{"id":22981,"date":"2023-01-15T10:27:57","date_gmt":"2023-01-15T17:27:57","guid":{"rendered":"https:\/\/sn1persecurity.com\/wordpress\/?p=22981"},"modified":"2023-06-15T10:29:48","modified_gmt":"2023-06-15T17:29:48","slug":"attack-surface-platform","status":"publish","type":"post","link":"https:\/\/sn1persecurity.com\/wordpress\/attack-surface-platform\/","title":{"rendered":"Attack Surface Management Platform &#8211; Enhancing Your Security"},"content":{"rendered":"<p>In today&#8217;s rapidly evolving digital landscape, ensuring the security of your organization&#8217;s data and infrastructure is of utmost importance. With the increasing number of cyber threats and vulnerabilities, it has become essential for businesses to proactively manage their attack surface. This is where an Attack Surface Management (ASM) platform comes into play. In this article, we will explore how an ASM platform can enhance your security and protect your valuable assets.<\/p>\n<p><!--more--><\/p>\n<h2>Understanding the Attack Surface<\/h2>\n<p>Before delving into the benefits of an ASM platform, let&#8217;s first understand what the attack surface represents. The attack surface refers to the sum of all the vulnerabilities and entry points that attackers can exploit to gain unauthorized access to your systems or sensitive information. These vulnerabilities can exist in various forms, such as unpatched software, misconfigured applications, or weak user credentials.<\/p>\n<h2>The Role of an ASM Platform<\/h2>\n<p>An Attack Surface Management platform is a comprehensive solution designed to identify, assess, and manage the vulnerabilities within your organization&#8217;s attack surface. It provides you with a holistic view of your digital footprint, allowing you to gain insights into potential weaknesses and devise effective strategies to mitigate risks.<\/p>\n<h3>Vulnerability Discovery and Assessment<\/h3>\n<p>One of the key features of an ASM platform is its ability to discover vulnerabilities across your entire attack surface. Through automated scanning and continuous monitoring, the platform identifies weak points in your systems and applications. It assesses their severity and provides you with detailed reports and actionable recommendations for remediation.<\/p>\n<h3>Centralized Visibility and Control<\/h3>\n<p>An ASM platform brings all the relevant security data into a centralized dashboard, giving you complete visibility and control over your attack surface. It enables you to monitor the security posture of your assets in real-time, track remediation efforts, and prioritize vulnerabilities based on their impact. This centralized approach allows for efficient collaboration among different teams within your organization, streamlining the security management process.<\/p>\n<h3>Risk Prioritization and Mitigation<\/h3>\n<p>Not all vulnerabilities pose the same level of risk to your organization. An ASM platform helps you prioritize vulnerabilities based on their severity, exploitability, and potential impact. By focusing on the most critical risks first, you can allocate your resources effectively and address the vulnerabilities that could have the most significant consequences.<\/p>\n<h3>Continuous Monitoring and Compliance<\/h3>\n<p>Security threats are ever-evolving, and new vulnerabilities can emerge at any time. An ASM platform ensures continuous monitoring of your attack surface, keeping you informed about new threats and vulnerabilities as they arise. It helps you stay compliant with industry regulations and best practices by providing automated checks and validation against security standards.<\/p>\n<h2>The Benefits of an ASM Platform<\/h2>\n<p>Implementing an ASM platform offers several benefits for your organization&#8217;s security posture:<\/p>\n<h3>Proactive Risk Management<\/h3>\n<p>By utilizing an ASM platform, you adopt a proactive approach to risk management. Instead of waiting for a security breach to occur, you can identify vulnerabilities in advance and take appropriate measures to mitigate them. This proactive stance significantly reduces the chances of successful attacks and minimizes potential damage.