-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Are you doing enough to secure your network infrastructure?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Are you doing enough to secure your network infrastructure? 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/are-you-doing-enough-to-secure-your-network-infrastructure\/","og_locale":"en_US","og_type":"article","og_title":"Are you doing enough to secure your network infrastructure? 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/are-you-doing-enough-to-secure-your-network-infrastructure\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-07-15T10:00:00+00:00","og_image":[{"url":"https:\/\/images.idgesg.net\/images\/article\/2018\/12\/network-security_lock_padlock_breach-100782976-large.jpg?auto=webp&amp;quality=85,70","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/are-you-doing-enough-to-secure-your-network-infrastructure\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/are-you-doing-enough-to-secure-your-network-infrastructure\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Are you doing enough to secure your network infrastructure?","datePublished":"2022-07-15T10:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/are-you-doing-enough-to-secure-your-network-infrastructure\/"},"wordCount":873,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/are-you-doing-enough-to-secure-your-network-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/07\/are-you-doing-enough-to-secure-your-network-infrastructure.jpg","keywords":["Network Security"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/are-you-doing-enough-to-secure-your-network-infrastructure\/","url":"https:\/\/www.threatshub.org\/blog\/are-you-doing-enough-to-secure-your-network-infrastructure\/","name":"Are you doing enough to secure your network infrastructure? 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/are-you-doing-enough-to-secure-your-network-infrastructure\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/are-you-doing-enough-to-secure-your-network-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/07\/are-you-doing-enough-to-secure-your-network-infrastructure.jpg","datePublished":"2022-07-15T10:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/are-you-doing-enough-to-secure-your-network-infrastructure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/are-you-doing-enough-to-secure-your-network-infrastructure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/are-you-doing-enough-to-secure-your-network-infrastructure\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/07\/are-you-doing-enough-to-secure-your-network-infrastructure.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/07\/are-you-doing-enough-to-secure-your-network-infrastructure.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/are-you-doing-enough-to-secure-your-network-infrastructure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Network Security","item":"https:\/\/www.threatshub.org\/blog\/tag\/network-security\/"},{"@type":"ListItem","position":3,"name":"Are you doing enough to secure your network infrastructure?"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47533","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=47533"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47533\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/47534"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=47533"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=47533"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=47533"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}