{"id":6634,"date":"2023-03-06T08:00:12","date_gmt":"2023-03-06T08:00:12","guid":{"rendered":"https:\/\/sajinshivdas.com\/security\/target\/microsoft-defender-will-soon-be-a-lot-better-at-stopping-corporate-cyberattacks\/"},"modified":"2023-03-27T08:06:02","modified_gmt":"2023-03-27T08:06:02","slug":"microsoft-defender-will-be-much-more-effective-at-thwarting-business-cyberattacks","status":"publish","type":"post","link":"https:\/\/sajinshivdas.com\/cybersecurity\/microsoft-defender-will-be-much-more-effective-at-thwarting-business-cyberattacks\/","title":{"rendered":"Microsoft Defender will be much more effective at thwarting Business Cyberattacks."},"content":{"rendered":"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]A number of advanced Microsoft 365 Defender features first announced last year as a means of stopping and business email compromise (BEC) attacks, have now reached public preview, the company has announced.<\/p>\n<p>The features, called \u201cautomatic disruption\u201d use \u201chigh-confidence Extended Detection and Response (XDR) signals across endpoints, identities, email, and SaaS apps\u201d, Microsoft explained, saying they\u2019ll help contain active security attacks \u201cquickly and effectively\u201d.<\/p>\n<p>They\u2019ll work by automatically disabling, or restricting, devices and user accounts that the threat actors have compromised and are actively using in an attack.<\/p>\n<h2>Limited impact<\/h2>\n<p>By shutting off this access, Microsoft hopes the attackers won\u2019t be nearly as effective as they should be, and at the same time, SOC teams get more time to deploy additional countermeasures.<\/p>\n<p>As a result, ransomware and BEC attacks should have a more limited impact on the target organization, the company claims.<\/p>\n<p>Automatic attack disruption operates in three stages. In the first stage, the attack is detected, and \u201chigh confidence\u201d is established. In the second stage, different scenarios are classified, as well as assets that the attackers are currently controlling. Finally, in the third stage, automatic response actions are triggered via Microsoft 365 Defender, containing the attack and minimizing its impact.<\/p>\n<p>As the name suggests, the activity of these new features is automatic, which might not sit well with some cybersecurity professionals. Microsoft seems to be aware of this fact, stating that the number of signals used should ease anyone\u2019s anxiety around automation:<\/p>\n<p>\u201cWe understand that taking automatic action can come with hesitation, given the potential impact it can have on an organization,\u201d the company said. \u201cThat\u2019s why automatic attack disruption in Microsoft 365 Defender is designed to rely on high-fidelity XDR signals, coupled with insights from the continuous investigation of thousands of incidents by Microsoft\u2019s research teams.\u201d<\/p>\n<p>Ransomware continues to be one of the most disruptive forms of cybercrime out there. Businesses are advised to train their employees on the dangers of phishing and to make sure they set up a robust backup solution. An antivirus, a (opens in new tab), and multi-factor authentication are also considered best practices.[\/vc_column_text][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221;&#8230;<\/p>\n","protected":false},"author":1,"featured_media":6950,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[35,52],"class_list":{"0":"post-6634","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-security","8":"tag-cyber-attack","9":"tag-vulnerabilities"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft Defender will be much more effective at thwarting Business Cyberattacks. - Sajin Shivdas | Cybersecurity<\/title>\n<meta name=\"description\" content=\"A number of advanced Microsoft 365 Defender features first announced last year as a means of stopping and business email compromise (BEC) attacks, have\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sajinshivdas.com\/cybersecurity\/microsoft-defender-will-be-much-more-effective-at-thwarting-business-cyberattacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Defender will be much more effective at thwarting Business Cyberattacks. - Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"A number of advanced Microsoft 365 Defender features first announced last year as a means of stopping and business email compromise (BEC) attacks, have\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/microsoft-defender-will-be-much-more-effective-at-thwarting-business-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-06T08:00:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-27T08:06:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/03\/cybersecurity-padlock-digital-lock-technology-network-data-protection-background-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sajin Shivdas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sajin Shivdas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/microsoft-defender-will-be-much-more-effective-at-thwarting-business-cyberattacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/microsoft-defender-will-be-much-more-effective-at-thwarting-business-cyberattacks\\\/\"},\"author\":{\"name\":\"Sajin Shivdas\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"headline\":\"Microsoft Defender will be much more effective at thwarting Business Cyberattacks.