{"id":93361,"date":"2021-04-22T09:00:28","date_gmt":"2021-04-22T16:00:28","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=93361"},"modified":"2023-05-15T23:01:20","modified_gmt":"2023-05-16T06:01:20","slug":"evolving-beyond-password-complexity-as-an-identity-strategy","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/04\/22\/evolving-beyond-password-complexity-as-an-identity-strategy\/","title":{"rendered":"Evolving beyond password complexity as an identity strategy"},"content":{"rendered":"

The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest Voice of the Community blog series post, Microsoft Product Marketing Manager\u00a0Natalia Godyla<\/a>\u00a0talks with\u00a0Troy Hunt<\/a>, founder of\u00a0Have I Been Pwned<\/a>, information security author, and instructor at Pluralsight. In this blog, Troy talks about the future of identity and shares strategies for protecting identities.<\/em><\/em><\/p>\n

Natalia: What threats will be the most important to focus on in the next year?<\/strong><\/p>\n

Troy:<\/strong> We’re seeing more one-time password phishing<\/a>. This is the value proposition of something like U2F, but how do we make phish-resilient authentication mechanisms? The other thing that\u2019s particularly concerning is the rate of SIM card hijacking. It concerns me greatly that it seems to be so prevalent and that it\u2019s so easy, almost by design, to port a SIM from one location to another. As an industry, we need to say, \u201cWhere is the level of identity assurance for a phone number?\u201d Is it very weak or is it very strong, in which case telecommunications companies need legislation to change the ease with which stuff gets ported? Unless we can get people on the same page, we’re going to keep having these problems.<\/p>\n

Natalia: What should IT professionals prioritize?<\/strong><\/p>\n

Troy:<\/strong> I would really like IT professionals to better understand the way humans interact with systems. Everyone says, \u201cJust force people to use two-factor authentication<\/a>.\u201d Do you still want customers? I think every IT professional should have to go through two-factor authentication enrollment with my parents. Everyone should have to learn what it’s like to take non-technical people and try and get some of these things working for them. We can’t just look at these things in a vacuum.<\/p>\n

I think U2F is a brilliant technical solution, but it is such an inherently human-flawed mechanism for many reasons. I have enough trouble trying to get my parents to use SMS-based two-factor authentication. Imagine if I had to tell my parents, \u201cYou’ve now got this little USB-looking thing, and you need to always have it with you in case you need to log into your device.\u201d We have so many good technical solutions that come at the cost of being usable for most humans, myself included on many occasions.<\/p>\n

I’d like us to have a much better understanding of that, which also speaks to solutions like passwordless authentication<\/a>. We need to give more credit to what passwords in the traditional sense do extremely well. The thing that passwords do better than just about everything else is that everyone knows how to use them. It’s like using your date of birth for knowledge-based authentication. It sucks, but every single person knows how to use it, and that makes a really big difference.<\/p>\n

Natalia: What’s the use case for password managers?<\/strong><\/p>\n

Troy:<\/strong> Password managers are a way of storing one-time passcodes (OTPs), but it\u2019s important to recognize that password managers are not just for passwords. I have my credit card details in there, and every time I go to pay at a store, I do the control backslash and automatically fill in the credit card details. I have other secrets in there, like my driver\u2019s license and other data. In many ways, passwords are just one part of the password manager solution, but certainly, for the foreseeable future, we’re going to have passwords so there’s a strong use case for password managers.<\/p>\n

Another use case is a family account. If my partner wants to log into our Netflix account, she has her own identity, but there\u2019s one set of credentials. She asks, \u201cHey Troy, what’s the password for the Netflix account?\u201d It’s a string of gobbledygook. How am I going to get her the password? Do I message it to her, because then it\u2019s in the thread in my unencrypted SMS? But if you have a password manager where you have shared vaults, you can just drop it in the shared vault. That’s another good example of where a password manager is more than just me trying to remember my secrets.<\/p>\n

Natalia: Since we’re likely to continue to use passwords, what controls should we put in place to protect them?<\/strong><\/p>\n

