{"id":90535,"date":"2020-02-04T09:00:55","date_gmt":"2020-02-04T17:00:55","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=90535"},"modified":"2023-05-15T23:08:49","modified_gmt":"2023-05-16T06:08:49","slug":"rsac-2020-empower-your-defenders-with-artificial-intelligence-and-automation","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/02\/04\/rsac-2020-empower-your-defenders-with-artificial-intelligence-and-automation\/","title":{"rendered":"RSA Conference 2020\u2014Empower your defenders with artificial intelligence and automation"},"content":{"rendered":"

The RSA Conference 2020 kicks off in less than three weeks, and the Microsoft Security team can\u2019t wait. This is one of our most important annual events because it provides an invaluable opportunity for us to connect with customers, partners, and other security thought leaders. New ideas are explored. Conventional thinking is challenged. For as important as technology is to cybersecurity, it\u2019s the people doing this work, day in and day out, that truly inspire us.<\/p>\n

The role of people in security will be a big theme in Microsoft\u2019s presence at RSA Conference 2020. Our job as technologists is to build intelligent solutions that unleash defenders to do what they do best: creative problem solving. Artificial intelligence (AI) and automation are vital for strong cybersecurity and risk management, not because technology alone can defeat cyberattacks, but because these tools enable people to defend against emergent threats. In Microsoft\u2019s two keynotes, 11 earned sessions, and 42 theater events, Microsoft security experts will share thoughts on how you can empower the heart of your security organization\u2014your people\u2014with AI, machine learning, and automation.<\/p>\n

Here are a few highlights to help you plan your time.<\/p>\n

Why your people are still your best cyber defense<\/h3>\n

Keynote speaker: Ann Johnson, Corporate Vice President, Microsoft Cybersecurity Solutions Group<\/p>\n

When: Wednesday, February 26<\/p>\n

Time: 4:05 PM \u2013 4:25 PM<\/p>\n

Access to AI and machine learning, which is powered by the cloud, will mean the difference between struggle or success for modern organizations that defend against cybercriminals. But technology is not enough. The organizations that quickly recover from a cyberattack have another thing in common: an agile team that can problem solve under stress. It works because attackers haven\u2019t prepared for the resilience of the human spirit. So how do you build a culture where people are your best defense? Ann will share some best practices at her keynote.<\/p>\n

Collaborating to improve open source security: how the ecosystem is stepping up<\/h3>\n

Keynote speaker: Mark Russinovich, Chief Technology Officer, Azure<\/p>\n

When: Friday, February 28<\/p>\n

Time: 9:50 AM<\/p>\n

The software supply chain is increasingly under attack. Bad actors attempt to insert malware at all points in the complex network of open source packages, spanning languages, operating systems, runtimes, and tools that make up modern software. But the story isn\u2019t all bad news. Industry and the open-source community have come together to mitigate these threats and improve the security of open source software. This collaboration has produced new ideas for building trust in the supply chain for consumers and producers of software, large and small. Mark\u2019s talk is a great opportunity for you to learn more about the future of supply chain security.<\/p>\n

Zero Trust: the buzz, the myths and the facts<\/h3>\n

Earned session speaker: Bret Arsenault, CVP and Chief Information Security Officer (CISO), Microsoft<\/p>\n

When: Thursday, February 27<\/p>\n

Time: 9:10 AM \u2013 10:10 AM<\/p>\n

Session code: STR-R02<\/p>\n

\u201cZero Trust” is the biggest buzz-word in security since block chain, but what does it mean? Is there a consistent approach or definition? In this session, Bret will discuss what Zero Trust is (and what it isn\u2019t) based on his real-world experience defining a Zero Trust strategy at Microsoft. And, as you\u2019ve come to expect, he\u2019ll give it to you straight. Carve out time for this event to get practical advice for applying Zero Trust to your own organization.<\/p>\n

The Microsoft booth theater sessions<\/h3>\n

The Microsoft booth will be a buzz of activity. If you\u2019re interested in learning about our platform investments, come to one\u2014or several\u2014of our 42 theater sessions. These presentations will dive into our solutions across Zero Trust, Identity & Access Management, Threat Protection, Information Protection & Compliance, and Cloud Security. Learn how our integrated solutions, with AI and machine learning built in, enable defenders to safeguard data, devices, apps, and people.<\/p>\n

