{"id":51847,"date":"2023-05-10T21:58:00","date_gmt":"2023-05-10T21:58:00","guid":{"rendered":"https:\/\/www.darkreading.com\/endpoint\/coalfire-compliance-report-unveils-the-next-horizon-in-compliance"},"modified":"2023-05-10T21:58:00","modified_gmt":"2023-05-10T21:58:00","slug":"coalfire-compliance-report-unveils-the-next-horizon-in-compliance","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/coalfire-compliance-report-unveils-the-next-horizon-in-compliance\/","title":{"rendered":"Coalfire Compliance Report Unveils the Next Horizon in Compliance"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/beta.darkreading.com\/images\/og-image.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><strong>GREENWOOD VILLAGE, CO \u2013 May 10, 2023 \u2013<\/strong>Today, Coalfire released its new Securealities 2023 Compliance Report developed in partnership with Informa&#8217;s Omdia research division. The report captures the changes in today&#8217;s world of compliance, detailing how 300+ security leaders are addressing compliance investments, organization governance, framework updates, tooling, automation, and more. Coalfire reveals that companies are struggling more than ever in managing multiple compliance frameworks within complex, hybrid-cloud environments and are increasingly turning to automation to meet the challenge.<\/p>\n<p>&#8220;The early adopters that embraced compliance automation are starting to see returns on their investments by optimizing multiple regulatory frameworks including NIST, SOC, ISO, HITRUST, PCI, FedRAMP, and CMMC,&#8221; said Adam Shnider, executive vice president of compliance services at Coalfire. &#8220;Breaking away from traditional audit cycles, today&#8217;s platform-driven solutions now allow companies to continuously integrate, deploy, and monetize their compliance capabilities by entering new markets and engaging new customers.&#8221;<\/p>\n<p><span>The Coalfire Compliance Report shows that technical options are increasing, as are complexities and costs.<\/span><\/p>\n<ul>\n<li>A staggering frequently and consistently demonstrate compliance to customers, regulators, and supply chain partners.<\/li>\n<\/ul>\n<ul>\n<li><span><strong>Almost 70% manage at least six frameworks. <\/strong><\/span><span>59% have multiple systems now subject to compliance requirements<\/span><\/li>\n<li><span><strong>More than half (58%) report an uptick in compliance costs since 2020<\/strong><\/span><span>; over 40% claim 25%+ budget increases since then and believe their compliance spend will continue to grow.<\/span><\/li>\n<\/ul>\n<ul>\n<li><span><strong>Fifty-six percent of large enterprise respondents report using automation software to manage compliance<\/strong><\/span><span>. 64% of large enterprise respondents (revenue over $1 billion) have embraced tools to support evidence mapping to manage costs within multi-framework environments.<\/span><\/li>\n<\/ul>\n<p><span>Unfortunately, many of those leveraging automation are seeing costs rise, which suggests that many are introducing software without re-engineering for coordinated assessment processes.<\/span><\/p>\n<p><span>Though costs have increased for many companies, organizations are slowly balancing workflows and starting to see investments pay off, signifying a change in momentum. With this paradigm shift, <\/span>Coalfire expects costs to come down in future reporting due to improved platform and software capabilities supporting evidence collection and maintenance.<\/p>\n<p>&#8220;Global security compliance controls and regulatory acceleration in the multi-cloud era are complex and must be met with efficiency and scalability,&#8221; states Cisco Global Head of Cloud Compliance Prashant Vadlamudi. &#8220;Meeting these challenges is key to a secure cloud, and for every enterprise, building your trust story is the lifeline to competitive advantage. Cisco aligns with Coalfire in our shared belief that compliance automation and cross-framework cloud engineering is the rising tide that lifts all boats.&#8221;<\/p>\n<p>While 77% of organizations plan to migrate to updated frameworks soon, the report shows that nearly a quarter (23%) are under prepared for this impending series of transitions and deadlines. Especially for cloud service and SaaS providers, failure to comply with more stringent guardrails in a timely manner can result in added corporate liability and potential personal legal exposure for executives.<\/p>\n<p><span>The report confirms that privacy, commercial trade, and defense intelligence risks have arrived at a critical tipping point. Government cloud migration and regulatory maturity are transforming business processes and the entire economy. As the cybersecurity industry\u2019s top compliance, advisory, and testing firm, Coalfire&#8217;s research informs best-practice security programs within today\u2019s next-generation standards frameworks.<\/span><\/p>\n<p><span><strong>About Coalfire<\/strong><\/span><\/p>\n<p><span>The world\u2019s leading organizations \u2014 including the top five cloud service providers and leaders in financial services, healthcare, and retail \u2014 trust Coalfire to elevate their cyber programs and secure the future of their business. Number one in compliance, FedRAMP\u00ae, and cloud penetration testing, Coalfire is the world\u2019s largest firm dedicated to cybersecurity services, providing unparalleled technology-enabled professional and managed services. To learn more, visit&nbsp;Coalfire.com.