{"id":1193,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail75-us4-mcsv-net-2\/"},"modified":"2021-12-30T11:38:56","modified_gmt":"2021-12-30T11:38:56","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail75-us4-mcsv-net-2","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail75-us4-mcsv-net-2\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail75.us4.mcsv.net;"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s]<br \/>\nApart from the reporter&#8217;s opinions \ud83d\ude09<br \/>\nSo Im going to be working on a table of contents for the top so look out for that. Im the meantime,<br \/>\nSo onto the news:<\/p>\n<p>Combating state-sponsored cyber attacks<br \/>\nGovernment enterprises in the UAE can combat state-sponsored cyber-attacks that target sensitive information in various ways, said an industry expert.<br \/>\nHere is a more detailed look at what government agencies should do to keep nation-state attackers at bay.<br \/>\n&#8211; Decrypt and Inspect SSL Traffic<br \/>\n&#8211; Fortify Web Applications against Attacks<br \/>\n&#8211; Use Virtual Private Networks (VPNs) to Secure Data<br \/>\n&#8211; Monitor and Audit Access to Sensitive Data<br \/>\n&#8211; Train Employees on Security Best Practices<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=4e44058fd3&#038;e=20056c7556<\/p>\n<p>Australian business is \u2018low hanging fruit\u2019 for cybercrime.<br \/>\nAccording to Deloitte\u2019s Australian based cyber expert James Nunn-Price and former FBI Cyber expert Mary Galligan now with Deloitte, it\u2019s a whole new ballgame.<br \/>\nShe was concerned that there were no mandatory reporting laws and few companies report issues like ransomware to the Australian Federal Police.<br \/>\nHer strong message is don\u2019t pay, strengthen your defences, and let someone else be the weak kid on the block.<br \/>\nAccess control was another major issue especially in relation to the bring your own device (BYOD) movement that may save companies money in capital expenditure but can open up major security holes.<br \/>\nFor example, use of the same password for a BYOD device and a corporate log-in was a major security issue.<br \/>\nGalligan spoke on the main issues in cyber security.<br \/>\nNunn-Price spoke about Deloitte\u2019s global Cyber Intelligence Centre and how it had become a combined effort across more than 20 such centres to stay ahead of trends.<br \/>\nOf course the bigger you are (and that probably describes Deloitte\u2019s client list) the more risk you have and the more you stand to lose.<br \/>\nHe was concerned that Australia was one of, if not the, main target in the Asia Pacific region as it was \u2018catching up with the rest of the world.\u2019 Cybercrime knows no geographical boundaries as has protected Australia in the past.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=d2f4ac6537&#038;e=20056c7556<\/p>\n<p>Professor Hay earns $500,000 data security contract<br \/>\nThe Defense Advanced Research Projects Agency (DARPA) has awarded Assistant Professor of Computer Science Michael Hay nearly $500,000 to participate in Project Brandeis, a new program that challenges researchers from across the country to develop systems that facilitate data analysis while preserving privacy.<br \/>\nHay\u2019s research is part of a $2.8 million team effort led by scientists at UMASS Amherst.<br \/>\nIn the months ahead, the team will attempt to build systems that achieve what cryptographers have defined as differential privacy: query results that are statistically true but not precise enough to allows hackers to link real people with otherwise anonymous data points.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=60e29be779&#038;e=20056c7556<\/p>\n<p>New Govt. Bill To End Secrecy On Big Data Breaches<br \/>\nMany Australian companies are failing to report ransomware &#8211; which locks users out of their computers until they pay a fee &#8211; and instead perpetuate the practice by coughing up the cash, according to financial services firm Deloitte.<br \/>\nCERT Australia, the national computer emergency response team and a partner agency in the Canberra-based Australian Cyber Security Centre, says it responded to 11,733 cybercrime incidents in 2014-15.<br \/>\nHowever failure to report cybercrime and data breaches may soon no longer be an option for the bigger companies and agencies in Australia, with Federal Parliament due to debate a government bill in coming months that &#8211; if passed &#8211; would make notifications compulsory for companies with an annual turnover of more than $3 million.<br \/>\nThe draft Privacy Amendment (Notification of Serious Data Breaches) Bill 2015 will also apply to any company currently subject to the Privacy Act.<br \/>\nSmall businesses at this stage are exempt.