{"id":49338,"date":"2022-11-17T00:00:00","date_gmt":"2022-11-17T00:00:00","guid":{"rendered":"urn:uuid:20427bb6-5674-2c30-b8df-e2c7d1e9fd04"},"modified":"2022-11-17T00:00:00","modified_gmt":"2022-11-17T00:00:00","slug":"global-cyber-risk-at-elevated-level","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/global-cyber-risk-at-elevated-level\/","title":{"rendered":"Global Cyber Risk at Elevated Level"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/cyber-risk-index-1h-22-snapshot:Large?qlt=80\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/22\/cyber-risk-index-1h-22-snapshot.png\" class=\"ff-og-image-inserted\"><\/div>\n<p><span class=\"body-subhead-title\"><span>The Global and Regional CRI<\/span><\/span><\/p>\n<p>The current global cyber risk index is at <b>-0.15<\/b>, which is considered an elevated risk level. This is a slight increase in risk from the second half of 2021, when it was -0.04.&nbsp; Organizations in North America and Asia-Pacific saw an increase in their cyber risk from that period while Europe and Latin\/South America\u2019s risk decreased in comparison.<\/p>\n<p>Digging into each of the four regions, North America\u2019s CRI was the most elevated of the regions at -0.33. The region\u2019s CPI worsened slightly from 5.35 to 5.30 (a lower CPI number means higher risk) and their CTI dropped from 5.36 to 5.63 (a higher CTI means higher risk).<\/p>\n<p>Europe\u2019s overall CRI improved very slightly from -0.15 to -0.12. Preparedness decreased, but their threat index improved further, leading to a better CRI.&nbsp;<\/p>\n<p>Asia\/Pacific saw their cyber risk move from moderate to elevated due to a significant decrease from the second half (+0.20 to -0.11).&nbsp; Their lower CRI was mainly due to a much higher threat risk: moving from 5.15 to 5.44.&nbsp;<\/p>\n<p>Latin\/South America\u2019s risk improved slightly, decreasing from -0.20 to -0.03. This was mostly due to a marked improvement in their CPI (4.94 to 5.27) than CTI (5.14 to 5.30).&nbsp;<\/p>\n<p>Essentially, this means that businesses in North America were the least prepared globally to effectively stop or respond to cyber threats in the first half of 2022. Since businesses across all four regions seem to face equal levels of risk (elevated cyber risk indices), this means they all need to improve in the future to ensure they can defend against the threats and malicious actors targeting them.<\/p>\n<p><span class=\"body-subhead-title\">The Details of the 1H\u20192022 CRI<\/span><\/p>\n<p>This infographic shares many of the details found in the latest CRI survey.&nbsp; See the infographic <a href=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/k\/cyber-risk-index-1h-22-snapshot\/ifg-cyber-risk-1h2022.pdf\"><span class=\"bs-modal\">here<\/span><\/a>.<\/p>\n<p>Let\u2019s investigate some of the responses to risks in people, processes and technology we found.<\/p>\n<p>Based on the results, these are the areas of preparedness that most need work to address the areas of highest risk, meaning these questions were answered with the lowest scores (highest risk):<\/p>\n<p><b>People:<\/b><\/p>\n<ul>\n<li><span class=\"rte-circle-bullet\">My organization\u2019s senior leadership views security as a competitive advantage.<\/span><\/li>\n<li><span class=\"rte-circle-bullet\">My organization\u2019s CEO and Board of Directors are actively involved in overseeing the IT security function.<\/span><\/li>\n<li><span class=\"rte-circle-bullet\">My organization\u2019s IT security leader (CISO) has sufficient authority and resources to achieve a strong security posture.<\/span><\/li>\n<li><span class=\"rte-circle-bullet\">My organization spends considerable resources to recruit and retain IT security personnel.<\/span><\/li>\n<\/ul>\n<p><b>Process<\/b><\/p>\n<ul>\n<li><span class=\"rte-circle-bullet\">My organization is actively involved in threat sharing with other companies and government.<\/span><\/li>\n<li><span class=\"rte-circle-bullet\">My organization\u2019s IT security objectives are aligned with business objectives.<\/span><\/li>\n<li><span class=\"rte-circle-bullet\">My organization\u2019s IT security function is quick to test and install all security patches.<\/span><\/li>\n<\/ul>\n<p><b>Technology<\/b><\/p>\n<ul>\n<li><span class=\"rte-circle-bullet\">My organization\u2019s IT security function has the ability to know the physical location of business-critical data assets and applications.<\/span><\/li>\n<li><span class=\"rte-circle-bullet\">My organization\u2019s IT security function has the ability to unleash countermeasures (such as honeypots) to gain intelligence about the attacker.<\/span><\/li>\n<li><span class=\"rte-circle-bullet\">My organization makes appropriate investments in leading-edged security technologies such as machine learning, automation, orchestration, analytics and\/or artificial intelligence tools.<\/span><\/li>\n<\/ul>\n<p>The number of breaches organizations suffered in the last 12 months, as well as the likelihood of a breach occurring in the next 12 months, have all increased since the 2H\u20192021 survey.<\/p>\n<p>The CRI is ongoing, and we update it twice a year to show trends in the ability to prepare for and withstand attacks. I\u2019m looking forward to seeing how global respondents change their perceptions in the future.<\/p>\n<p>Until then, enjoy the 1H\u20192022 CRI results and if you want more information about how the survey is conducted, check out the methodology <span class=\"bs-modal\"><a href=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/k\/cyber-risk-index-1h-22-snapshot\/1h-2022-cri-methodology.pdf\">here<\/a>.<\/span><\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/22\/k\/cyber-risk-index-1h-22-snapshot.