<\/span><\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/endpoint\/coalfire-compliance-report-unveils-the-next-horizon-in-compliance\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Compliance automation now mission critical to managing and monetizing multiple frameworks.Read More <a href=\"https:\/\/www.darkreading.com\/endpoint\/coalfire-compliance-report-unveils-the-next-horizon-in-compliance\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-51847","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Coalfire Compliance Report Unveils the Next Horizon in Compliance 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/coalfire-compliance-report-unveils-the-next-horizon-in-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Coalfire Compliance Report Unveils the Next Horizon in Compliance 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/coalfire-compliance-report-unveils-the-next-horizon-in-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-10T21:58:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/beta.darkreading.com\/images\/og-image.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/coalfire-compliance-report-unveils-the-next-horizon-in-compliance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/coalfire-compliance-report-unveils-the-next-horizon-in-compliance\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Coalfire Compliance Report Unveils the Next Horizon in Compliance\",\"datePublished\":\"2023-05-10T21:58:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/coalfire-compliance-report-unveils-the-next-horizon-in-compliance\/\"},\"wordCount\":592,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/coalfire-compliance-report-unveils-the-next-horizon-in-compliance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beta.darkreading.com\/images\/og-image.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/coalfire-compliance-report-unveils-the-next-horizon-in-compliance\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/coalfire-compliance-report-unveils-the-next-horizon-in-compliance\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coalfire-compliance-report-unveils-the-next-horizon-in-compliance\/\",\"name\":\"Coalfire Compliance Report Unveils the Next Horizon in Compliance 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/coalfire-compliance-report-unveils-the-next-horizon-in-compliance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/coalfire-compliance-report-unveils-the-next-horizon-in-compliance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beta.darkreading.com\/images\/og-image.jpg\",\"datePublished\":\"2023-05-10T21:58:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/coalfire-compliance-report-unveils-the-next-horizon-in-compliance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/coalfire-compliance-report-unveils-the-next-horizon-in-compliance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/coalfire-compliance-report-unveils-the-next-horizon-in-compliance\/#primaryimage\",\"url\":\"https:\/\/beta.darkreading.com\/images\/og-image.jpg\",\"contentUrl\":\"https:\/\/beta.darkreading.com\/images\/og-image.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/coalfire-compliance-report-unveils-the-next-horizon-in-compliance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Coalfire Compliance Report Unveils the Next Horizon in Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Coalfire Compliance Report Unveils the Next Horizon in Compliance 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/coalfire-compliance-report-unveils-the-next-horizon-in-compliance\/","og_locale":"en_US","og_type":"article","og_title":"Coalfire Compliance Report Unveils the Next Horizon in Compliance 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/coalfire-compliance-report-unveils-the-next-horizon-in-compliance\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-05-10T21:58:00+00:00","og_image":[{"url":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/coalfire-compliance-report-unveils-the-next-horizon-in-compliance\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/coalfire-compliance-report-unveils-the-next-horizon-in-compliance\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Coalfire Compliance Report Unveils the Next Horizon in Compliance","datePublished":"2023-05-10T21:58:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/coalfire-compliance-report-unveils-the-next-horizon-in-compliance\/"},"wordCount":592,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/coalfire-compliance-report-unveils-the-next-horizon-in-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/coalfire-compliance-report-unveils-the-next-horizon-in-compliance\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/coalfire-compliance-report-unveils-the-next-horizon-in-compliance\/","url":"https:\/\/www.threatshub.org\/blog\/coalfire-compliance-report-unveils-the-next-horizon-in-compliance\/","name":"Coalfire Compliance Report Unveils the Next Horizon in Compliance 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/coalfire-compliance-report-unveils-the-next-horizon-in-compliance\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/coalfire-compliance-report-unveils-the-next-horizon-in-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","datePublished":"2023-05-10T21:58:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/coalfire-compliance-report-unveils-the-next-horizon-in-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/coalfire-compliance-report-unveils-the-next-horizon-in-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/coalfire-compliance-report-unveils-the-next-horizon-in-compliance\/#primaryimage","url":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","contentUrl":"https:\/\/beta.darkreading.com\/images\/og-image.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/coalfire-compliance-report-unveils-the-next-horizon-in-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Coalfire Compliance Report Unveils the Next Horizon in Compliance"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51847","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=51847"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51847\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=51847"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=51847"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=51847"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}