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=83dd8d434e&#038;e=20056c7556<\/p>\n<p>Almost one-half of UK firms still unaware of their obligations under the new EU data protection laws<br \/>\nOrganisations should be under no illusion.<br \/>\nThe EU General Data Protection Regulation (GDPR), which will come into force in 2018, represents a major change in the way that personal data must be managed for any company that does business in or with the EU.<br \/>\nThey will need to make sure they are able to delete all of a consumer&#8217;s personal data quickly and completely from their systems on request.<br \/>\nThere will also be mandatory reporting of serious data breaches and organisations will be expected to know what data might have been affected &#8211; within 24 hours if possible.<br \/>\nAnd those firms found to be in breach of the regulation face hefty fines &#8211; up to four per cent of global turnover.<br \/>\nJust over half said they were aware of the GDPR but only 20 per cent were well prepared.<br \/>\nA further 26 per cent said they have just started preparing for the regulation.<br \/>\nHowever, a total of 44 per cent were unaware or only vaguely aware of the new rules.<br \/>\nThis is in keeping with a recent survey by US consultancy TRUSTe across the US and Europe, which found that half of the companies were still oblivious to the changes.<br \/>\ngdpr-fig2A quarter of those polled said they will need to invest in new infrastructure or software to comply with the new rules, especially in areas such as security, data governance and identity and access management.<br \/>\nA further 53 per cent said they were unsure whether such investment will be necessary or not.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=d72dec8fbd&#038;e=20056c7556<\/p>\n<p>Top 4 Compliance Mistakes and How to Prevent Them<br \/>\nWhat issues can creep up when it comes to industry compliance, and how can enterprises work to solve these problems.<br \/>\nHere are three top compliance mistakes companies make.<br \/>\n1. Not Fully Understanding Industry Guidelines<br \/>\n2. Ineffectively Evaluating Third-Party IT Service Providers<br \/>\n3. Placing Too Low a Priority on Physical Security<br \/>\n4. Failing to Review Compliance and Protection Processes<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=a78fd3ee42&#038;e=20056c7556<\/p>\n<p>5 reasons you need to hire a Chief Privacy Officer<br \/>\nBusinesses are increasingly relying on data, but they&#8217;re overlooking another key aspect of data: privacy.<br \/>\nIn order to keep up with the growing regulations surrounding data privacy, it may be time to hire a Chief Privacy Officer.<br \/>\nA study by cloud-based data protection provider Druva on the &#8220;State of Data Privacy in 2015&#8221; asked 214 people worldwide at companies with 100 to 5,000 employees how they are tackling data privacy.<br \/>\nOf those surveyed, 81 percent reported their business had government privacy compliance and regulation requirements to meet.<br \/>\nHowever, 93 percent of companies reported that they found it difficult to ensure data privacy and 71 percent reported challenges with keeping up with regulations and compliance around privacy.<br \/>\nHere are five reasons, according to Freji, why you should seriously consider hiring a CPO in the coming year.<br \/>\n1. Changing business landscape<br \/>\n2. Europe&#8217;s General Data Protection Regulation<br \/>\n3. Mandated CPO<br \/>\n4. Rising number of high-profile breaches<br \/>\n5. Avoid a PR nightmare<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=0da749af0e&#038;e=20056c7556<\/p>\n<p>Insurance innovation to battle cyber threats<br \/>\nJWK Solicitors, has announced the launch of its \u201cCyber Risk Insurance\u201d service designed to protect businesses against the growing threat of a cyber-attack.<br \/>\nGovernment figures also suggest that of the 52 per cent of businesses who believe they have existing cover against a cyber breach, less than 10 per cent actually do.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=597c5e4132&#038;e=20056c7556<\/p>\n<p>The Cybersecurity Talent You Seek May Be In-House<br \/>\nCasey O\u2019Brien, executive director and principal investigator with The National CyberWatch Center, says security managers should tap the talents of network administrators, system administrators, and programmers because they have strong foundational skills in their specialty areas.<br \/>\nThe goal of all security programs should be to have that group of experts, like Navy Seals, who can create the playbook, who understand the threat and can put in place the necessary procedures and tools to defend their organizations, says Adam Vincent, CEO of ThreatConnect, developer of a comprehensive threat intelligence platform used in security operation centers globally.