{"id":53667,"date":"2023-09-14T17:00:00","date_gmt":"2023-09-14T17:00:00","guid":{"rendered":"https:\/\/www.darkreading.com\/vulnerabilities-threats\/how-to-transform-security-awareness-into-security-culture"},"modified":"2023-09-14T17:00:00","modified_gmt":"2023-09-14T17:00:00","slug":"how-to-transform-security-awareness-into-security-culture","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/how-to-transform-security-awareness-into-security-culture\/","title":{"rendered":"How to Transform Security Awareness Into Security Culture"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltd193b837ad8f4c15\/6503276c48f1ba40abf54e97\/Cybersecurity_Andrii_Yalanskyi_Alamy.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Time and again, whenever a company is breached, people say: &#8220;They were phished. Did they do awareness training? They did? Well, somebody still clicked, so that obviously failed.&#8221; Then they continue: &#8220;Oh well, humans are awful; awareness training is worthless; we need to double down on technology.&#8221;<\/p>\n<p>What is entirely missed in this conversation is the number of technology layers that had to be permeated for that email to reach a human in the first place. And even after the click occurred, how many layers of technology had to fail to allow the threat to take root? Would they say the same about scrapping the firewall that was breached? About the endpoint detection that also failed? The secure email gateway? No.<\/p>\n<p>So how do we change this conversation from giving up on humans, in this all-or-nothing cycle of <a href=\"https:\/\/www.darkreading.com\/omdia\/a-new-look-for-risk-in-awareness-training\" target=\"_blank\" rel=\"noopener\">security-awareness training<\/a>, to recognizing that humans are one layer in the security stack \u2014 a critical layer \u2014 that has been underinvested in for decades?<\/p>\n<p>Here&#8217;s the answer: Leverage the human layer as a crucial cog in building resilience within the organization. Prudent security leaders will seek to build this layer up to its full potential, to analyze and monitor it, to fortify it, and above all, to learn from its failings \u2014 just as we would any other technical layer of the security stack.<\/p>\n<h2 class=\"regular-text\">Security Awareness vs. Security Culture<\/h2>\n<p>There is a problem with the conversation surrounding security awareness training and security culture. The two ideas are often conflated. The concepts are related, yes, but they are not the same. Many people define security culture as simply being &#8220;aware&#8221; of threats and how to respond to them.<\/p>\n<p>Yes, awareness is a critical aspect of building a strong security culture, but it is just <em>one<\/em> piece of the puzzle. It is important to realize that being <em>aware<\/em> is not the same as <em>caring<\/em>. Knowing about security doesn&#8217;t guarantee anything other than head knowledge\u2026 and even that assumes they&#8217;ll remember the information they learn and interpret that information in the right context.<\/p>\n<p>Think about it from their perspective. Why should non-security professionals care about security in their company? Why should they take on that additional responsibility, when they already have a full plate?<\/p>\n<p>This is where security culture comes into play. The conversation needs to shift from simple awareness to the scope of an organization&#8217;s culture. I define culture as the fundamental underpinning of an entire organization relating to the ideas, beliefs, behaviors, and knowledge that people engage in. In other words, how people act and how they support the systems that operate within the business. If an organization&#8217;s security culture is strong, it includes <em>shared responsibility.<\/em> In turn, this helps to nurture a community.<\/p>\n<h2 class=\"regular-text\">How to Create a Strong Security Culture<\/h2>\n<p>Take an organization that <a href=\"https:\/\/www.darkreading.com\/identity-and-access-management\/gamifying-password-training-shows-security-benefits\" target=\"_blank\" rel=\"noopener\">gamifies its security training<\/a> and simulation programs; an organization that turns dry, old awareness training into healthy competition, allowing employees to socialize over it. Employees can compete to be the best phish-catcher of them all. Or, better yet, how about an organization that takes phish reporting to the next level: An employee reports a suspected phish, the security team confirms it is a real threat, and either removes that threat from any other mailboxes or uses tools that replace that real phish with a sanitized, training version of the email. The employee who reported the threat has protected the organization and helped inoculate other employees against a confirmed threat.<\/p>\n<p>This is no longer a game \u2014 employees see the impact one employee can have in protecting the organization. Employees share their successes with their co-workers and their managers. They feel proud. It becomes a game, and it becomes fun. Now, the people are more than aware. They <em>care<\/em>.<\/p>\n<p>With security culture, you want to influence and build certain behavior patterns and belief systems across the wider organization. You want to build resiliency against cyber threats. The natural outcome of building a strong security culture is that the organization has an additional layer in its security stack. And a very important one at that.<\/p>\n<p>But building a human defense layer is not a one-and-done thing. Like any other layer \u2014 endpoint detection, firewalls, email gateways, and more \u2014 your human layer must be able to evolve and keep up with the ever-changing cyber-threat landscape. There will be failures and there will be vulnerabilities. That does not mean you should ever give up on it.<\/p>\n<h2 class=\"regular-text\">Evolve the Complete Security Stack \u2014 Including the Human Element<\/h2>\n<p>When there is a problem with a firewall, you invest and put energy into rebuilding it, learning what went wrong, and preventing it from happening again. The human side of security must evolve with the times just as much as the technology side.<\/p>\n<p>So, there is the answer.<\/p>\n<p>If there is a problem with your human layer in the security stack, where employees in your organization consistently click on bad links \u2014 do not get mad, and do not chastise. Learn from the failures and fortify yourself against them. Do not just provide security awareness training; foster a <a href=\"https:\/\/www.darkreading.com\/remote-workforce\/creating-a-security-culture-where-people-can-admit-mistakes\" target=\"_blank\" rel=\"noopener\">culture of security<\/a>.<\/p>\n<p>How? Reward good behavior and (where possible) refrain from punishing. Drive engagement up with a vast range of training content. Encourage healthy competition. Make it fun. <em>Make them care<\/em>, and there you will have it. A strong security culture is a human layer amid the hundreds of other technological ones, all of which are also flawed or capable of being flawed, but none of which will ever be useless.