{"id":55088,"date":"2024-01-17T00:00:00","date_gmt":"2024-01-17T00:00:00","guid":{"rendered":"urn:uuid:a3af10bd-c826-7f38-ecac-a48fb8d0cdba"},"modified":"2024-01-17T00:00:00","modified_gmt":"2024-01-17T00:00:00","slug":"embracing-a-risk-based-cybersecurity-approach-with-asrm","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/embracing-a-risk-based-cybersecurity-approach-with-asrm\/","title":{"rendered":"Embracing a risk-based cybersecurity approach with ASRM"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/attack-surface-management-strategies:Large?qlt=80\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/ciso\/thumbnails\/22\/attack-surface-management-strategies.png\" class=\"ff-og-image-inserted\"><\/div>\n<p><span class=\"body-subhead-title\">Cyber asset discovery<\/span><\/p>\n<p>First, you need total visibility to be able to discover and continuously monitor known, unknown, internal, and internet-facing (external) assets. Siloed point products across endpoints, users, devices, cloud, networks, etc., <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/21\/g\/why-secops-need-cybersecurity-platform.html\">limit overstretched security teams<\/a> from taking stock or perform manual audits. Also consider that new projects with open-source dependencies and user\/device accounts are spun up instantly, meaning you need to be able to see your entire ecosystem as it changes, not after.<\/p>\n<p>The goal is to gain visibility to answer questions such as:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">What is my attack surface?<\/span><\/li>\n<li><span class=\"rte-red-bullet\">How well can I see what assets are in my environment?<\/span><\/li>\n<li><span class=\"rte-red-bullet\">How many, what types, and what attributes are associated with these assets?<\/span><\/li>\n<li><span class=\"rte-red-bullet\">What are my high-value assets?<\/span><\/li>\n<li><span class=\"rte-red-bullet\">How is my attack surface changing?<\/span><\/li>\n<\/ul>\n<p><span class=\"body-subhead-title\">Risk assessment<\/span><\/p>\n<p>Being able to see your entire ecosystem as it changes is the first step; next, security teams need to assess and prioritize any weaknesses or vulnerabilities. This doesn\u2019t just apply this to systems, but user types as well\u2014for example, executive level employees are the most common targets for <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/22\/g\/worldwide-email-phishing-stats-examples-2021.html\">business email compromise (BEC)<\/a>. Also, we\u2019ve seen an uptick in campaigns targeting <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/22\/l\/software-supply-chain-security.html\">software supply chains<\/a> and <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/22\/j\/cybersecurity-trends-2022-cyber-defense.html\">DevOps pipelines<\/a>, meaning processes also need to be evaluated for any security gaps.<\/p>\n<p>Ideally, this risk information will be contextualized for greater understanding to answer the following questions:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Can I quantify my risk? What is my overall risk score?<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Is my risk score increasing or decreasing over time?<br \/><\/span><\/li>\n<li><span class=\"rte-red-bullet\">How does it compare to peers in the industry?<br \/><\/span><\/li>\n<li><span class=\"rte-red-bullet\">Where do I see the most significant security risks?<br \/><\/span><\/li>\n<li><span class=\"rte-red-bullet\">What risk factors need immediate attention?<\/span><\/li>\n<\/ul>\n<p><span class=\"body-subhead-title\">Risk mitigation<\/span><\/p>\n<p>While discovering and assessing risks across your digital attack surface is important, it\u2019s also critical to receive actionable prioritized mitigation recommendations to lower risk exposure. Virtual patching, changing configuration options on a prevention control, and controlling user access parameters are just a few examples.<\/p>\n<p>Furthermore, it should be possible to automate mitigation wherever possible for great efficiency and to reduce the chance of a successful attack or breach.<\/p>\n<p>With the skills shortage introducing very real challenges to managing the attack surface, the opportunity to create a common framework and a single pane of glass is paramount to effective cyber risk management. Enter: extended detection and response (XDR) and zero-trust strategies.<\/p>\n<p><span class=\"body-subhead-title\">The importance of XDR<\/span><\/p>\n<p>Investments in XDR mean there is data, analytics, and integrations, and a technology in place that could act as a foundation to serving other use cases and providing insight and operational value beyond the realm of detection and response.<\/p>\n<p>More proactive risk prioritization and mitigation benefits the SOC by reducing overall exposure and the scope of a security incident. Conversely, detection data collected by XDR provides valuable insight into attack surface threat activity and how current defenses are coping. In turn, this can inform risk assessments and response recommendations.<\/p>\n<p>Learn more in <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/22\/k\/threat-detection-response-guide.html\">Guide to Better Threat Detection and Response (XDR)<\/a><\/p>\n<p><span class=\"body-subhead-title\">Supporting zero-trust strategies<\/span><\/p>\n<p>Proactive cyber risk management depends on operationalizing elements of a zero-trust strategy. Zero trust is an extension of the principle of least privilege, wherein any connection\u2014whether it\u2019s from within the network or not\u2014should be considered untrustworthy. This is crucial in today\u2019s hyper-connected, remote work environment that has increased the different entry points or connections into the enterprise.<\/p>\n<p>As always, this needs to be an ongoing process that constantly evaluates identity, user and device activity, application, vulnerability, and device configuration. The demand for continuous assessment has led to many SOCs shifting toward the Secure Access Service Edge (SASE) architecture, which combines discrete capabilities such as Cloud Application Security Broker (CASB), Secure Web Gateway (SWG), and Zero Trust Network Access (ZTNA) for more granular control across the network.<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/22\/d\/proactive-cyber-risk-management-strategies.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Explore how a risk-based cybersecurity approach is critical to proactively stop dynamic, ever-evolving threats. