{"id":91485,"date":"2020-07-02T09:00:59","date_gmt":"2020-07-02T16:00:59","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=91485"},"modified":"2023-05-15T22:58:03","modified_gmt":"2023-05-16T05:58:03","slug":"afternoon-cyber-tea-cybersecurity-iot-new-risks-minimize","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/07\/02\/afternoon-cyber-tea-cybersecurity-iot-new-risks-minimize\/","title":{"rendered":"Afternoon Cyber Tea: Cybersecurity & IoT: New risks and how to minimize them"},"content":{"rendered":"

Recently, Microsoft announced our acquisition of CyberX<\/a>, a comprehensive network-based security platform with continuous threat monitoring and analytics. This solution builds upon our commitment<\/a> to provide a unified IoT security solution that addresses connected devices spread across both industrial and IT environments and provides a trusted, easy-to-use platform for our customers and partners to build connected solutions \u2013 no matter where they are starting in their IoT journey.<\/p>\n

Every year billions of new connected devices come online. These devices enable businesses to finetune operations, optimize processes, and develop analytics-based services. Organizations are clearly benefiting from IoT as shared in the IoT Signals<\/a> research report produced by Microsoft. But while the benefit is great, we must not ignore the potential security risks. To talk about how companies can reduce their risk from connected devices, Dr. Andrea Little Limbago joined me on Cyber Tea with Ann Johnson<\/a>.<\/p>\n

Dr. Andrea Little Limbago is a cybersecurity researcher, quant analyst, and computational social scientist at Virtru. With a background in social science, Andera has a unique perspective that I think you\u2019ll find interesting.<\/p>\n

Andrea and I talked about the role of automation in attacks and defense and how privacy and security advocates can come together to accomplish their overlapping goals. We also talked about how to safeguard your organization when you can\u2019t inventory all your IoT devices.<\/p>\n

It isn\u2019t just businesses that are investing in connected devices. If you have IoT devices in your home, Andrea offered some great advice for protecting your privacy and your data. Listen to Cybersecurity and IoT: New Risks and How to Minimize Them<\/a> to hear our conversation.<\/p>\n

Lack of visibility into the devices currently connected to the network is a widespread problem. Many organizations also struggle to manage security on existing devices. The acquisition of CyberX complements existing Azure IoT security<\/a>\u00a0capabilities. I\u2019m excited because this helps our customers discover their existing IoT assets, and both manage and improve the security posture of those devices. Expect more innovative solutions as we continue to integrate CyberX into Microsoft\u2019s IoT security portfolio.<\/p>\n

What\u2019s next<\/h3>\n

In this important cyber series, I talk with cybersecurity influencers about trends shaping the threat landscape and explore the risk and promise of systems powered by AI, Internet of Things (IoT), and other emerging tech.<\/p>\n

You can listen to Afternoon Cyber Tea with Ann Johnson on:<\/strong><\/p>\n

\u00a7\u00a0 Apple Podcasts<\/a>\u2014You can also download the episode by clicking the Episode Website link.<\/p>\n

\u00a7\u00a0 Podcast One<\/a>\u2014Includes option to subscribe, so you\u2019re notified as soon as new episodes are available.<\/p>\n

\u00a7\u00a0 CISO Spotlight page<\/a>\u2014Listen alongside our CISO Spotlight episodes, where customers and security experts discuss similar topics such as Zero Trust, compliance, going passwordless, and more.<\/p>\n

If you are interested in how businesses across the globe are benefiting from IoT, read IoT Signals<\/a>, a research report produced by Microsoft.<\/p>\n

In the meantime, bookmark the\u00a0Security blog<\/a>\u00a0to keep up with our expert coverage on security matters. Also, follow us at\u00a0@MSFTSecurity<\/a>\u00a0for the latest news and updates on cybersecurity. Or reach out to me on\u00a0LinkedIn<\/a>\u00a0or\u00a0Twitter<\/a>\u00a0if you have guest or topic suggestions.<\/p>\n","protected":false},"excerpt":{"rendered":"