<\/p>\n<h3>Enhanced Incident Response<\/h3>\n<p>In the unfortunate event of a security incident, an ASM platform empowers your incident response team with valuable insights. It helps them quickly identify the root cause, assess the impact, and take prompt actions to contain and remediate the situation. The platform&#8217;s comprehensive visibility ensures that no critical vulnerabilities go unnoticed.<\/p>\n<h3>Cost and Resource Optimization<\/h3>\n<p>With an ASM platform, you can optimize your security-related costs and resource allocation. By identifying and prioritizing vulnerabilities, you can allocate your resources efficiently, focusing on areas that require immediate attention. This approach minimizes unnecessary expenditures on less critical aspects and allows you to make the most out of your security investments.<\/p>\n<h3>Regulatory Compliance<\/h3>\n<p>Compliance with industry regulations is vital for organizations across various sectors. An ASM platform assists you in meeting compliance requirements by continuously monitoring your attack surface and providing you with the necessary tools and reports for compliance audits. This helps you avoid penalties, reputational damage, and potential legal consequences.<\/p>\n<h2>Automated Penetration Testing and Attack Surface Management<\/h2>\n<p>Integrating <a href=\"https:\/\/sn1persecurity.com\/wordpress\/penetration-testing-guide\/\">automated penetration testing<\/a> with attack surface management enhances security measures. It uses advanced tools to simulate real-world attacks and identify vulnerabilities. This integration provides a comprehensive view of the attack surface, enabling proactive identification and addressing of weaknesses. Continuous monitoring and assessment ensure timely remediation actions to strengthen defenses. <a href=\"https:\/\/sn1persecurity.com\/wordpress\/penetration-testing-guide\/\">Automated penetration testing<\/a> integrated into attack surface management keeps organizations ahead of attackers, minimizing cyberattack risks.<\/p>\n<h2>Dark Web Monitoring and Attack Surface Management<\/h2>\n<p><a href=\"https:\/\/sn1persecurity.com\/wordpress\/dark-web-monitoring-securing-your-external-attack-surface\/\">Dark Web Monitoring<\/a> and Attack Surface Management work together to enhance organizational security. By monitoring the dark web, organizations can track illicit activities such as compromised credentials and URL&#8217;s affecting their attack surface and take proactive steps to mitigate any risks. Attack Surface Management helps organizations identify vulnerabilities to get an attacker&#8217;s view of their organization and any weaknesses. Together, they provide proactive protection against cyber threats.<\/p>\n<h2>Conclusion<\/h2>\n<p>In an increasingly interconnected world, protecting your organization&#8217;s digital assets from cyber threats is paramount. An Attack Surface Management platform offers a proactive and comprehensive approach to security. By leveraging the capabilities of an ASM platform, you can enhance your security posture, minimize risks, and ensure the integrity of your systems and data. Invest in an ASM platform today to safeguard your organization&#8217;s future in the face of evolving cybersecurity challenges.<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<h3>The Ultimate &#8220;all-in-one&#8221; Attack Surface Management Platform!<\/h3>\n<p>See how <a href=\"https:\/\/sn1persecurity.com\/wordpress\/product\/sn1per-enterprise\/\"><strong>Sn1per Enterprise<\/strong><\/a> can help your security team perform attack surface management by checking our <a href=\"https:\/\/www.youtube.com\/watch?v=NqyDMD7Y84k\" target=\"_blank\" rel=\"noopener\">demo<\/a> video below or head over to our <a href=\"https:\/\/sn1persecurity.com\/wordpress\/shop\/\">shop<\/a> to <a href=\"https:\/\/sn1persecurity.com\/wordpress\/request-a-quote\/\">request a quote<\/a> or <a href=\"https:\/\/sn1persecurity.com\/wordpress\/sn1per-enterprise-released\/\">find out more<\/a> today!<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/clWiTsdiWGU?