Or take on hacker \u201c157\u201d in our virtual reality escape room for a fun way to see how our solutions work together.<\/p>\n

Read about more of our featured sessions<\/a>.<\/p>\n

Microsoft Security 20\/20 partner awards event<\/h3>\n

Microsoft will host a private awards ceremony to recognize partners in 16 award categories that span security integration partners, system integrators, and managed security service providers. These partners have developed and delivered exceptional Microsoft-based solutions and services during the past year. It will be an honor to celebrate their vision at this event.<\/p>\n

Visit the Microsoft RSA Conference 2020<\/a> website to register and learn more about our featured speakers and sessions, so you can make the most of your time.<\/p>\n

Also, bookmark the\u00a0Security blog<\/a>\u00a0to keep up with our expert coverage on security matters and follow us at\u00a0@MSFTSecurity<\/a>\u00a0for the latest news and updates on cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"

The RSA Conference 2020 kicks off in less than three weeks\u2014here are a few highlights to help you plan your time.<\/p>\n","protected":false},"author":96,"featured_media":90564,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3660],"topic":[3664,3689],"products":[],"threat-intelligence":[],"tags":[3822],"coauthors":[1916],"class_list":["post-90535","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-events","topic-ai-and-machine-learning","topic-zero-trust","tag-microsoft-security-insights"],"yoast_head":"\nRSA Conference 2020\u2014Empower your defenders with artificial intelligence and automation<\/title>\n<meta name=\"description\" content=\"The RSA Conference 2020 kicks off in less than three weeks\u2014here are a few highlights to help you plan your time.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/02\/04\/rsac-2020-empower-your-defenders-with-artificial-intelligence-and-automation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"RSA Conference 2020\u2014Empower your defenders with artificial intelligence and automation\" \/>\n<meta property=\"og:description\" content=\"The RSA Conference 2020 kicks off in less than three weeks\u2014here are a few highlights to help you plan your time.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/02\/04\/rsac-2020-empower-your-defenders-with-artificial-intelligence-and-automation\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-04T17:00:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-16T06:08:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/02\/Pre-RSA-full-size.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Microsoft Security Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/02\/Pre-RSA-full-size.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microsoft Security Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/02\/04\/rsac-2020-empower-your-defenders-with-artificial-intelligence-and-automation\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/02\/04\/rsac-2020-empower-your-defenders-with-artificial-intelligence-and-automation\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/microsoft-secure-blog-staff\/\",\"@type\":\"Person\",\"@name\":\"Microsoft Security Team\"}],\"headline\":\"RSA Conference 2020\u2014Empower your defenders with artificial intelligence and automation\",\"datePublished\":\"2020-02-04T17:00:55+00:00\",\"dateModified\":\"2023-05-16T06:08:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/02\/04\/rsac-2020-empower-your-defenders-with-artificial-intelligence-and-automation\/\"},\"wordCount\":779,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/02\/04\/rsac-2020-empower-your-defenders-with-artificial-intelligence-and-automation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/02\/Pre-RSA-BANNER-2.png\",\"keywords\":[\"Microsoft Security Insights\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/02\/04\/rsac-2020-empower-your-defenders-with-artificial-intelligence-and-automation\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/02\/04\/rsac-2020-empower-your-defenders-with-artificial-intelligence-and-automation\/\",\"name\":\"RSA Conference 2020\u2014Empower your defenders with artificial intelligence and automation\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/02\/04\/rsac-2020-empower-your-defenders-with-artificial-intelligence-and-automation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/02\/04\/rsac-2020-empower-your-defenders-with-artificial-intelligence-and-automation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/02\/Pre-RSA-BANNER-2.png\",\"datePublished\":\"2020-02-04T17:00:55+00:00\",\"dateModified\":\"2023-05-16T06:08:49+00:00\",\"description\":\"The RSA Conference 2020 kicks off in less than three weeks\u2014here are a few highlights to help you plan your time.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/02\/04\/rsac-2020-empower-your-defenders-with-artificial-intelligence-and-automation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/02\/04\/rsac-2020-empower-your-defenders-with-artificial-intelligence-and-automation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/02\/04\/rsac-2020-empower-your-defenders-with-artificial-intelligence-and-automation\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/02\/Pre-RSA-BANNER-2.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/02\/Pre-RSA-BANNER-2.png\",\"width\":1200,\"height\":630,\"caption\":\"Image of a worker walking through a datacenter.