Every year billions of new connected devices come online. These devices enable businesses to finetune operations, optimize processes, and develop analytics-based services.<\/p>\n","protected":false},"author":96,"featured_media":91490,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3660],"topic":[3676,3681],"products":[3690,3699],"threat-intelligence":[],"tags":[],"coauthors":[1849],"class_list":["post-91485","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-events","topic-iot-security","topic-risk-management","products-microsoft-defender","products-microsoft-defender-for-iot"],"yoast_head":"\nAfternoon Cyber Tea: Cybersecurity & IoT: New risks and how to minimize them | Microsoft Security Blog<\/title>\n<meta name=\"description\" content=\"Every year billions of new connected devices come online. These devices enable businesses to finetune operations, optimize processes, and develop analytics-based services.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/07\/02\/afternoon-cyber-tea-cybersecurity-iot-new-risks-minimize\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Afternoon Cyber Tea: Cybersecurity & IoT: New risks and how to minimize them | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"Every year billions of new connected devices come online. These devices enable businesses to finetune operations, optimize processes, and develop analytics-based services.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/07\/02\/afternoon-cyber-tea-cybersecurity-iot-new-risks-minimize\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-02T16:00:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-16T05:58:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/07\/SUR20_Laptop3_Contextual_1739-7-2-FEATURE.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ann Johnson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/07\/SUR20_Laptop3_Contextual_1739-7-2-FEATURE.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ann Johnson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/07\/02\/afternoon-cyber-tea-cybersecurity-iot-new-risks-minimize\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/07\/02\/afternoon-cyber-tea-cybersecurity-iot-new-risks-minimize\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/ann-johnson\/\",\"@type\":\"Person\",\"@name\":\"Ann Johnson\"}],\"headline\":\"Afternoon Cyber Tea: Cybersecurity & IoT: New risks and how to minimize them\",\"datePublished\":\"2020-07-02T16:00:59+00:00\",\"dateModified\":\"2023-05-16T05:58:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/07\/02\/afternoon-cyber-tea-cybersecurity-iot-new-risks-minimize\/\"},\"wordCount\":532,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/07\/02\/afternoon-cyber-tea-cybersecurity-iot-new-risks-minimize\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/07\/SUR20_Laptop3_Contextual_1739-7-2-BANNER.png\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/07\/02\/afternoon-cyber-tea-cybersecurity-iot-new-risks-minimize\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/07\/02\/afternoon-cyber-tea-cybersecurity-iot-new-risks-minimize\/\",\"name\":\"Afternoon Cyber Tea: Cybersecurity & IoT: New risks and how to minimize them | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/07\/02\/afternoon-cyber-tea-cybersecurity-iot-new-risks-minimize\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/07\/02\/afternoon-cyber-tea-cybersecurity-iot-new-risks-minimize\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/07\/SUR20_Laptop3_Contextual_1739-7-2-BANNER.png\",\"datePublished\":\"2020-07-02T16:00:59+00:00\",\"dateModified\":\"2023-05-16T05:58:03+00:00\",\"description\":\"Every year billions of new connected devices come online. These devices enable businesses to finetune operations, optimize processes, and develop analytics-based services.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/07\/02\/afternoon-cyber-tea-cybersecurity-iot-new-risks-minimize\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/07\/02\/afternoon-cyber-tea-cybersecurity-iot-new-risks-minimize\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/07\/02\/afternoon-cyber-tea-cybersecurity-iot-new-risks-minimize\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/07\/SUR20_Laptop3_Contextual_1739-7-2-BANNER.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/07\/SUR20_Laptop3_Contextual_1739-7-2-BANNER.png\",\"width\":500,\"height\":263,\"caption\":\"A photograph of Male working on Surface Laptop 3 in PowerPoint with Surface Mouse and Surface Headphones.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/07\/02\/afternoon-cyber-tea-cybersecurity-iot-new-risks-minimize\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Afternoon Cyber Tea: Cybersecurity & IoT: New risks and how to minimize them\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Afternoon Cyber Tea: Cybersecurity & IoT: New risks and how to minimize them | Microsoft Security Blog","description":"Every year billions of new connected devices come online. These devices enable businesses to finetune operations, optimize processes, and develop analytics-based services.