\",\"datePublished\":\"2023-03-06T08:00:12+00:00\",\"dateModified\":\"2023-03-27T08:06:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/microsoft-defender-will-be-much-more-effective-at-thwarting-business-cyberattacks\\\/\"},\"wordCount\":526,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/microsoft-defender-will-be-much-more-effective-at-thwarting-business-cyberattacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/cybersecurity-padlock-digital-lock-technology-network-data-protection-background-1.jpg\",\"keywords\":[\"Cyber Attack\",\"Vulnerabilities\"],\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/microsoft-defender-will-be-much-more-effective-at-thwarting-business-cyberattacks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/microsoft-defender-will-be-much-more-effective-at-thwarting-business-cyberattacks\\\/\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/microsoft-defender-will-be-much-more-effective-at-thwarting-business-cyberattacks\\\/\",\"name\":\"Microsoft Defender will be much more effective at thwarting Business Cyberattacks. - Sajin Shivdas | Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/microsoft-defender-will-be-much-more-effective-at-thwarting-business-cyberattacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/microsoft-defender-will-be-much-more-effective-at-thwarting-business-cyberattacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/cybersecurity-padlock-digital-lock-technology-network-data-protection-background-1.jpg\",\"datePublished\":\"2023-03-06T08:00:12+00:00\",\"dateModified\":\"2023-03-27T08:06:02+00:00\",\"description\":\"A number of advanced Microsoft 365 Defender features first announced last year as a means of stopping and business email compromise (BEC) attacks, have\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/microsoft-defender-will-be-much-more-effective-at-thwarting-business-cyberattacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/microsoft-defender-will-be-much-more-effective-at-thwarting-business-cyberattacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/microsoft-defender-will-be-much-more-effective-at-thwarting-business-cyberattacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/cybersecurity-padlock-digital-lock-technology-network-data-protection-background-1.jpg\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/cybersecurity-padlock-digital-lock-technology-network-data-protection-background-1.jpg\",\"width\":1500,\"height\":1000},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/microsoft-defender-will-be-much-more-effective-at-thwarting-business-cyberattacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft Defender will be much more effective at thwarting Business Cyberattacks.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\",\"name\":\"sajinshivdas.com\",\"description\":\"Cybersecurity - Information security Resources, Articles and Latest News\",\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"alternateName\":\"Sajin Shivdas\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\",\"name\":\"Sajin Shivdas\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"width\":1000,\"height\":500,\"caption\":\"Sajin Shivdas\"},\"logo\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\"},\"sameAs\":[\"http:\\\/\\\/sajinshivdas.com\\\/security\",\"www.linkedin.com\\\/in\\\/sajin-shivdas\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Defender will be much more effective at thwarting Business Cyberattacks. - Sajin Shivdas | Cybersecurity","description":"A number of advanced Microsoft 365 Defender features first announced last year as a means of stopping and business email compromise (BEC) attacks, have","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sajinshivdas.com\/cybersecurity\/microsoft-defender-will-be-much-more-effective-at-thwarting-business-cyberattacks\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Defender will be much more effective at thwarting Business Cyberattacks. - Sajin Shivdas | Cybersecurity","og_description":"A number of advanced Microsoft 365 Defender features first announced last year as a means of stopping and business email compromise (BEC) attacks, have","og_url":"https:\/\/sajinshivdas.com\/cybersecurity\/microsoft-defender-will-be-much-more-effective-at-thwarting-business-cyberattacks\/","og_site_name":"Sajin Shivdas | Cybersecurity","article_published_time":"2023-03-06T08:00:12+00:00","article_modified_time":"2023-03-27T08:06:02+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/03\/cybersecurity-padlock-digital-lock-technology-network-data-protection-background-1.jpg","type":"image\/jpeg"}],"author":"Sajin