{"id":51189,"date":"2023-03-23T17:00:00","date_gmt":"2023-03-23T17:00:00","guid":{"rendered":"https:\/\/www.darkreading.com\/risk\/the-board-of-directors-will-see-you-now"},"modified":"2023-03-23T17:00:00","modified_gmt":"2023-03-23T17:00:00","slug":"the-board-of-directors-will-see-you-now","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/the-board-of-directors-will-see-you-now\/","title":{"rendered":"The Board of Directors Will See You Now"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltf7ee8b25d41b9f4f\/641a2b40d8ce04419f0f0c4c\/Boardroom_Stephen_Barnes_Northern_Ireland_Alamy.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>For more than 15 years, the cybersecurity industry has been talking about communicating with the <a href=\"https:\/\/www.darkreading.com\/careers-and-people\/communication-is-key-to-ciso-success\" target=\"_blank\" rel=\"noopener\">board of directors<\/a>. It&#8217;s common practice for vendors to have e-books, webinars, and presentations about how and what chief information security officers (CISOs) should present to their boards \u2014 when they get the chance.<\/p>\n<p>Along with lack of opportunity, CISOs might have anxiety about presenting to the board because they are the only C-level executives without a tool of their own to <a href=\"https:\/\/www.darkreading.com\/dr-tech\/quantify-risk-calculate-roi\" target=\"_blank\" rel=\"noopener\">measure ROI<\/a>. From Salesforce to Workday to Marketo, C-suite executives have platform solutions aggregating, analyzing, and reporting on every aspect of the operation. There is no such solution for the CISO, making it harder to measure security program ROI or to demonstrate business value.<\/p>\n<p>The irony is that, despite all the interest in presenting to them, to say cybersecurity is not a core competency of the board is an understatement. <a href=\"https:\/\/www.wsj.com\/articles\/analyzing-board-level-cybersecurity-experience-11669674866\" target=\"_blank\" rel=\"noopener\">WSJ Pro Cybersecurity Research<\/a> investigated the professional background of all S&amp;P 500 board members and found that less than 2% &#8220;had relevant professional experience in cybersecurity in the last 10 years.&#8221;<\/p>\n<p>No matter who you are, it&#8217;s difficult to have great interest in something you don&#8217;t understand. That is, until you&#8217;re motivated to learn. What we have in front of us now is a great awakening for boards and cybersecurity, courtesy of the Securities and Exchange Commission (SEC).<\/p>\n<p>According to <a href=\"https:\/\/hbr.org\/2022\/11\/is-your-board-prepared-for-new-cybersecurity-regulations\" target=\"_blank\" rel=\"noopener\">Harvard Business Review<\/a>, &#8220;a proposed SEC rule will require companies to disclose their cybersecurity governance capabilities, including the board&#8217;s oversight of cyber risk, a description of management&#8217;s role in assessing and managing cyber risks, the relevant expertise of such management, and management&#8217;s role in implementing the company&#8217;s cybersecurity policies, procedures, and strategies.&#8221;<\/p>\n<p>I would expect more boards to be looking for experienced executives with a background in cybersecurity, starting right now. In the meantime, what does this mean for CISOs?<\/p>\n<h2 class=\"regular-text\">A Great Opportunity<\/h2>\n<p>With a sudden interest in cybersecurity, but little knowledge of it, what the board members want to know versus what they need to know may be quite different. For example, focusing too much on the latest attack in the headlines or focusing too much on compliance. Like teaching to the test, achieving compliance may be a good step in the right direction but is not always the same as striving to implement the best possible security measures. When achieving compliance becomes the security goal instead of minimizing risk and protecting the most critical assets, we&#8217;ve missed the point.<\/p>\n<p>What an opportunity for the CISO to create a &#8220;cybersecurity as a business enabler&#8221; narrative for their organization. Your place in the boardroom is now secured. Instead of the occasional one-off update, you are now part of the business conversation on an ongoing basis. This is an opportunity to place cybersecurity in the context of business decisions that the board understands. Ditch acronyms and technical talk of threats, vulnerabilities, and attacks. Be fluent in the language of business and talk about the cyber consequences of business decisions that are made every day.<\/p>\n<p>The use of SaaS apps that make employees more productive in a hybrid work environment also leaves the organization more exposed to risk, as critical business data is now in control of a third party. Business partnerships that drive geographic expansion, rushing new apps to market as fast as possible to capture market share, or acquiring to scale the engineering team all have tremendous cybersecurity consequences. For example, when you acquire a company, you also inherit its attack surface. It is not only a new group of employees who need access to enterprise resources, but all their contractors, partners, suppliers, and so on. It is a tangled, extended digital web of connected assets and implications.<\/p>\n<p>Security leaders would be well advised to make cybersecurity tangible in a business context. Like any other part of the business, there are decisions to be made and trade-offs to consider, all related to what is the acceptable level of risk the organization is willing to expose itself to.<\/p>\n<h2 class=\"regular-text\">Automation and Evidence<\/h2>\n<p>Under the eyes of the SEC, the board needs evidence of what assets it is responsible for and how it is being monitored and proactively protected. In the event of a breach, when did the board know about it, and how fast did it respond and disclose the incident?<\/p>\n<p>It starts with knowing what you are protecting and how you are doing that. Discovery of critical assets becomes a core competency that underpins visibility, classification, and remediation efforts in a modern cybersecurity program. Discovery and classification must be automated to deal with the size, movement, and growth of data and enterprise-connected assets across hybrid clouds, SaaS partners, and digital supply chains. Protection starts with complete visibility of this sprawling attack surface, including every dependency, connection, and vulnerability across all public-facing assets. From there, you can prioritize protections against the most critical threats to your most valuable assets.<\/p>\n<p>Automated discovery can also identify assets that are dormant, unused, and unnecessary. In that way, they can be effectively decommissioned to reduce <a href=\"https:\/\/www.darkreading.com\/risk\" target=\"_blank\" rel=\"noopener\">cyber-risk<\/a> and attack surface sprawl at the same time.