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/how-to-transform-security-awareness-into-security-culture\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Leverage the human layer as a crucial cog in building cyber resilience within the organization.Read More <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/how-to-transform-security-awareness-into-security-culture\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-53667","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Transform Security Awareness Into Security Culture 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/how-to-transform-security-awareness-into-security-culture\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Transform Security Awareness Into Security Culture 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/how-to-transform-security-awareness-into-security-culture\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-14T17:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltd193b837ad8f4c15\/6503276c48f1ba40abf54e97\/Cybersecurity_Andrii_Yalanskyi_Alamy.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-transform-security-awareness-into-security-culture\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-transform-security-awareness-into-security-culture\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"How to Transform Security Awareness Into Security Culture\",\"datePublished\":\"2023-09-14T17:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-transform-security-awareness-into-security-culture\\\/\"},\"wordCount\":924,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-transform-security-awareness-into-security-culture\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltd193b837ad8f4c15\\\/6503276c48f1ba40abf54e97\\\/Cybersecurity_Andrii_Yalanskyi_Alamy.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-transform-security-awareness-into-security-culture\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-transform-security-awareness-into-security-culture\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-transform-security-awareness-into-security-culture\\\/\",\"name\":\"How to Transform Security Awareness Into Security Culture 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-transform-security-awareness-into-security-culture\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-transform-security-awareness-into-security-culture\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltd193b837ad8f4c15\\\/6503276c48f1ba40abf54e97\\\/Cybersecurity_Andrii_Yalanskyi_Alamy.jpg\",\"datePublished\":\"2023-09-14T17:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-transform-security-awareness-into-security-culture\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-transform-security-awareness-into-security-culture\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-transform-security-awareness-into-security-culture\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltd193b837ad8f4c15\\\/6503276c48f1ba40abf54e97\\\/Cybersecurity_Andrii_Yalanskyi_Alamy.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltd193b837ad8f4c15\\\/6503276c48f1ba40abf54e97\\\/Cybersecurity_Andrii_Yalanskyi_Alamy.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-transform-security-awareness-into-security-culture\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Transform Security Awareness Into Security Culture\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Transform Security Awareness Into Security Culture 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/how-to-transform-security-awareness-into-security-culture\/","og_locale":"en_US","og_type":"article","og_title":"How to Transform Security Awareness Into Security Culture 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/how-to-transform-security-awareness-into-security-culture\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-09-14T17:00:00+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltd193b837ad8f4c15\/6503276c48f1ba40abf54e97\/Cybersecurity_Andrii_Yalanskyi_Alamy.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/how-to-transform-security-awareness-into-security-culture\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-transform-security-awareness-into-security-culture\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"How to Transform Security Awareness Into Security Culture","datePublished":"2023-09-14T17:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-transform-security-awareness-into-security-culture\/"},"wordCount":924,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-transform-security-awareness-into-security-culture\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltd193b837ad8f4c15\/6503276c48f1ba40abf54e97\/Cybersecurity_Andrii_Yalanskyi_Alamy.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/how-to-transform-security-awareness-into-security-culture\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/how-to-transform-security-awareness-into-security-culture\/","url":"https:\/\/www.threatshub.org\/blog\/how-to-transform-security-awareness-into-security-culture\/","name":"How to Transform Security Awareness Into Security Culture 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-transform-security-awareness-into-security-culture\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-transform-security-awareness-into-security-culture\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltd193b837ad8f4c15\/6503276c48f1ba40abf54e97\/Cybersecurity_Andrii_Yalanskyi_Alamy.jpg","datePublished":"2023-09-14T17:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-transform-security-awareness-into-security-culture\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/how-to-transform-security-awareness-into-security-culture\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/how-to-transform-security-awareness-into-security-culture\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltd193b837ad8f4c15\/6503276c48f1ba40abf54e97\/Cybersecurity_Andrii_Yalanskyi_Alamy.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltd193b837ad8f4c15\/6503276c48f1ba40abf54e97\/Cybersecurity_Andrii_Yalanskyi_Alamy.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/how-to-transform-security-awareness-into-security-culture\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Transform Security Awareness Into Security Culture"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53667","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=53667"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53667\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=53667"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=53667"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=53667"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}