{"id":51849,"date":"2023-05-11T00:00:00","date_gmt":"2023-05-11T00:00:00","guid":{"rendered":"urn:uuid:d0e9d806-cbe9-9918-fd06-9012c9f6f1b9"},"modified":"2023-05-11T00:00:00","modified_gmt":"2023-05-11T00:00:00","slug":"manage-cyber-risk-with-a-platform-approach","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/manage-cyber-risk-with-a-platform-approach\/","title":{"rendered":"Manage Cyber Risk with a Platform Approach"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/ciso\/thumbnails\/22\/cyber-risk-management-platform.png\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/ciso\/thumbnails\/22\/cyber-risk-management-platform.png\" class=\"ff-og-image-inserted\"><\/div>\n<p>Effective management of cyber risk across a growing and complex attack surface continues to be top of mind for CISOs globally. Furthermore, Security operations teams are finding themselves in a losing battle against rapidly evolving threats due to siloed architectures, views, analytical capabilities, and workflows, which are further exacerbated in an increasingly distributed world.<\/p>\n<p>This blog explores the need for converging security solutions to a unified cybersecurity platform in the face of swift technological innovation and the evolving threat landscape.<\/p>\n<p>Explore more SOC best practices: <a href=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/core\/docs\/ebook\/3-ways-to-evolve-your-security-operations-ebook.pdf\"><span class=\"bs-modal\">Three Ways to Evolve Your Security Operations<\/span><\/a><\/p>\n<p><span class=\"body-subhead-title\">The many benefits of leveraging a cybersecurity platform &#8211;<\/span><\/p>\n<p>Trend Micro Research recently conducted a global study polling more than 2,300 IT security decision makers from 21 countries to determine the reality of SOCs and narrow-in on solving current challenges. The study revealed that 55% of SOCs have security infrastructure that is not in use, with the most common reason being lack of integration.<\/p>\n<p>Integration is a must for teams operating in a variety of environment, systems, and applications. They need to monitor and manage each \u2014 and the connections between each \u2014 without slowing down innovation or causing business delays. All of which is very complicated when leveraging point products with limited integration.<\/p>\n<p>Enter: the unified cybersecurity platform. Security leaders may be hesitant to adopt yet another approach if it requires a rip and replace. But even organizations that have invested in specific point products can benefit from adopting a platform-based approach. The opportunity to resolve longstanding pain points while laying the groundwork for consolidation, knowing that each addition will mesh seamlessly with the others and unlock new benefits through synergy, makes it a worthwhile endeavor.<\/p>\n<p><span class=\"body-subhead-title\">Choosing a platform vendor<\/span><\/p>\n<p>Not all cybersecurity platforms are built the same. Many vendors may try to pass off a discounted product bundle as a platform. Consider the following capabilities when selecting a vendor to maximize your investment and security posture:<\/p>\n<p>1. Supporting both cloud and on-premises environments<\/p>\n<p>A true platform must be based on a cloud-native architecture to offer analytical and computing advantages over on-premises architecture. Leveraging the power of the cloud to collect, synthesize, and analyze the high volume of threat data and activity, enables the platform to provide a level of function, performance, and scalability that surpasses on-premises capabilities.<\/p>\n<p>Hybrid environments will be here to stay; it\u2019s rare that long-standing organizations are often \u201cborn in the cloud.\u201d Therefore, it\u2019s crucial that the platform can operate smoothly across both environments.<\/p>\n<p>2. Automating security processes<\/p>\n<p>Automation is the key to alleviating overstretched SOCs. Look for a platform that can automate processes for alert monitoring, triage and response, threat intel, and compliance\u2014just to name a few.<\/p>\n<p><span class=\"main-subtitle-black\"><span class=\"rte-red-text\">&#8220;<\/span>51% of organizations have improved threat detection as a result of automating security processes via playbooks \u2013 ESG<span class=\"rte-red-text\">&#8220;<\/span><\/span><\/p>\n<p>Keep in mind that automation should enhance human work, not replace it entirely. It needs to augment security analysts efforts\u2019 by accelerating and\/or removing manual steps, thereby enabling quick analysis and action that was previously impossible.<\/p>\n<p>When evaluating automation capabilities, SOCs should be asked the following. This will give security leaders and decision makers the full picture into what features are needed to ensure the best ROI\u2014both financially and security-wise.<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">What processes could specifically benefit from automation?<\/span><\/li>\n<li><span class=\"rte-red-bullet\">How many times have these processes occurred?<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Are their needs consistent across the board?<\/span><\/li>\n<\/ul>\n<p>3. Strategic use of managed services<\/p>\n<p>It\u2019s not all about the security capabilities; an effective platform should be supported by managed services to help further reduce internal resource requirements, gain complementary competencies, and obtain much-needed security expertise.<\/p>\n<p><span class=\"main-subtitle-black\"><span class=\"rte-red-text\">&#8220;<\/span>59% of organizations are using managed services as an extension of their internal resources \u2013 SOC Modernization and the Role of XDR (ESG)<span class=\"rte-red-text\">&#8220;<\/span><\/span><\/p>\n<p>Managed detection and response (MDR) and\/or incident response (IR) are key dedicated resources that provide 24\/7 threat monitoring and critical response in the event of an attack. These services are often difficult to maintain in-house.<\/p>\n<p>Again, security decision makers need to evaluate the gaps in their organization in order to choose the appropriate level of MDR and IR service. Consider the payment structure; some vendors will require you to buy IR services in timed blocks, which means if an incident takes longer than the allotted time to remediate, you will be forced to either buy another time block or be left to your own devices.<\/p>\n<p>A platform with built-in managed services can provide the best return for SOCs, as it can ensure integration across the platform, and the service is seamlessly supported from deployment.<\/p>\n<p><span class=\"body-subhead-title\">Next steps<\/span><\/p>\n<p>Overall, a cybersecurity platform can offer a number of advantages for organizations looking to improve their security posture, streamline security operations and lower security risk.<\/p>\n<p>Learn more about <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/one-platform.html\">Trend One<\/a> security capabilities or check out the following resources for additional insights into understanding, communicating, and mitigating cyber risk.