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/07\/02\/afternoon-cyber-tea-cybersecurity-iot-new-risks-minimize\/","og_locale":"en_US","og_type":"article","og_title":"Afternoon Cyber Tea: Cybersecurity & IoT: New risks and how to minimize them | Microsoft Security Blog","og_description":"Every year billions of new connected devices come online. These devices enable businesses to finetune operations, optimize processes, and develop analytics-based services.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/07\/02\/afternoon-cyber-tea-cybersecurity-iot-new-risks-minimize\/","og_site_name":"Microsoft Security Blog","article_published_time":"2020-07-02T16:00:59+00:00","article_modified_time":"2023-05-16T05:58:03+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/07\/SUR20_Laptop3_Contextual_1739-7-2-FEATURE.png","type":"image\/png"}],"author":"Ann Johnson","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/07\/SUR20_Laptop3_Contextual_1739-7-2-FEATURE.png","twitter_misc":{"Written by":"Ann Johnson","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/07\/02\/afternoon-cyber-tea-cybersecurity-iot-new-risks-minimize\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/07\/02\/afternoon-cyber-tea-cybersecurity-iot-new-risks-minimize\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/ann-johnson\/","@type":"Person","@name":"Ann Johnson"}],"headline":"Afternoon Cyber Tea: Cybersecurity & IoT: New risks and how to minimize them","datePublished":"2020-07-02T16:00:59+00:00","dateModified":"2023-05-16T05:58:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/07\/02\/afternoon-cyber-tea-cybersecurity-iot-new-risks-minimize\/"},"wordCount":532,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/07\/02\/afternoon-cyber-tea-cybersecurity-iot-new-risks-minimize\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/07\/SUR20_Laptop3_Contextual_1739-7-2-BANNER.png","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/07\/02\/afternoon-cyber-tea-cybersecurity-iot-new-risks-minimize\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/07\/02\/afternoon-cyber-tea-cybersecurity-iot-new-risks-minimize\/","name":"Afternoon Cyber Tea: Cybersecurity & IoT: New risks and how to minimize them | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/07\/02\/afternoon-cyber-tea-cybersecurity-iot-new-risks-minimize\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/07\/02\/afternoon-cyber-tea-cybersecurity-iot-new-risks-minimize\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/07\/SUR20_Laptop3_Contextual_1739-7-2-BANNER.png","datePublished":"2020-07-02T16:00:59+00:00","dateModified":"2023-05-16T05:58:03+00:00","description":"Every year billions of new connected devices come online. These devices enable businesses to finetune operations, optimize processes, and develop analytics-based services.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/07\/02\/afternoon-cyber-tea-cybersecurity-iot-new-risks-minimize\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/07\/02\/afternoon-cyber-tea-cybersecurity-iot-new-risks-minimize\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/07\/02\/afternoon-cyber-tea-cybersecurity-iot-new-risks-minimize\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/07\/SUR20_Laptop3_Contextual_1739-7-2-BANNER.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/07\/SUR20_Laptop3_Contextual_1739-7-2-BANNER.png","width":500,"height":263,"caption":"A photograph of Male working on Surface Laptop 3 in PowerPoint with Surface Mouse and Surface Headphones."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/07\/02\/afternoon-cyber-tea-cybersecurity-iot-new-risks-minimize\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Afternoon Cyber Tea: Cybersecurity & IoT: New risks and how to minimize them"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}}]}},"msxcm_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/91485"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=91485"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/91485\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/91490"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=91485"}],"wp:term":[{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=91485"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=91485"},{"taxonomy":"products","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/products?post=91485"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=91485"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/tags?post=91485"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=91485"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}