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\"><\/iframe><\/span><\/p>\n<div id=\"wp-share-button-22981\" class=\"wp-share-button theme28\"><span class=\"total-share \"><i class=\"total-count-text\">Total Share<\/i> <i class=\"total-count\">5<\/i> <\/span><a target=\"_blank\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/sn1persecurity.com\/wordpress\/attack-surface-platform\/\" class=\"share-button share-button-22981 facebook\" id=\"facebook\" data-nonce=\"c9205542fb\">\r\n\r\n<span class=\"button-icon\"><\/span>\r\n<span class=\"button-name\">Facebook<\/span>\r\n\r\n<span class=\"button-count\">4<\/span>\r\n\r\n<\/a>\r\n\r\n<a target=\"_blank\" href=\"https:\/\/twitter.com\/intent\/tweet?url=https:\/\/sn1persecurity.com\/wordpress\/attack-surface-platform\/&#038;text=Attack%20Surface%20Management%20Platform%20&#8211;%20Enhancing%20Your%20Security\" class=\"share-button share-button-22981 twitter\" id=\"twitter\" data-nonce=\"c9205542fb\">\r\n\r\n<span class=\"button-icon\"><\/span>\r\n<span class=\"button-name\">Twitter<\/span>\r\n\r\n<span class=\"button-count\">0<\/span>\r\n\r\n<\/a>\r\n\r\n<a target=\"_blank\" href=\"http:\/\/www.reddit.com\/submit?title=Attack%20Surface%20Management%20Platform%20&#8211;%20Enhancing%20Your%20Security&#038;url=https:\/\/sn1persecurity.com\/wordpress\/attack-surface-platform\/\" class=\"share-button share-button-22981 reddit\" id=\"reddit\" data-nonce=\"c9205542fb\">\r\n\r\n<span class=\"button-icon\"><\/span>\r\n<span class=\"button-name\">Reddit<\/span>\r\n\r\n<span class=\"button-count\">1<\/span>\r\n\r\n<\/a>\r\n\r\n<a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/shareArticle?url=https:\/\/sn1persecurity.com\/wordpress\/attack-surface-platform\/&#038;title=Attack%20Surface%20Management%20Platform%20&#8211;%20Enhancing%20Your%20Security&#038;summary=&#038;source=\" class=\"share-button share-button-22981 linkedin\" id=\"linkedin\" data-nonce=\"c9205542fb\">\r\n\r\n<span class=\"button-icon\"><\/span>\r\n<span class=\"button-name\">Linkedin<\/span>\r\n\r\n<span class=\"button-count\">0<\/span>\r\n\r\n<\/a>\r\n\r\n<a title=\"More...\" href=\"#wp-share-button-22981\" class=\"share-button-more\"><span class=\"button-icon\"><i class=\"fa fa-plus\"><\/i><\/span><\/a><div class=\"wp-share-button-popup wp-share-button-popup-22981\"><div class=\"popup-buttons\"><span class=\"close\">X<\/span><a target=\"_blank\" href=\"mailto:?subject=Attack%20Surface%20Management%20Platform%20&#8211;%20Enhancing%20Your%20Security&#038;body=https:\/\/sn1persecurity.com\/wordpress\/attack-surface-platform\/\" class=\"share-button share-button-22981 email\" id=\"email\">\r\n\r\n<span class=\"button-icon\"><\/span>\r\n<span class=\"button-name\">Email<\/span>\r\n<span class=\"button-count\">0<\/span>\t\t\t\t\r\n\r\n<\/a>\r\n<\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>In today&#8217;s rapidly evolving digital landscape, ensuring the security of your organization&#8217;s data and infrastructure is of utmost importance. With the increasing number [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":19952,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[290,333,289,1,335],"tags":[348,349,351,350,322,38,37],"class_list":["post-22981","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-attack-surface-management","category-dark-web-monitoring","category-penetration-testing","category-uncategorized","category-vulnerability-scanning","tag-asm","tag-attack-surface-management-platform","tag-automated-penetration-testing","tag-dark-web-monitoring","tag-enterprise","tag-professional","tag-sn1per"],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Attack-Surface-Management-with-Sn1per-Enterprise.png","jetpack_shortlink":"https:\/\/wp.me\/pdnW96-5YF","jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":14967,"url":"https:\/\/sn1persecurity.com\/wordpress\/continuous-attack-surface-management-with-sn1per-professional\/","url_meta":{"origin":22981,"position":0},"title":"Attack Surface Management With Sn1per Professional","author":"xer0dayz","date":"February 8, 2021","format":false,"excerpt":"External Attack Surface Management (EASM) has become a crucial function for every organization to gain visibility of their perimeter security. Having the right tools and processes in place is vital to detecting new vulnerabilities before attackers do. In this blog post, we will outline the basic steps for discovering the\u2026","rel":"","context":"In &quot;Attack Surface Management&quot;","block_context":{"text":"Attack Surface Management","link":"https:\/\/sn1persecurity.com\/wordpress\/category\/attack-surface-management\/"},"img":{"alt_text":"Sn1per Professional Continuous Attack Surface Testing","src":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/Sn1per-Professional-Continuous-Attack-Surface-Testing.