<\/p>\n<p>For more information on cybersecurity platforms and risk management, check out the SOC series:<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/21\/g\/cyber-risk-management-platform.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Discover how a platform approach can best assist and support security operations teams with a cyber risk management so you can be more resilient with less resources. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":51850,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9528,9549,9559,9550,9548,9527,9529,9660],"class_list":["post-51849","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-ciso-article","tag-trend-micro-ciso-cloud","tag-trend-micro-ciso-compliance","tag-trend-micro-ciso-detection-and-response","tag-trend-micro-ciso-digital-transformation","tag-trend-micro-ciso-expert-perspective","tag-trend-micro-ciso-risk-management","tag-trend-micro-ciso-skills-gap"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Manage Cyber Risk with a Platform Approach 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/manage-cyber-risk-with-a-platform-approach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Manage Cyber Risk with a Platform Approach 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/manage-cyber-risk-with-a-platform-approach\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-11T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/ciso\/thumbnails\/22\/cyber-risk-management-platform.png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/manage-cyber-risk-with-a-platform-approach\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/manage-cyber-risk-with-a-platform-approach\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Manage Cyber Risk with a Platform Approach\",\"datePublished\":\"2023-05-11T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/manage-cyber-risk-with-a-platform-approach\/\"},\"wordCount\":816,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/manage-cyber-risk-with-a-platform-approach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/05\/manage-cyber-risk-with-a-platform-approach.png\",\"keywords\":[\"Trend Micro CISO : Article\",\"Trend Micro CISO : Cloud\",\"Trend Micro CISO : Compliance\",\"Trend Micro CISO : Detection and Response\",\"Trend Micro CISO : Digital Transformation\",\"Trend Micro CISO : Expert Perspective\",\"Trend Micro CISO : Risk Management\",\"Trend Micro CISO : Skills Gap\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/manage-cyber-risk-with-a-platform-approach\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/manage-cyber-risk-with-a-platform-approach\/\",\"name\":\"Manage Cyber Risk with a Platform Approach 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/manage-cyber-risk-with-a-platform-approach\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/manage-cyber-risk-with-a-platform-approach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/05\/manage-cyber-risk-with-a-platform-approach.png\",\"datePublished\":\"2023-05-11T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/manage-cyber-risk-with-a-platform-approach\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/manage-cyber-risk-with-a-platform-approach\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/manage-cyber-risk-with-a-platform-approach\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/05\/manage-cyber-risk-with-a-platform-approach.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/05\/manage-cyber-risk-with-a-platform-approach.png\",\"width\":641,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/manage-cyber-risk-with-a-platform-approach\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro CISO : Article\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-ciso-article\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Manage Cyber Risk with a Platform Approach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Manage Cyber Risk with a Platform Approach 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/manage-cyber-risk-with-a-platform-approach\/","og_locale":"en_US","og_type":"article","og_title":"Manage Cyber Risk with a Platform Approach 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/manage-cyber-risk-with-a-platform-approach\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-05-11T00:00:00+00:00","og_image":[{"url":"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/ciso\/thumbnails\/22\/cyber-risk-management-platform.png","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/manage-cyber-risk-with-a-platform-approach\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/manage-cyber-risk-with-a-platform-approach\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Manage Cyber Risk with a Platform Approach","datePublished":"2023-05-11T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/manage-cyber-risk-with-a-platform-approach\/"},"wordCount":816,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/manage-cyber-risk-with-a-platform-approach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/05\/manage-cyber-risk-with-a-platform-approach.png","keywords":["Trend Micro CISO : Article","Trend Micro CISO : Cloud","Trend Micro CISO : Compliance","Trend Micro CISO : Detection and Response","Trend Micro CISO : Digital Transformation","Trend Micro CISO : Expert Perspective","Trend Micro CISO : Risk Management","Trend Micro CISO : Skills Gap"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/manage-cyber-risk-with-a-platform-approach\/","url":"https:\/\/www.threatshub.org\/blog\/manage-cyber-risk-with-a-platform-approach\/","name":"Manage Cyber Risk with a Platform Approach 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/manage-cyber-risk-with-a-platform-approach\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/manage-cyber-risk-with-a-platform-approach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/05\/manage-cyber-risk-with-a-platform-approach.png","datePublished":"2023-05-11T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/manage-cyber-risk-with-a-platform-approach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/manage-cyber-risk-with-a-platform-approach\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/manage-cyber-risk-with-a-platform-approach\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/05\/manage-cyber-risk-with-a-platform-approach.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/05\/manage-cyber-risk-with-a-platform-approach.png","width":641,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/manage-cyber-risk-with-a-platform-approach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro CISO : Article","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-ciso-article\/"},{"@type":"ListItem","position":3,"name":"Manage Cyber Risk with a Platform Approach"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51849","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=51849"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51849\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/51850"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=51849"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=51849"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=51849"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}