{"id":50545,"date":"2023-02-13T20:22:00","date_gmt":"2023-02-13T20:22:00","guid":{"rendered":"https:\/\/www.networkworld.com\/article\/3687635\/cisco-observability-what-you-need-to-know.html#tk.rss_security"},"modified":"2023-02-13T20:22:00","modified_gmt":"2023-02-13T20:22:00","slug":"cisco-observability-what-you-need-to-know","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cisco-observability-what-you-need-to-know\/","title":{"rendered":"Cisco observability: What you need to know"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/idge.staticworld.net\/nww\/nww_logo_300x300.png\" class=\"ff-og-image-inserted\"><\/div>\n<p>Observability may be the latest buzzword in an industry loaded with them, but Cisco will tell you the primary goal of the technology is to help enterprises get a handle on effectively managing distributed resources in ways that have not been possible in the past.<\/p>\n<p>The idea of employing observability tools and applications is a hot idea. Gartner says that by 2024, 30% of enterprises implementing distributed system architectures will have adopted observability techniques to improve digital-business service performance, up from less than 10% in 2020.<\/p>\n<p>\u201cToday\u2019s operational teams have tools for network monitoring, application monitoring, infrastructure monitoring, call monitoring, and more, but they rarely intermingle to provide a cohesive view of what\u2019s going on across the enterprise,\u201d according to Carlos Pereira, Cisco Fellow and chief architect in its Strategy, Incubation &amp; Applications group.<\/p>\n<p>Observability looks to address real problems by gathering information across domains and using it to show how one domain influences another and to predict problem areas or trigger incident management, Pereira said.<\/p>\n<p>\u201cBy using observability tools, the business is able to determine the state of its applications with a high degree of certainty and understand how their services impact business key performance indicators and customers\u2019 digital experience,\u201d Gartner wrote in a recent observability report. \u201cObservability enables quick interrogation of a digital service to identify the underlying cause of a performance degradation, even when it has never occurred before.\u201d<\/p>\n<p>At the recent Cisco Live! event in Amsterdam, Pereira provided a preview of the underlying architecture for observability called the Cisco Full-Stack Observability Platform. It\u2019s expected in June, though some details have already been announced.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id> <\/aside>\n<p>For example, at the Live! event Cisco said it will be unveiling deeper, bi-directional integration between AppDynamics and Cisco\u2019s ThousandEyes digital-experience monitoring software. The tighter integration will enable correlation of business issues across application transactions and their dependencies, end-user experiences, the network path, and internet routing.<\/p>\n<p>Last year, Cisco announced <a href=\"https:\/\/www.networkworld.com\/article\/3664051\/cisco-puts-app-performance-tools-in-the-cloud.html\">AppDynamics Cloud<\/a> will offer applications and services that correlate telemetry across multiple domains.&nbsp;<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id> <\/aside>\n<p>Telemetry use is at the core of observability. Pereira said Cisco\u2019s Full-Stack Observability will bring together the widest set of telemetry data in the industry\u2014<\/p>\n<p>metrics, events, logs, and traces (MELT), driven by <a href=\"https:\/\/www.networkworld.com\/article\/3685421\/telemetry-steps-into-the-enterprise-networking-spotlight.html\">OpenTelemetry<\/a>\u2014and feature a broad portfolio of Cisco technologies as well as an ecosystem of partners and open-source tools.<\/p>\n<p>OpenTelemetry, which is being developed under the Cloud Native Foundation, is a collection of tools, APIs, and SDKs used to instrument, generate, collect, and export telemetry data to analyze software performance and behavior.&nbsp;It\u2019s being developed by&nbsp;contributors from AWS, Azure, Cisco, F5, Google Cloud, and VMware among others. &nbsp;<\/p>\n<p>Cisco expects that the sheer volume of MELT from its ecosystem of enterprises, telcos, and cloud relationships combined with its family of industry partners will give it competitive advantage, including development of applications to improve observability, Pereira said.<\/p>\n<aside class=\"nativo-promo nativo-promo-2 tablet desktop smartphone\" id> <\/aside>\n<p>The Full-Stack Observability Platform will also take advantage of Cisco\u2019 security portfolio and research to provide telemetry that can be included in new applications to control security across multiple domains.<\/p>\n<p>\u201cThe ability to map and correlate security telemetry with all of our other information gives us a huge advantage as we look to help customers manage systems across multiple domains in multiple geographic regions,\u201d Pereira said.<\/p>\n<p>An example of this is the announcement last week of a <a href=\"https:\/\/www.networkworld.com\/article\/3687139\/cisco-security-upgrades-strengthen-access-control-risk-analysis.html\">Business Risk Observability application<\/a> designed to gauge the seriousness of vulnerabilities and prioritize which are most pressing. It combines data from multiple sources to generate a business risk score for applications or services that have a high likelihood of exploitation and attacks. It gathers data from Cisco\u2019s Kenna Risk Meter, business transaction details from Cisco AppDynamics, API details from its Panoptica software, and threat intelligence data from Talos, its security-research arm.<\/p>\n<p>\u201cIf customers have 100 vulnerabilities across their network, they don\u2019t want to hear that they need to patch them all because that just doesn\u2019t happen. They need to know which ones to prioritize, and that\u2019s what Business Risk does,\u201d said <a href=\"https:\/\/www.networkworld.com\/article\/3684772\/former-vmware-exec-gillis-resurfaces-to-run-cisco-security-business-again.html\">Tom Gillis<\/a>, senior vice president and general manager of security at Cisco. \u201cIt gives customers a better understanding of the risk of problems and the business impact of fixing them.\u201d<\/p>\n<aside class=\"nativo-promo nativo-promo-3 tablet desktop smartphone\" id> <\/aside>\n<p>In a highly distributed world, observability must stretch across all points on the enterprise network edge, whether that be user devices, campus and branch sites, multi-cloud endpoints, or IOT endpoints, said Brandon Butler, research manager with IDC\u2019s Enterprise Networks practice <a href=\"https:\/\/www.networkworld.com\/article\/3686472\/idc-networking-trifecta-sd-wan-automation-and-analytics.html\">speaking<\/a> at a recent Cisco-sponsored webinar.<\/p>\n<p>\u201cIt&#8217;s important for the visibility platform to be able to enhance automation platforms, to be able to not just identify when there&#8217;s a problem in the network, but actually either recommend ways to fix it or proactively mak that fix before it impacts users,\u201d Butler said.<\/p>\n<p>Add security to that, because you can&#8217;t secure the network unless you know what&#8217;s actually happening in the network, Butler said.