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/02\/04\/rsac-2020-empower-your-defenders-with-artificial-intelligence-and-automation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"RSA Conference 2020\u2014Empower your defenders with artificial intelligence and automation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"RSA Conference 2020\u2014Empower your defenders with artificial intelligence and automation","description":"The RSA Conference 2020 kicks off in less than three weeks\u2014here are a few highlights to help you plan your time.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/02\/04\/rsac-2020-empower-your-defenders-with-artificial-intelligence-and-automation\/","og_locale":"en_US","og_type":"article","og_title":"RSA Conference 2020\u2014Empower your defenders with artificial intelligence and automation","og_description":"The RSA Conference 2020 kicks off in less than three weeks\u2014here are a few highlights to help you plan your time.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/02\/04\/rsac-2020-empower-your-defenders-with-artificial-intelligence-and-automation\/","og_site_name":"Microsoft Security Blog","article_published_time":"2020-02-04T17:00:55+00:00","article_modified_time":"2023-05-16T06:08:49+00:00","og_image":[{"width":2000,"height":1333,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/02\/Pre-RSA-full-size.jpg","type":"image\/jpeg"}],"author":"Microsoft Security Team","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/02\/Pre-RSA-full-size.jpg","twitter_misc":{"Written by":"Microsoft Security Team","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/02\/04\/rsac-2020-empower-your-defenders-with-artificial-intelligence-and-automation\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/02\/04\/rsac-2020-empower-your-defenders-with-artificial-intelligence-and-automation\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/microsoft-secure-blog-staff\/","@type":"Person","@name":"Microsoft Security Team"}],"headline":"RSA Conference 2020\u2014Empower your defenders with artificial intelligence and automation","datePublished":"2020-02-04T17:00:55+00:00","dateModified":"2023-05-16T06:08:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/02\/04\/rsac-2020-empower-your-defenders-with-artificial-intelligence-and-automation\/"},"wordCount":779,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/02\/04\/rsac-2020-empower-your-defenders-with-artificial-intelligence-and-automation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/02\/Pre-RSA-BANNER-2.png","keywords":["Microsoft Security Insights"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/02\/04\/rsac-2020-empower-your-defenders-with-artificial-intelligence-and-automation\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/02\/04\/rsac-2020-empower-your-defenders-with-artificial-intelligence-and-automation\/","name":"RSA Conference 2020\u2014Empower your defenders with artificial intelligence and automation","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/02\/04\/rsac-2020-empower-your-defenders-with-artificial-intelligence-and-automation\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/02\/04\/rsac-2020-empower-your-defenders-with-artificial-intelligence-and-automation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/02\/Pre-RSA-BANNER-2.png","datePublished":"2020-02-04T17:00:55+00:00","dateModified":"2023-05-16T06:08:49+00:00","description":"The RSA Conference 2020 kicks off in less than three weeks\u2014here are a few highlights to help you plan your time.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/02\/04\/rsac-2020-empower-your-defenders-with-artificial-intelligence-and-automation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/02\/04\/rsac-2020-empower-your-defenders-with-artificial-intelligence-and-automation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/02\/04\/rsac-2020-empower-your-defenders-with-artificial-intelligence-and-automation\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/02\/Pre-RSA-BANNER-2.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/02\/Pre-RSA-BANNER-2.png","width":1200,"height":630,"caption":"Image of a worker walking through a datacenter."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/02\/04\/rsac-2020-empower-your-defenders-with-artificial-intelligence-and-automation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"RSA Conference 2020\u2014Empower your defenders with artificial intelligence and automation"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}}]}},"msxcm_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/90535"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=90535"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/90535\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/90564"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=90535"}],"wp:term":[{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=90535"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=90535"},{"taxonomy":"products","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/products?post=90535"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=90535"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/tags?post=90535"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=90535"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}