<\/p>\n<h2 class=\"regular-text\">Conclusion<\/h2>\n<p>Now is not the time to educate the board about the difference between malware and ransomware. It is about painting a complete picture of the threat landscape and the specific risks and exposures facing the organization. CISOs should be talking about the overall security program and strategic initiatives to enable the business while measuring and reducing risk.<\/p>\n<p>Help the board understand where the business is vulnerable, where controls end, and where exposure begins. What are the consequences and protection options? At the end of the day, cybersecurity is a business challenge, like growing margins and market share. Strategic priorities and investments aligned to business objectives. Sounds so simple.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/risk\/the-board-of-directors-will-see-you-now\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Help the board understand where the business is vulnerable, where controls end, and where exposure begins. Read More <a href=\"https:\/\/www.darkreading.com\/risk\/the-board-of-directors-will-see-you-now\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-51189","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Board of Directors Will See You Now 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/the-board-of-directors-will-see-you-now\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Board of Directors Will See You Now 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/the-board-of-directors-will-see-you-now\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-23T17:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltf7ee8b25d41b9f4f\/641a2b40d8ce04419f0f0c4c\/Boardroom_Stephen_Barnes_Northern_Ireland_Alamy.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-board-of-directors-will-see-you-now\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-board-of-directors-will-see-you-now\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"The Board of Directors Will See You Now\",\"datePublished\":\"2023-03-23T17:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-board-of-directors-will-see-you-now\/\"},\"wordCount\":971,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-board-of-directors-will-see-you-now\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltf7ee8b25d41b9f4f\/641a2b40d8ce04419f0f0c4c\/Boardroom_Stephen_Barnes_Northern_Ireland_Alamy.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/the-board-of-directors-will-see-you-now\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-board-of-directors-will-see-you-now\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/the-board-of-directors-will-see-you-now\/\",\"name\":\"The Board of Directors Will See You Now 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-board-of-directors-will-see-you-now\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-board-of-directors-will-see-you-now\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltf7ee8b25d41b9f4f\/641a2b40d8ce04419f0f0c4c\/Boardroom_Stephen_Barnes_Northern_Ireland_Alamy.jpg\",\"datePublished\":\"2023-03-23T17:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-board-of-directors-will-see-you-now\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/the-board-of-directors-will-see-you-now\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-board-of-directors-will-see-you-now\/#primaryimage\",\"url\":\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltf7ee8b25d41b9f4f\/641a2b40d8ce04419f0f0c4c\/Boardroom_Stephen_Barnes_Northern_Ireland_Alamy.jpg\",\"contentUrl\":\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltf7ee8b25d41b9f4f\/641a2b40d8ce04419f0f0c4c\/Boardroom_Stephen_Barnes_Northern_Ireland_Alamy.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-board-of-directors-will-see-you-now\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Board of Directors Will See You Now\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Board of Directors Will See You Now 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/the-board-of-directors-will-see-you-now\/","og_locale":"en_US","og_type":"article","og_title":"The Board of Directors Will See You Now 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/the-board-of-directors-will-see-you-now\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-03-23T17:00:00+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltf7ee8b25d41b9f4f\/641a2b40d8ce04419f0f0c4c\/Boardroom_Stephen_Barnes_Northern_Ireland_Alamy.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/the-board-of-directors-will-see-you-now\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/the-board-of-directors-will-see-you-now\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"The Board of Directors Will See You Now","datePublished":"2023-03-23T17:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-board-of-directors-will-see-you-now\/"},"wordCount":971,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-board-of-directors-will-see-you-now\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltf7ee8b25d41b9f4f\/641a2b40d8ce04419f0f0c4c\/Boardroom_Stephen_Barnes_Northern_Ireland_Alamy.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/the-board-of-directors-will-see-you-now\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/the-board-of-directors-will-see-you-now\/","url":"https:\/\/www.threatshub.org\/blog\/the-board-of-directors-will-see-you-now\/","name":"The Board of Directors Will See You Now 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-board-of-directors-will-see-you-now\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-board-of-directors-will-see-you-now\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltf7ee8b25d41b9f4f\/641a2b40d8ce04419f0f0c4c\/Boardroom_Stephen_Barnes_Northern_Ireland_Alamy.jpg","datePublished":"2023-03-23T17:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/the-board-of-directors-will-see-you-now\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/the-board-of-directors-will-see-you-now\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/the-board-of-directors-will-see-you-now\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltf7ee8b25d41b9f4f\/641a2b40d8ce04419f0f0c4c\/Boardroom_Stephen_Barnes_Northern_Ireland_Alamy.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltf7ee8b25d41b9f4f\/641a2b40d8ce04419f0f0c4c\/Boardroom_Stephen_Barnes_Northern_Ireland_Alamy.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/the-board-of-directors-will-see-you-now\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"The Board of Directors Will See You Now"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51189","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=51189"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51189\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=51189"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=51189"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=51189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}