Troy:<\/strong> Ultimately, this password is the key to your identity. We’ve had passwords on computer systems for about 60 years and the era in which they were born was so simple. It was before the internet and before social media and before all these other ways we can lose or disclose them. Over time, we started saying, \u201cLet\u2019s have password complexity rules. More entropy. More entropy equals stronger.\u201d<\/p>\n

When I used to be able to travel and speak to an audience, I\u2019d talk about passwords and password complexity. I\u2019d say, \u201cImagine you want to have a password that is the word \u201cpassword\u201d, and a website says you have to have at least one uppercase character. What do you do? You capitalize the first letter.\u201d Everyone in the audience is laughing nervously and looking at me like, \u201cOh, you figured it out?\u201d I\u2019d tell them, \u201cYou have to have a number. What do you do? You put a one at the end.\u201d And there\u2019s the same nervous laughter. There is this human side that works in complete parallel to the whole mathematics of entropy and having more character types and longer passwords.<\/p>\n

As we’ve progressed, we’ve started to recognize that arbitrary password composition criteria is not a very good thing to do, and we’re looking at whether we can have lists of banned passwords, like passwords from previous data breach corpuses. Are you using a password that is already out there floating around in data breaches? Maybe we will get to a time where this won’t be necessary because we will be truly passwordless. In the interim, I think that having a better understanding of what makes a bad password is important and educating users on this first and foremost.<\/p>\n

Learn more<\/h2>\n

To learn more about Microsoft Security solutions visit our website.<\/a>\u00a0Bookmark the\u00a0Security blog<\/a>\u00a0to keep up with our expert coverage on security matters. Also, follow us at\u00a0@MSFTSecurity<\/a>\u00a0for the latest news and updates on cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"

