{"id":122557,"date":"2022-10-06T09:00:00","date_gmt":"2022-10-06T16:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=122557"},"modified":"2023-07-21T14:31:20","modified_gmt":"2023-07-21T21:31:20","slug":"microsoft-publishes-new-report-on-holistic-insider-risk-management","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/06\/microsoft-publishes-new-report-on-holistic-insider-risk-management\/","title":{"rendered":"Microsoft publishes new report on holistic insider risk management"},"content":{"rendered":"\n

The risk landscape for organizations has changed significantly in the past few years. The amount of data captured, copied, and consumed is expected to grow to more than 180 zettabytes through 2025.1<\/sup>  Traditional ways of identifying and mitigating risks don\u2019t always work. Historically, organizations have focused on external threats; however, risks from within the organization can be just as prevalent and harmful. These internal risks include unprotected and ungoverned data, accidental or intentional data oversharing, as well as the risks for failing to meet ever-changing regulations. Not to mention, with more than 300 million people working remotely, data is being created, accessed, shared, and stored outside of the traditional borders of business.<\/p>\n\n\n\n

Core to a security team\u2019s mission is protecting the company\u2019s assets, especially its data. Strong data protection<\/a> requires securing the most sensitive or critical data, preventing that data from leaving the organization, and managing potential risks inside and outside of your environment.<\/p>\n\n\n\n

And managing internal risks can be challenging because it requires analyzing millions of daily signals to detect potentially risky user actions that may lead to a data security incident. For example, what confidential files are your users sharing or accessing? Are users sharing sensitive files externally? Are they downloading files to unapproved devices or uploading them to unapproved locations? All the while, you must balance security controls and productivity, and ensure user privacy is built into your program.<\/p>\n\n\n\n

To be effective in addressing insider risks, it\u2019s critical that organizations start thinking about how and why they should be implementing a holistic data protection strategy across their entire organization that encompasses people, processes, training, and tools. At Microsoft, we transitioned from a fragmented insider risk management approach to one in which we addressed it holistically by taking a more comprehensive approach, getting more buy-in from organizational leadership, and making sure user privacy is built in from the get-go.<\/p>\n\n\n\n

Following our own transition, Microsoft wanted to better understand how organizations are approaching insider risk management, specifically how some of these security and compliance teams were thinking about insider risk management holistically. <\/em>Today we\u2019re publishing our first Microsoft report specifically addressing insider risk, \u201cBuilding a Holistic Insider Risk Management program<\/a>.\u201d<\/p>\n\n\n\n

This Microsoft-commissioned report lays out several new insights about how organizations go from a fragmented approach to insider risk management to a holistic one, addressing potential risks from multiple lenses as part of a greater data protection strategy, with cross-leadership buy-in. For example, we found that more than 90 percent of holistic organizations believe privacy controls should be used in the early stages of investigations. Holistic organizations also get more buy-in on their risk programs from other departments, like legal, HR, or compliance teams, which is critical to building a culture of security. Furthermore, they put a greater emphasis on training with 92 percent agreeing that \u201ctraining and education are vital to proactively address and reduce insider risks,\u201d compared with 50 percent of fragmented organizations.<\/p>\n\n\n\n

The report also shares best practices for organizations who endeavor to approach insider risk management more holistically and build a program that fosters trust, empowers users, and makes privacy a priority.<\/p>\n\n\n\n

You can read the full report here<\/a>.<\/p>\n\n\n\n

Learn more<\/h2>\n\n\n\n

Learn more about Microsoft Purview<\/a>.<\/p>\n\n\n\n

Learn more about insider threats<\/a> and the types of threats possible.<\/p>\n\n\n\n

To learn more about Microsoft Security solutions, visit our website<\/a>. Bookmark the Security blog<\/a> to keep up with our expert coverage on security matters. Also, follow us at @MSFTSecurity<\/a> for the latest news and updates on cybersecurity.<\/p>\n\n\n\n

<\/div>\n\n\n\n
\n\n\n\n

1<\/sup>Volume of data\/information created, captured, copied, and consumed worldwide from 2010 to 2020, with forecasts from 2021 to 2025<\/a>, Statista. September 8, 2022.<\/p>\n","protected":false},"excerpt":{"rendered":"