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=538f546552&#038;e=20056c7556<\/p>\n<p>Five rules to conduct a successful cybersecurity RFP<br \/>\nLast week was sadly remarkable for the cybersecurity industry: former New York city mayor Rudy Giuliani, compared cybersecurity to cancer, while famous security expert and journalist Brian Krebs pointed to serious problems at Norse Corporation, a prominent cybersecurity startup recently backed by KPMG VC investment of $11.4 million.<br \/>\nLast year, many friends of mine &#8211; security professionals and managers within different organizations &#8212; complained about their disappointments with RFPs for purchasing various cybersecurity products or services.<br \/>\nAn open and transparent bid is probably one of the most efficient ways to get the best price\/quality ratio available on the open market.<br \/>\nHowever, the invisible hand may not always work properly for the cybersecurity market due to its complexity and dynamically changing environment.<br \/>\nNevertheless, a cybersecurity RFP can be successful, if we take into consideration few simple rules:<br \/>\n&#8211; Make sure that the RFP is aligned with your corporate risk management strategy<br \/>\n&#8211; Be precise and detailed in every requirement<br \/>\n&#8211; Request technical demonstration and testing in your own environment<br \/>\n&#8211; Price shall not outshine the expertise and experience<br \/>\n&#8211; Don\u2019t forget about Service Level Agreement (SLA)<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=ae5a3bb88a&#038;e=20056c7556<\/p>\n<p>Attackers also spend an average of 70 hours per attack going up against &#8220;typical&#8221; IT security infrastructure, 147 hours battling &#8220;excellent&#8221; IT security infrastructure and give up completely after 209 hours.<br \/>\nThe majority of cyber attackers are motivated by money, but make less than $15,000 per successful attack, according to a survey of hackers in the U.S., U.K. and Germany released yesterday by the Ponemon Institute.<br \/>\nThe average attacker conducts eight attacks per year, only 42 of which are successful.<br \/>\nIn addition, only 59 percent of the successful attacks result in any financial payout.<br \/>\nThe majority of attackers have increased their use of hacker tools by 18 percent, and 64 percent say that the tools are &#8220;highly effective.&#8221;<br \/>\nOn average, attackers spend $1,367 a year on these tools.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=9a9df51c33&#038;e=20056c7556<\/p>\n<p>Seven security cultures that can help or hurt your organization<br \/>\nCulture of Reporting<br \/>\nCultures of reporting could be a security silver bullet.<br \/>\nIf everyone who identified a security problem reported it, and if the organization investigated and addressed every reported problem, security could change overnight.<br \/>\nUnfortunately, this is expensive.<br \/>\nSuch cultures tend to exist only in places where lawsuits and losses from whistleblowing have shown fixing problems, even when costly, is inevitably cheaper than ignoring them.<br \/>\nAwareness Culture = Informed, engaged people are always valuable, in security or anywhere else.<br \/>\nEvidence-based (Security) Management &#8211; Evidence-based cultures collect empirical and historical data, analyze them, and make decisions based on the results, even if the results are unexpected or undesirable.<br \/>\nFUD-Driven &#8211; FUD-driven cultures are the opposite of evidence-based cultures.<br \/>\nCult(ure) of Technology &#8211; When organizations worship it as the single best security strategy, things go awry.<br \/>\nCheckbox Culture &#8211; Compliance is not security.<br \/>\nCheckbox cultures are taking heat in the wake of big breaches, where the victims looked good on paper but not on the ground.<br \/>\nCulture of Arrogance &#8211; If a culture of reporting could dramatically improve security, there&#8217;s nothing like arrogance to ensure that every objective will be twice as far off, every success is twice as difficult, every failure is twice as painful.<br \/>\nIf you see your organization in any of these seven types, consider what it means for your security strategy over the coming year.<br \/>\nWill your culture help you.<br \/>\nOr does it presage another 12 months of struggle, frustration, and maybe even an incident putting the organization in an increasingly common and unwelcome spotlight?<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=c8c042b7ac&#038;e=20056c7556<\/p>\n<p>Does attribution matter to security leaders?<br \/>\nI know I\u2019ve been on both sides of the issue.<br \/>\nSometimes the value of a concept &#8212; in this case, attribution &#8212; is lost in the debate.<br \/>\nThen I met Levi Gundert (LinkedIn, Twitter), VP of Information Security Strategy, from Recorded Future. Levi\u2019s career as an information security professional includes unique operational and leadership experience in government (U.S. Secret Service), threat intelligence providers (Team Cymru and Recorded Future), and multi-vertical Fortune 500 enterprises (IBM, Cisco Systems, Union Bank, and Fidelity Investments).