What\u2019s the future of identity? Have I Been Pwned Founder Troy Hunt shares his insights with Microsoft as well as strategies for protecting identities.<\/p>\n","protected":false},"author":106,"featured_media":93362,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3662],"topic":[3673],"products":[],"threat-intelligence":[],"tags":[3822],"coauthors":[2433,2551],"class_list":["post-93361","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-news","topic-identity-and-access-management","tag-microsoft-security-insights"],"yoast_head":"\nEvolving beyond password complexity as an identity strategy | Microsoft Security Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/04\/22\/evolving-beyond-password-complexity-as-an-identity-strategy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Evolving beyond password complexity as an identity strategy | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"What\u2019s the future of identity? Have I Been Pwned Founder Troy Hunt shares his insights with Microsoft as well as strategies for protecting identities.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/04\/22\/evolving-beyond-password-complexity-as-an-identity-strategy\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-22T16:00:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-16T06:01:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/04\/SUR20_ProX_Contextual_00336_RGB.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1152\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Natalia Godyla, Troy Hunt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/04\/SUR20_ProX_Contextual_00336_RGB.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Natalia Godyla, Troy Hunt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/04\/22\/evolving-beyond-password-complexity-as-an-identity-strategy\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/04\/22\/evolving-beyond-password-complexity-as-an-identity-strategy\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/natalia-godyla\/\",\"@type\":\"Person\",\"@name\":\"Natalia Godyla\"},{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/troy-hunt\/\",\"@type\":\"Person\",\"@name\":\"Troy Hunt\"}],\"headline\":\"Evolving beyond password complexity as an identity strategy\",\"datePublished\":\"2021-04-22T16:00:28+00:00\",\"dateModified\":\"2023-05-16T06:01:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/04\/22\/evolving-beyond-password-complexity-as-an-identity-strategy\/\"},\"wordCount\":1068,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/04\/22\/evolving-beyond-password-complexity-as-an-identity-strategy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/04\/SUR20_ProX_Contextual_00336_RGB.jpg\",\"keywords\":[\"Microsoft Security Insights\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/04\/22\/evolving-beyond-password-complexity-as-an-identity-strategy\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/04\/22\/evolving-beyond-password-complexity-as-an-identity-strategy\/\",\"name\":\"Evolving beyond password complexity as an identity strategy | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/04\/22\/evolving-beyond-password-complexity-as-an-identity-strategy\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/04\/22\/evolving-beyond-password-complexity-as-an-identity-strategy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/04\/SUR20_ProX_Contextual_00336_RGB.jpg\",\"datePublished\":\"2021-04-22T16:00:28+00:00\",\"dateModified\":\"2023-05-16T06:01:20+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/04\/22\/evolving-beyond-password-complexity-as-an-identity-strategy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/04\/22\/evolving-beyond-password-complexity-as-an-identity-strategy\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/04\/22\/evolving-beyond-password-complexity-as-an-identity-strategy\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/04\/SUR20_ProX_Contextual_00336_RGB.jpg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/04\/SUR20_ProX_Contextual_00336_RGB.jpg\",\"width\":1152,\"height\":768,\"caption\":\"Adult female standing at the back of a pickup truck using a black Microsoft Surface Pro X in laptop mode with Microsoft Edge screen shown.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/04\/22\/evolving-beyond-password-complexity-as-an-identity-strategy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Evolving beyond password complexity as an identity strategy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Evolving beyond password complexity as an identity strategy | Microsoft Security Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/04\/22\/evolving-beyond-password-complexity-as-an-identity-strategy\/","og_locale":"en_US","og_type":"article","og_title":"Evolving beyond password complexity as an identity strategy | Microsoft Security Blog","og_description":"What\u2019s the future of identity? Have I Been Pwned Founder Troy Hunt shares his insights with Microsoft as well as strategies for protecting identities.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/04\/22\/evolving-beyond-password-complexity-as-an-identity-strategy\/","og_site_name":"Microsoft Security Blog","article_published_time":"2021-04-22T16:00:28+00:00","article_modified_time":"2023-05-16T06:01:20+00:00","og_image":[{"width":1152,"height":768,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/04\/SUR20_ProX_Contextual_00336_RGB.jpg","type":"image\/jpeg"}],"author":"Natalia Godyla, Troy Hunt","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/04\/SUR20_ProX_Contextual_00336_RGB.jpg","twitter_misc":{"Written by":"Natalia Godyla, Troy Hunt","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/04\/22\/evolving-beyond-password-complexity-as-an-identity-strategy\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/04\/22\/evolving-beyond-password-complexity-as-an-identity-strategy\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/natalia-godyla\/","@type":"Person","@name":"Natalia Godyla"},{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/troy-hunt\/","@type":"Person","@name":"Troy Hunt"}],"headline":"Evolving beyond password complexity as an identity strategy","datePublished":"2021-04-22T16:00:28+00:00","dateModified":"2023-05-16T06:01:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/04\/22\/evolving-beyond-password-complexity-as-an-identity-strategy\/"},"wordCount":1068,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/04\/22\/evolving-beyond-password-complexity-as-an-identity-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/04\/SUR20_ProX_Contextual_00336_RGB.jpg","keywords":["Microsoft Security Insights"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/04\/22\/evolving-beyond-password-complexity-as-an-identity-strategy\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/04\/22\/evolving-beyond-password-complexity-as-an-identity-strategy\/","name":"Evolving beyond password complexity as an identity strategy | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/04\/22\/evolving-beyond-password-complexity-as-an-identity-strategy\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/04\/22\/evolving-beyond-password-complexity-as-an-identity-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/04\/SUR20_ProX_Contextual_00336_RGB.jpg","datePublished":"2021-04-22T16:00:28+00:00","dateModified":"2023-05-16T06:01:20+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/04\/22\/evolving-beyond-password-complexity-as-an-identity-strategy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/04\/22\/evolving-beyond-password-complexity-as-an-identity-strategy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/04\/22\/evolving-beyond-password-complexity-as-an-identity-strategy\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/04\/SUR20_ProX_Contextual_00336_RGB.jpg","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/04\/SUR20_ProX_Contextual_00336_RGB.jpg","width":1152,"height":768,"caption":"Adult female standing at the back of a pickup truck using a black Microsoft Surface Pro X in laptop mode with Microsoft Edge screen shown."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/04\/22\/evolving-beyond-password-complexity-as-an-identity-strategy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Evolving beyond password complexity as an identity strategy"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}}]}},"msxcm_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/93361"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/106"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=93361"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/93361\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/93362"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=93361"}],"wp:term":[{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=93361"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=93361"},{"taxonomy":"products","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/products?post=93361"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=93361"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/tags?post=93361"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=93361"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}