The risk landscape for organizations has changed significantly in the past few years. Traditional ways of identifying and mitigating risks simply don\u2019t work. Historically, organizations have focused on external threats; however, risks from within the organization can be just as prevalent and harmful. This new Microsoft-commissioned report lays out several new insights about how organizations go from a fragmented approach to insider risk management to a holistic one. <\/p>\n","protected":false},"author":162,"featured_media":122950,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[],"topic":[],"products":[],"threat-intelligence":[],"tags":[],"coauthors":[2133],"class_list":["post-122557","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"yoast_head":"\nMicrosoft publishes report on holistic insider risk management | Microsoft Security Blog<\/title>\n<meta name=\"description\" content=\"This new Microsoft-commissioned report lays out new insights about how organizations can create a holistic insider risk management plan.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/06\/microsoft-publishes-new-report-on-holistic-insider-risk-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft publishes report on holistic insider risk management | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"This new Microsoft-commissioned report lays out new insights about how organizations can create a holistic insider risk management plan.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/06\/microsoft-publishes-new-report-on-holistic-insider-risk-management\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-06T16:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-21T21:31:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/CLO22_SecOps_016-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bret Arsenault\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/CLO22_SecOps_016-1.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bret Arsenault\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/06\/microsoft-publishes-new-report-on-holistic-insider-risk-management\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/06\/microsoft-publishes-new-report-on-holistic-insider-risk-management\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/bret-arsenault\/\",\"@type\":\"Person\",\"@name\":\"Bret Arsenault\"}],\"headline\":\"Microsoft publishes new report on holistic insider risk management\",\"datePublished\":\"2022-10-06T16:00:00+00:00\",\"dateModified\":\"2023-07-21T21:31:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/06\/microsoft-publishes-new-report-on-holistic-insider-risk-management\/\"},\"wordCount\":613,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/06\/microsoft-publishes-new-report-on-holistic-insider-risk-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/CLO22_SecOps_016-1.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/06\/microsoft-publishes-new-report-on-holistic-insider-risk-management\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/06\/microsoft-publishes-new-report-on-holistic-insider-risk-management\/\",\"name\":\"Microsoft publishes report on holistic insider risk management | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/06\/microsoft-publishes-new-report-on-holistic-insider-risk-management\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/06\/microsoft-publishes-new-report-on-holistic-insider-risk-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/CLO22_SecOps_016-1.jpg\",\"datePublished\":\"2022-10-06T16:00:00+00:00\",\"dateModified\":\"2023-07-21T21:31:20+00:00\",\"description\":\"This new Microsoft-commissioned report lays out new insights about how organizations can create a holistic insider risk management plan.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/06\/microsoft-publishes-new-report-on-holistic-insider-risk-management\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/06\/microsoft-publishes-new-report-on-holistic-insider-risk-management\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/06\/microsoft-publishes-new-report-on-holistic-insider-risk-management\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/CLO22_SecOps_016-1.jpg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/CLO22_SecOps_016-1.jpg\",\"width\":1200,\"height\":800,\"caption\":\"Security practitioners at work in a security operations center.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/06\/microsoft-publishes-new-report-on-holistic-insider-risk-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft publishes new report on holistic insider risk management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft publishes report on holistic insider risk management | Microsoft Security Blog","description":"This new Microsoft-commissioned report lays out new insights about how organizations can create a holistic insider risk management plan.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/06\/microsoft-publishes-new-report-on-holistic-insider-risk-management\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft publishes report on holistic insider risk management | Microsoft Security Blog","og_description":"This new Microsoft-commissioned report lays out new insights about how organizations can create a holistic insider risk management plan.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/06\/microsoft-publishes-new-report-on-holistic-insider-risk-management\/","og_site_name":"Microsoft Security Blog","article_published_time":"2022-10-06T16:00:00+00:00","article_modified_time":"2023-07-21T21:31:20+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/CLO22_SecOps_016-1.jpg","type":"image\/jpeg"}],"author":"Bret Arsenault","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/CLO22_SecOps_016-1.jpg","twitter_misc":{"Written by":"Bret Arsenault","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/06\/microsoft-publishes-new-report-on-holistic-insider-risk-management\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/06\/microsoft-publishes-new-report-on-holistic-insider-risk-management\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/bret-arsenault\/","@type":"Person","@name":"Bret Arsenault"}],"headline":"Microsoft publishes new report on holistic insider risk management","datePublished":"2022-10-06T16:00:00+00:00","dateModified":"2023-07-21T21:31:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/06\/microsoft-publishes-new-report-on-holistic-insider-risk-management\/"},"wordCount":613,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/06\/microsoft-publishes-new-report-on-holistic-insider-risk-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/CLO22_SecOps_016-1.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/06\/microsoft-publishes-new-report-on-holistic-insider-risk-management\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/06\/microsoft-publishes-new-report-on-holistic-insider-risk-management\/","name":"Microsoft publishes report on holistic insider risk management | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/06\/microsoft-publishes-new-report-on-holistic-insider-risk-management\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/06\/microsoft-publishes-new-report-on-holistic-insider-risk-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/CLO22_SecOps_016-1.jpg","datePublished":"2022-10-06T16:00:00+00:00","dateModified":"2023-07-21T21:31:20+00:00","description":"This new Microsoft-commissioned report lays out new insights about how organizations can create a holistic insider risk management plan.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/06\/microsoft-publishes-new-report-on-holistic-insider-risk-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/06\/microsoft-publishes-new-report-on-holistic-insider-risk-management\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/06\/microsoft-publishes-new-report-on-holistic-insider-risk-management\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/CLO22_SecOps_016-1.jpg","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/CLO22_SecOps_016-1.jpg","width":1200,"height":800,"caption":"Security practitioners at work in a security operations center."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/06\/microsoft-publishes-new-report-on-holistic-insider-risk-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft publishes new report on holistic insider risk management"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}}]}},"msxcm_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/122557"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/162"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=122557"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/122557\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/122950"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=122557"}],"wp:term":[{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=122557"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=122557"},{"taxonomy":"products","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/products?post=122557"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=122557"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/tags?post=122557"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=122557"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}