<\/p>\n<p>Our discussion revealed when and how attribution matters. It starts by getting the definition right. You pointed out that the definition of attribution matters. What does a security leader need to consider when it comes to attribution?<br \/>\nThe definition is critical. Attribution is often mis-understood to mean the identification of an individual or group with associated real name, address, and other personally identifiable information. In contrast, within a business context, attribution is obtaining general intelligence to address the \u201cwho\u201d and \u201cwhy\u201d of nefarious activity.<\/p>\n<p>Expand on \u201cmotivation informs methodology.\u201d How does this help a security leader?<br \/>\nGeneral attribution informs senior business leaders\u2019 critical decisions, especially during an incident.<br \/>\nBeyond crisis moments, security leaders need to effectively communicate general attribution information to help executives and the board meet the daily challenges of information security program resource allocation.<\/p>\n<p>How important is context?<br \/>\nIt\u2019s essential. We\u2019ve been discussing the value of attribution during and after an attack, but it\u2019s also a critical proactive exercise to understand adversaries before they impact the business.<br \/>\nThis is one facet of threat intelligence, which is the act of formulating an analysis based on the identification, collection, and enrichment of relevant information.<\/p>\n<p>Does the board care about attribution. Should they?<br \/>\nThe board does care about attribution. They want the full story which includes \u201cwho\u201d and \u201cwhy.\u201d Lacking attribution leaves stakeholders with doubts.<\/p>\n<p>What does a security leader need to do to get this. What can someone do today to start building the capability &#8212; and boost the value of their leadership?<br \/>\nObviously the first step is defining the goals and objectives for attribution along with repeatable metrics.<\/p>\n<p>It\u2019s the TTP identifications that help peer teams within information security.<br \/>\nThis type of proactive identification compliments a risk\/audit framework approach because threat actors and their temporal behaviors accelerate the learning cycle.<\/p>\n<p>Instead of waiting for the next version of ISO 27001 or NIST Cyber Security Framework (CSF) to be released, companies can still map their progress to the framework while also making incremental improvements, especially in the \u201cprevention\u201d and \u201cdetection\u201d framework phases, based on near real-time attacker attribution.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=53563ef8b4&#038;e=20056c7556<\/p>\n<p>The Future of Security: Isolation<br \/>\nWith the latest advances in virtualization technology, the notion of isolation for security control holds tremendous promise.<br \/>\nIsolation through virtualization has the wonderful property of being able to effectively block all malware attacks without the need to understand the attack, detect the attack, or recognize the signature of the attack.<br \/>\nIsolation through virtualization is much like the \u201cair-gapped network\u201d\u2014the offending malware cannot traverse from one isolation zone to another.<br \/>\nIsolation technology makes the most sense in two places: on the client web browser, where 80 percent of the malware is getting into the enterprise; and on the servers in the data center, where the valuable stuff resides.<br \/>\nOn the end point, the basic idea is that by using advanced virtualization, we can execute the code of a web page in some type of disposable virtual container.<br \/>\nThe challenge to this approach has been to deploy the isolation in a manner that does not interfere with end user devices or behavior.<br \/>\nIn the data center, the problem is reversed.<br \/>\nAdvanced virtualization technologies are used to insert security controls, such as always-on encryption, seamlessly in between the application\/data and the underlying infrastructure.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=19e90d4293&#038;e=20056c7556<\/p>\n<p>Inside the new Microsoft Azure security features<br \/>\nThe idea of the Microsoft Azure Container Service is to offer a service that leverages Microsoft&#8217;s partnerships with Docker and Mesosphere in order to make delivering a production-ready container cluster simple and manageable in the cloud.<br \/>\nIt combines open source Mesosphere cluster management &#8212; for Apache Mesos and Mesopshere Data Center Operating System &#8212; with Docker&#8217;s containerization technology.