{"id":49055,"date":"2022-10-28T00:00:00","date_gmt":"2022-10-28T00:00:00","guid":{"rendered":"urn:uuid:02611bfe-648e-d366-ceef-01c33524a3dc"},"modified":"2022-10-28T00:00:00","modified_gmt":"2022-10-28T00:00:00","slug":"manufacturing-cybersecurity-trends-survey-response","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/manufacturing-cybersecurity-trends-survey-response\/","title":{"rendered":"Manufacturing Cybersecurity: Trends &amp; Survey Response"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/article-large-tile.jpg\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/article-large-tile.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Figure 5: Q19. Until now, what have been your organization\u2019s top two reasons for implementing cybersecurity measures to protect your ICS\/OT systems?<\/p>\n<p>Q20.What do you believe your organization\u2019s top two reasons for implementing cybersecurity measures to protect your ICS\/OT systems are over the next three years\uff1f(NB: Multiple choices allowed)<\/p>\n<p>We will consider the reasons and background for these results.<\/p>\n<p>One of the reasons why there is a high awareness of efforts to prevent recurrence is that the manufacturing industry is expected to have a high percentage of established improvement processes to constantly increase productivity, and security can also be put on that system. There is a point that This result is the highest in the US, Germany, and Japan, exceeding 31% in all countries, and there is no variation like in other industries. You can see that this is a common issue throughout the industry.<\/p>\n<p>5G initiatives have changed the most in Japan, rising by 7.2 points. I believe that the two points that have led to the big change in Japan are the increased benefits of introducing 5G and the requirement for security measures as a condition for granting local 5G base station licenses.<\/p>\n<p>The local 5G usage system by the Ministry of Internal Affairs and Communications expanded the frequency band used from December 2020 to 4.6 to 4.9 GHz, which has a long transmission distance, and the government introduced a preferential tax system for 5G introduction. The benefits are even greater.<\/p>\n<p>The Ministry of Internal Affairs and Communications stipulates that cybersecurity measures, including supply chain risks, must be taken as a condition for certifying development plans for specific base stations for the introduction of 5G. And local 5G is supposed to have the same conditions at the time of licensing.<\/p>\n<p>Interest in 5G in Germany continues to be high at 31.4%. In Germany, the autonomous decentralized inter-enterprise collaboration mechanism (<a href=\"https:\/\/gaia-x.eu\/\" target=\"_blank\" rel=\"noopener\">GAIA-X<\/a>), which has been considered and implemented since around 2016, will start full-scale activities in 2021, the mobile communication strategy by the <a href=\"https:\/\/www.bundesregierung.de\/breg-en\/news\/mobilfunkstrategie-1694814\" target=\"_blank\" rel=\"noopener\">German government<\/a>, and <a href=\"https:\/\/ec.europa.eu\/info\/funding-tenders\/find-funding\/eu-funding-programmes\/digital-europe-programme_en\" target=\"_blank\" rel=\"noopener\">the EU as a whole<\/a>.<\/p>\n<p id=\"trend\">We are actively working on 5G against the background of investment in the digital Europe program that we are promoting. At the same time, it is thought that there is a high awareness of ensuring security. Cloud usage scores similarly high. It is necessary to analyze the risks and threats at the time of introduction so that the introduction of these new technologies does not create new security risks.<\/p>\n<p>2 Trend Micro Proposal<\/p>\n<p>Summary of our research and analysis:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">In the manufacturing industry, the period of suspension due to security incidents is relatively short, and as a result, the amount of damage in terms of money is relatively small. This is thought to be because there are many assembly manufacturing systems, and it is relatively easy to stop and start the system.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Although we are continuously working to improve security, it is thought that there are still issues to be addressed in ensuring security when using the cloud or using removable media.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">The hurdles to introduce new technologies such as cloud and 5G are more aggressive than other industries, but we must be aware that the number of companies and products involved will increase accordingly, and security management requirements such as analysis of new attack surfaces will increase.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">&nbsp;It is necessary to visualize the security risks of complex systems with a mixture of various tools, services, and vendors, and implement measures to ensure safe operation<\/span><\/li>\n<\/ul>\n<p>Based on this result, Trend Micro proposes to organize and address cyber security challenges for CISOs in the manufacturing industry as follows:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Take advantage of the improvement process of the manufacturing industry to improve security and strengthen operations and implement preventive measures specializing in OT to prevent a recurrence.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Create a system and mechanism that can perform accurate cause analysis and response when an incident occurs across IT and OT.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">When introducing new technologies such as 5G, conduct threat and risk analysis comprehensively rather than locally. It also visualizes situations that change dynamically during operation, shortening the time to detect and respond to minimize damage.<\/span><\/li>\n<\/ul>\n<p>More information on threats to ICS endpoints, including manufacturing, can be found <a href=\"https:\/\/www.trendmicro.com\/vinfo\/tmr\/?\/us\/security\/news\/internet-of-things\/2020-report-ics-endpoints-as-starting-points-for-threats\">here<\/a>.<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/22\/j\/manufacturing-cybersecurity-trends-threats.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Based on our survey of over 900 ICS security leaders in the United States, Germany, and Japan, we dig deeper into each industry&#8217;s challenges and present Trend Micro&#8217;s recommendations. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":49056,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,9520,9521,9511,9842,9514,9513,9577,9539,9509],"class_list":["post-49055","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-cloud","tag-trend-micro-research-cyber-crime","tag-trend-micro-research-cyber-threats","tag-trend-micro-research-ics-ot","tag-trend-micro-research-iot","tag-trend-micro-research-malware","tag-trend-micro-research-phishing","tag-trend-micro-research-ransomware","tag-trend-micro-research-research"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Manufacturing Cybersecurity: Trends &amp; Survey Response 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/manufacturing-cybersecurity-trends-survey-response\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Manufacturing Cybersecurity: Trends &amp; Survey Response 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/manufacturing-cybersecurity-trends-survey-response\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-28T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/article-large-tile.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/manufacturing-cybersecurity-trends-survey-response\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/manufacturing-cybersecurity-trends-survey-response\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Manufacturing Cybersecurity: Trends &amp; Survey Response\",\"datePublished\":\"2022-10-28T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/manufacturing-cybersecurity-trends-survey-response\\\/\"},\"wordCount\":700,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/manufacturing-cybersecurity-trends-survey-response\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/manufacturing-cybersecurity-trends-survey-response.jpg\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Cloud\",\"Trend Micro Research : Cyber Crime\",\"Trend Micro Research : Cyber Threats\",\"Trend Micro Research : ICS OT\",\"Trend Micro Research : IoT\",\"Trend Micro Research : Malware\",\"Trend Micro Research : Phishing\",\"Trend Micro Research : Ransomware\",\"Trend Micro Research : Research\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/manufacturing-cybersecurity-trends-survey-response\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/manufacturing-cybersecurity-trends-survey-response\\\/\",\"name\":\"Manufacturing Cybersecurity: Trends &amp; Survey Response 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/manufacturing-cybersecurity-trends-survey-response\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/manufacturing-cybersecurity-trends-survey-response\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/manufacturing-cybersecurity-trends-survey-response.jpg\",\"datePublished\":\"2022-10-28T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/manufacturing-cybersecurity-trends-survey-response\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/manufacturing-cybersecurity-trends-survey-response\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/manufacturing-cybersecurity-trends-survey-response\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/manufacturing-cybersecurity-trends-survey-response.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/manufacturing-cybersecurity-trends-survey-response.jpg\",\"width\":566,\"height\":278},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/manufacturing-cybersecurity-trends-survey-response\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-articles-news-reports\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Manufacturing Cybersecurity: Trends &amp; Survey Response\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Manufacturing Cybersecurity: Trends &amp; Survey Response 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/manufacturing-cybersecurity-trends-survey-response\/","og_locale":"en_US","og_type":"article","og_title":"Manufacturing Cybersecurity: Trends &amp; Survey Response 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/manufacturing-cybersecurity-trends-survey-response\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-10-28T00:00:00+00:00","og_image":[{"url":"https:\/\/www.trendmicro.com\/content\/dam\/article-large-tile.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/manufacturing-cybersecurity-trends-survey-response\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/manufacturing-cybersecurity-trends-survey-response\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Manufacturing Cybersecurity: Trends &amp; Survey Response","datePublished":"2022-10-28T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/manufacturing-cybersecurity-trends-survey-response\/"},"wordCount":700,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/manufacturing-cybersecurity-trends-survey-response\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/10\/manufacturing-cybersecurity-trends-survey-response.jpg","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Cloud","Trend Micro Research : Cyber Crime","Trend Micro Research : Cyber Threats","Trend Micro Research : ICS OT","Trend Micro Research : IoT","Trend Micro Research : Malware","Trend Micro Research : Phishing","Trend Micro Research : Ransomware","Trend Micro Research : Research"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/manufacturing-cybersecurity-trends-survey-response\/","url":"https:\/\/www.threatshub.org\/blog\/manufacturing-cybersecurity-trends-survey-response\/","name":"Manufacturing Cybersecurity: Trends &amp; Survey Response 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/manufacturing-cybersecurity-trends-survey-response\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/manufacturing-cybersecurity-trends-survey-response\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/10\/manufacturing-cybersecurity-trends-survey-response.jpg","datePublished":"2022-10-28T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/manufacturing-cybersecurity-trends-survey-response\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/manufacturing-cybersecurity-trends-survey-response\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/manufacturing-cybersecurity-trends-survey-response\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/10\/manufacturing-cybersecurity-trends-survey-response.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/10\/manufacturing-cybersecurity-trends-survey-response.jpg","width":566,"height":278},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/manufacturing-cybersecurity-trends-survey-response\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"Manufacturing Cybersecurity: Trends &amp; Survey Response"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/49055","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=49055"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/49055\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/49056"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=49055"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=49055"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=49055"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}