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>North America Least Prepared for Cyberattacks Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":49339,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9520,9511,9565,9562,9516],"class_list":["post-49338","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-cloud","tag-trend-micro-research-cyber-threats","tag-trend-micro-research-data-center","tag-trend-micro-research-report","tag-trend-micro-research-reports"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Global Cyber Risk at Elevated Level 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/global-cyber-risk-at-elevated-level\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Global Cyber Risk at Elevated Level 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/global-cyber-risk-at-elevated-level\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-17T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/cyber-risk-index-1h-22-snapshot:Large?qlt=80\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/global-cyber-risk-at-elevated-level\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/global-cyber-risk-at-elevated-level\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Global Cyber Risk at Elevated Level\",\"datePublished\":\"2022-11-17T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/global-cyber-risk-at-elevated-level\\\/\"},\"wordCount\":605,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/global-cyber-risk-at-elevated-level\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/global-cyber-risk-at-elevated-level.png\",\"keywords\":[\"Trend Micro Research : Cloud\",\"Trend Micro Research : Cyber Threats\",\"Trend Micro Research : Data center\",\"Trend Micro Research : Report\",\"Trend Micro Research : Reports\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/global-cyber-risk-at-elevated-level\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/global-cyber-risk-at-elevated-level\\\/\",\"name\":\"Global Cyber Risk at Elevated Level 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/global-cyber-risk-at-elevated-level\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/global-cyber-risk-at-elevated-level\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/global-cyber-risk-at-elevated-level.png\",\"datePublished\":\"2022-11-17T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/global-cyber-risk-at-elevated-level\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/global-cyber-risk-at-elevated-level\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/global-cyber-risk-at-elevated-level\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/global-cyber-risk-at-elevated-level.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/global-cyber-risk-at-elevated-level.png\",\"width\":641,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/global-cyber-risk-at-elevated-level\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Cloud\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-cloud\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Global Cyber Risk at Elevated Level\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Global Cyber Risk at Elevated Level 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/global-cyber-risk-at-elevated-level\/","og_locale":"en_US","og_type":"article","og_title":"Global Cyber Risk at Elevated Level 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/global-cyber-risk-at-elevated-level\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-11-17T00:00:00+00:00","og_image":[{"url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/cyber-risk-index-1h-22-snapshot:Large?qlt=80","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/global-cyber-risk-at-elevated-level\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/global-cyber-risk-at-elevated-level\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Global Cyber Risk at Elevated Level","datePublished":"2022-11-17T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/global-cyber-risk-at-elevated-level\/"},"wordCount":605,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/global-cyber-risk-at-elevated-level\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/11\/global-cyber-risk-at-elevated-level.png","keywords":["Trend Micro Research : Cloud","Trend Micro Research : Cyber Threats","Trend Micro Research : Data center","Trend Micro Research : Report","Trend Micro Research : Reports"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/global-cyber-risk-at-elevated-level\/","url":"https:\/\/www.threatshub.org\/blog\/global-cyber-risk-at-elevated-level\/","name":"Global Cyber Risk at Elevated Level 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/global-cyber-risk-at-elevated-level\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/global-cyber-risk-at-elevated-level\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/11\/global-cyber-risk-at-elevated-level.png","datePublished":"2022-11-17T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/global-cyber-risk-at-elevated-level\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/global-cyber-risk-at-elevated-level\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/global-cyber-risk-at-elevated-level\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/11\/global-cyber-risk-at-elevated-level.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/11\/global-cyber-risk-at-elevated-level.png","width":641,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/global-cyber-risk-at-elevated-level\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Cloud","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-cloud\/"},{"@type":"ListItem","position":3,"name":"Global Cyber Risk at Elevated Level"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/49338","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=49338"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/49338\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/49339"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=49338"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=49338"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=49338"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}