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":55089,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9528,9550,9548,9527,9529],"class_list":["post-55088","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-ciso-article","tag-trend-micro-ciso-detection-and-response","tag-trend-micro-ciso-digital-transformation","tag-trend-micro-ciso-expert-perspective","tag-trend-micro-ciso-risk-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Embracing a risk-based cybersecurity approach with ASRM 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/embracing-a-risk-based-cybersecurity-approach-with-asrm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Embracing a risk-based cybersecurity approach with ASRM 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/embracing-a-risk-based-cybersecurity-approach-with-asrm\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-17T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/attack-surface-management-strategies:Large?qlt=80\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/embracing-a-risk-based-cybersecurity-approach-with-asrm\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/embracing-a-risk-based-cybersecurity-approach-with-asrm\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Embracing a risk-based cybersecurity approach with ASRM\",\"datePublished\":\"2024-01-17T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/embracing-a-risk-based-cybersecurity-approach-with-asrm\/\"},\"wordCount\":627,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/embracing-a-risk-based-cybersecurity-approach-with-asrm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/01\/embracing-a-risk-based-cybersecurity-approach-with-asrm.png\",\"keywords\":[\"Trend Micro CISO : Article\",\"Trend Micro CISO : Detection and Response\",\"Trend Micro CISO : Digital Transformation\",\"Trend Micro CISO : Expert Perspective\",\"Trend Micro CISO : Risk Management\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/embracing-a-risk-based-cybersecurity-approach-with-asrm\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/embracing-a-risk-based-cybersecurity-approach-with-asrm\/\",\"name\":\"Embracing a risk-based cybersecurity approach with ASRM 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/embracing-a-risk-based-cybersecurity-approach-with-asrm\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/embracing-a-risk-based-cybersecurity-approach-with-asrm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/01\/embracing-a-risk-based-cybersecurity-approach-with-asrm.png\",\"datePublished\":\"2024-01-17T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/embracing-a-risk-based-cybersecurity-approach-with-asrm\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/embracing-a-risk-based-cybersecurity-approach-with-asrm\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/embracing-a-risk-based-cybersecurity-approach-with-asrm\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/01\/embracing-a-risk-based-cybersecurity-approach-with-asrm.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/01\/embracing-a-risk-based-cybersecurity-approach-with-asrm.png\",\"width\":1200,\"height\":655},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/embracing-a-risk-based-cybersecurity-approach-with-asrm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro CISO : Article\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-ciso-article\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Embracing a risk-based cybersecurity approach with ASRM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Embracing a risk-based cybersecurity approach with ASRM 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/embracing-a-risk-based-cybersecurity-approach-with-asrm\/","og_locale":"en_US","og_type":"article","og_title":"Embracing a risk-based cybersecurity approach with ASRM 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/embracing-a-risk-based-cybersecurity-approach-with-asrm\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-01-17T00:00:00+00:00","og_image":[{"url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/attack-surface-management-strategies:Large?qlt=80","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/embracing-a-risk-based-cybersecurity-approach-with-asrm\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/embracing-a-risk-based-cybersecurity-approach-with-asrm\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Embracing a risk-based cybersecurity approach with ASRM","datePublished":"2024-01-17T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/embracing-a-risk-based-cybersecurity-approach-with-asrm\/"},"wordCount":627,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/embracing-a-risk-based-cybersecurity-approach-with-asrm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/01\/embracing-a-risk-based-cybersecurity-approach-with-asrm.png","keywords":["Trend Micro CISO : Article","Trend Micro CISO : Detection and Response","Trend Micro CISO : Digital Transformation","Trend Micro CISO : Expert Perspective","Trend Micro CISO : Risk Management"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/embracing-a-risk-based-cybersecurity-approach-with-asrm\/","url":"https:\/\/www.threatshub.org\/blog\/embracing-a-risk-based-cybersecurity-approach-with-asrm\/","name":"Embracing a risk-based cybersecurity approach with ASRM 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/embracing-a-risk-based-cybersecurity-approach-with-asrm\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/embracing-a-risk-based-cybersecurity-approach-with-asrm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/01\/embracing-a-risk-based-cybersecurity-approach-with-asrm.png","datePublished":"2024-01-17T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/embracing-a-risk-based-cybersecurity-approach-with-asrm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/embracing-a-risk-based-cybersecurity-approach-with-asrm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/embracing-a-risk-based-cybersecurity-approach-with-asrm\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/01\/embracing-a-risk-based-cybersecurity-approach-with-asrm.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/01\/embracing-a-risk-based-cybersecurity-approach-with-asrm.png","width":1200,"height":655},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/embracing-a-risk-based-cybersecurity-approach-with-asrm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro CISO : Article","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-ciso-article\/"},{"@type":"ListItem","position":3,"name":"Embracing a risk-based cybersecurity approach with ASRM"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55088","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=55088"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55088\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/55089"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=55088"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=55088"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=55088"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}