<br \/>\nThe Microsoft Azure Security Center is designed to grant cloud administrators a more detailed and manageable view of the security of their Azure resources.<br \/>\nImportantly, Azure Security Center will integrate with major security providers such as Check Point, F5 Networks and Cisco.<br \/>\nIts main focus will be on security monitoring, policy management and threat detection across an enterprise&#8217;s Azure environment.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=628d868777&#038;e=20056c7556<\/p>\n<p>Deconstructing the emergency incident response process<br \/>\nProviders of professional IR services can quickly bring the additional resources and the expertise that companies often need to handle a rapidly unfolding threat.<br \/>\nBut there&#8217;s a lot you need to do to get the best out of these services, and that begins with a clear understanding of how the emergency incident response process works and what to expect when you hire an IR provider to handle an ongoing crisis.<br \/>\nFour tips for getting the most out of your IR provider:<br \/>\n&#8211; Have a plan<br \/>\nIt&#8217;s important to have a security incident response plan, exercise it regularly, and have all your partners selected before you actually need any of it, says Christopher Pierson, CSO and general counsel at Viewpost.<br \/>\n&#8211; Know what to ask<br \/>\nMake sure you know what questions to ask before selecting an IR provider, says Sanjeev Sah, director of security and CSO at Texas Children&#8217;s Hospital.<br \/>\n&#8211; Be proactive<br \/>\nDon&#8217;t wait for an incident to start looking for a third-party IR provider.<br \/>\nInstead, hire an IR provider and place them on retainer for when needed.<br \/>\n&#8211; Be prepared<br \/>\nMake sure you have the information your IR provider needs in order to respond to a developing situation.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=190e1a6b11&#038;e=20056c7556<\/p>\n<p>One-Quarter Of Organizations Do Not Encrypt Sensitive Data<br \/>\nResearch by AIIM revealed 26 percent of organizations have suffered customer data loss or exposure over the past year, but 25 percent do not encrypt sensitive data.<br \/>\nAIIM\u2019s report Data Privacy \u2013 Living by New Rules states that as a consequence of lost customer or employee data, 10 percent of affected organizations faced fines or regulatory actions, 25 percent experienced a disruption to business, and 18 percent suffered a loss of customer trust.<br \/>\nIn addition, 38 percent of the organizations polled reported being highly dependent on sensitive personal data, while 33 percent have some sensitive client data, and 20 percent have just basic HR content.<br \/>\nAs previous studies have found, internal threats can be more dangerous than external ones when it comes to data breaches, and the AIIM study found that 47 percent of organizations polled reported a data breach, exposure, or incident in the past year as a result of staff intent (19 percent) or staff negligence (28 percent), while just 13 percent experienced an external hack.<br \/>\nOf those polled, 68 percent want governments to encourage stronger, tamper-proof encryption; the survey shows 62 percent do not encrypt email addresses and 25 percent do not encrypt credit card data, while 64 percent claim to encrypt all personally identifiable information (PII) and 75 percent encrypt all sensitive personal data.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=4bdca0a2ae&#038;e=20056c7556<\/p>\n<p>============================================================<br \/>\nFeedback, questions? Our mailing address is: ** dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If you know someone else who would be interested in this Newsalert, please forwarded this email.<br \/>\nIf you want to be added to the distribution list, please click this:   ** Subscribe to this list (http:\/\/paulgdavis.us3.list-manage1.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p>** Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=b4baeea596)<\/p>\n<p>** Update subscription preferences (http:\/\/paulgdavis.us3.list-manage.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s] Apart from the reporter&#8217;s opinions \ud83d\ude09 So Im going to be working on a table of contents for the top so look out for that. Im the meantime, So onto the news: Combating state-sponsored cyber attacks Government enterprises&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1193","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1193","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1193"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1193\/revisions"}],"predecessor-version":[{"id":3680,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1193\/revisions\/3680"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1193"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1193"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}