<\/p>\n<p>\u201cSo observability platforms provide a foundational layer for being able to enhance the security footprint of the enterprise network edge as well,\u201d Butler said.<\/p>\n<p>Taken together, components of the observability technology will drive use cases such as improving performance and optimization enterprise resources, as well as application security, Pereira said.&nbsp;<\/p>\n<div class=\"end-note\"> <!-- blx4 #2005 blox4.html --> <\/p>\n<div id class=\"blx blxParticleendnote blxM2005 blox4_html blxC23909\">\n<p> <strong>Next read this:<\/strong> <\/p>\n<\/p><\/div>\n<\/p><\/div>\n<p> READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3687635\/cisco-observability-what-you-need-to-know.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nObservability may be the latest buzzword in an industry loaded with them, but Cisco will tell you the primary goal of the technology is to help enterprises get a handle on effectively managing distributed resources in ways that have not been possible in the past.The idea of employing observability tools and applications is a hot idea. Gartner says that by 2024, 30% of enterprises implementing distributed system architectures will have adopted observability techniques to improve digital-business service performance, up from less than 10% in 2020.\u201cToday\u2019s operational teams have tools for network monitoring, application monitoring, infrastructure monitoring, call monitoring, and more, but they rarely intermingle to provide a cohesive view of what\u2019s going on across the enterprise,\u201d according to Carlos Pereira, Cisco Fellow and chief architect in its Strategy, Incubation &amp; Applications group.To read this article in full, please click here READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[2767,1061],"class_list":["post-50545","post","type-post","status-publish","format-standard","hentry","category-networkworld","tag-network-monitoring","tag-network-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cisco observability: What you need to know 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cisco-observability-what-you-need-to-know\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cisco observability: What you need to know 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cisco-observability-what-you-need-to-know\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-13T20:22:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idge.staticworld.net\/nww\/nww_logo_300x300.png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/cisco-observability-what-you-need-to-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cisco-observability-what-you-need-to-know\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Cisco observability: What you need to know\",\"datePublished\":\"2023-02-13T20:22:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cisco-observability-what-you-need-to-know\/\"},\"wordCount\":878,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cisco-observability-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/idge.staticworld.net\/nww\/nww_logo_300x300.png\",\"keywords\":[\"Network Monitoring\",\"Network Security\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/cisco-observability-what-you-need-to-know\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/cisco-observability-what-you-need-to-know\/\",\"name\":\"Cisco observability: What you need to know 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cisco-observability-what-you-need-to-know\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cisco-observability-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/idge.staticworld.net\/nww\/nww_logo_300x300.png\",\"datePublished\":\"2023-02-13T20:22:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cisco-observability-what-you-need-to-know\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/cisco-observability-what-you-need-to-know\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/cisco-observability-what-you-need-to-know\/#primaryimage\",\"url\":\"https:\/\/idge.staticworld.net\/nww\/nww_logo_300x300.png\",\"contentUrl\":\"https:\/\/idge.staticworld.net\/nww\/nww_logo_300x300.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/cisco-observability-what-you-need-to-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Network Monitoring\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/network-monitoring\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cisco observability: What you need to know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cisco observability: What you need to know 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cisco-observability-what-you-need-to-know\/","og_locale":"en_US","og_type":"article","og_title":"Cisco observability: What you need to know 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cisco-observability-what-you-need-to-know\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-02-13T20:22:00+00:00","og_image":[{"url":"https:\/\/idge.staticworld.net\/nww\/nww_logo_300x300.png","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cisco-observability-what-you-need-to-know\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cisco-observability-what-you-need-to-know\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Cisco observability: What you need to know","datePublished":"2023-02-13T20:22:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cisco-observability-what-you-need-to-know\/"},"wordCount":878,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cisco-observability-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/idge.staticworld.net\/nww\/nww_logo_300x300.png","keywords":["Network Monitoring","Network Security"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cisco-observability-what-you-need-to-know\/","url":"https:\/\/www.threatshub.org\/blog\/cisco-observability-what-you-need-to-know\/","name":"Cisco observability: What you need to know 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cisco-observability-what-you-need-to-know\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cisco-observability-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/idge.staticworld.net\/nww\/nww_logo_300x300.png","datePublished":"2023-02-13T20:22:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cisco-observability-what-you-need-to-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cisco-observability-what-you-need-to-know\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cisco-observability-what-you-need-to-know\/#primaryimage","url":"https:\/\/idge.staticworld.net\/nww\/nww_logo_300x300.png","contentUrl":"https:\/\/idge.staticworld.net\/nww\/nww_logo_300x300.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cisco-observability-what-you-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Network Monitoring","item":"https:\/\/www.threatshub.org\/blog\/tag\/network-monitoring\/"},{"@type":"ListItem","position":3,"name":"Cisco observability: What you need to know"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/50545","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=50545"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/50545\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=50545"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=50545"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=50545"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}