Shivdas","twitter_misc":{"Written by":"Sajin Shivdas","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/microsoft-defender-will-be-much-more-effective-at-thwarting-business-cyberattacks\/#article","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/microsoft-defender-will-be-much-more-effective-at-thwarting-business-cyberattacks\/"},"author":{"name":"Sajin Shivdas","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"headline":"Microsoft Defender will be much more effective at thwarting Business Cyberattacks.","datePublished":"2023-03-06T08:00:12+00:00","dateModified":"2023-03-27T08:06:02+00:00","mainEntityOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/microsoft-defender-will-be-much-more-effective-at-thwarting-business-cyberattacks\/"},"wordCount":526,"commentCount":0,"publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/microsoft-defender-will-be-much-more-effective-at-thwarting-business-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/03\/cybersecurity-padlock-digital-lock-technology-network-data-protection-background-1.jpg","keywords":["Cyber Attack","Vulnerabilities"],"articleSection":["Cyber Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sajinshivdas.com\/cybersecurity\/microsoft-defender-will-be-much-more-effective-at-thwarting-business-cyberattacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/microsoft-defender-will-be-much-more-effective-at-thwarting-business-cyberattacks\/","url":"https:\/\/sajinshivdas.com\/cybersecurity\/microsoft-defender-will-be-much-more-effective-at-thwarting-business-cyberattacks\/","name":"Microsoft Defender will be much more effective at thwarting Business Cyberattacks. - Sajin Shivdas | Cybersecurity","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/microsoft-defender-will-be-much-more-effective-at-thwarting-business-cyberattacks\/#primaryimage"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/microsoft-defender-will-be-much-more-effective-at-thwarting-business-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/03\/cybersecurity-padlock-digital-lock-technology-network-data-protection-background-1.jpg","datePublished":"2023-03-06T08:00:12+00:00","dateModified":"2023-03-27T08:06:02+00:00","description":"A number of advanced Microsoft 365 Defender features first announced last year as a means of stopping and business email compromise (BEC) attacks, have","breadcrumb":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/microsoft-defender-will-be-much-more-effective-at-thwarting-business-cyberattacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sajinshivdas.com\/cybersecurity\/microsoft-defender-will-be-much-more-effective-at-thwarting-business-cyberattacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/microsoft-defender-will-be-much-more-effective-at-thwarting-business-cyberattacks\/#primaryimage","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/03\/cybersecurity-padlock-digital-lock-technology-network-data-protection-background-1.jpg","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/03\/cybersecurity-padlock-digital-lock-technology-network-data-protection-background-1.jpg","width":1500,"height":1000},{"@type":"BreadcrumbList","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/microsoft-defender-will-be-much-more-effective-at-thwarting-business-cyberattacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sajinshivdas.com\/cybersecurity\/"},{"@type":"ListItem","position":2,"name":"Microsoft Defender will be much more effective at thwarting Business Cyberattacks."}]},{"@type":"WebSite","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website","url":"https:\/\/sajinshivdas.com\/cybersecurity\/","name":"sajinshivdas.com","description":"Cybersecurity - Information security Resources, Articles and Latest News","publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"alternateName":"Sajin Shivdas","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sajinshivdas.com\/cybersecurity\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6","name":"Sajin Shivdas","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","width":1000,"height":500,"caption":"Sajin Shivdas"},"logo":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png"},"sameAs":["http:\/\/sajinshivdas.com\/security","www.linkedin.com\/in\/sajin-shivdas"]}]}},"_links":{"self":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/6634","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/comments?post=6634"}],"version-history":[{"count":0,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/6634\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media\/6950"}],"wp:attachment":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media?parent=6634"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/categories?post=6634"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/tags?post=6634"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}