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/Sn1per-Professional-Continuous-Attack-Surface-Testing.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/Sn1per-Professional-Continuous-Attack-Surface-Testing.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/Sn1per-Professional-Continuous-Attack-Surface-Testing.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/Sn1per-Professional-Continuous-Attack-Surface-Testing.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/Sn1per-Professional-Continuous-Attack-Surface-Testing.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":19913,"url":"https:\/\/sn1persecurity.com\/wordpress\/external-attack-surface-management-with-sn1per\/","url_meta":{"origin":22981,"position":1},"title":"External Attack Surface Management with Sn1per","author":"xer0dayz","date":"September 12, 2022","format":false,"excerpt":"In the world of cybersecurity, it's important to constantly be on the lookout for new threats. One way to do this is by keeping an eye on your organization's external attack surface. Your external attack surface is the sum total of all the ways a hacker could potentially gain access\u2026","rel":"","context":"In &quot;Attack Surface Management&quot;","block_context":{"text":"Attack Surface Management","link":"https:\/\/sn1persecurity.com\/wordpress\/category\/attack-surface-management\/"},"img":{"alt_text":"External Attack Surface Management with Sn1per Enterprise","src":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Attack-Surface-Management-with-Sn1per-Enterprise.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Attack-Surface-Management-with-Sn1per-Enterprise.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Attack-Surface-Management-with-Sn1per-Enterprise.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Attack-Surface-Management-with-Sn1per-Enterprise.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Attack-Surface-Management-with-Sn1per-Enterprise.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Attack-Surface-Management-with-Sn1per-Enterprise.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":22488,"url":"https:\/\/sn1persecurity.com\/wordpress\/dark-web-monitoring-securing-your-external-attack-surface\/","url_meta":{"origin":22981,"position":2},"title":"Dark Web Monitoring: Securing Your External Attack Surface","author":"xer0dayz","date":"May 4, 2023","format":false,"excerpt":"In today's digital era, data breaches and cyber-attacks are increasing day by day, and with the increasing amount of data being stored and transmitted online, the threat is real. Hackers and cybercriminals are constantly looking for vulnerabilities to exploit in your organization's system. With the advent of the dark web,\u2026","rel":"","context":"In &quot;Attack Surface Management&quot;","block_context":{"text":"Attack Surface Management","link":"https:\/\/sn1persecurity.com\/wordpress\/category\/attack-surface-management\/"},"img":{"alt_text":"Dark Web Monitoring","src":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2023\/05\/Dark-Web-Monitoring.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2023\/05\/Dark-Web-Monitoring.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2023\/05\/Dark-Web-Monitoring.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2023\/05\/Dark-Web-Monitoring.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2023\/05\/Dark-Web-Monitoring.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2023\/05\/Dark-Web-Monitoring.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":20085,"url":"https:\/\/sn1persecurity.com\/wordpress\/5-ways-sn1per-can-automate-your-security-workflow\/","url_meta":{"origin":22981,"position":3},"title":"5 Ways Sn1per Can Automate Your Security Workflow","author":"xer0dayz","date":"September 20, 2022","format":false,"excerpt":"If you're in the security field, you know that there are a lot of moving parts to keep track of. It can be tough to stay on top of everything, and even tougher to find the time to do it all manually. That's where Sn1per comes in - it's a\u2026","rel":"","context":"In &quot;Attack Surface Management&quot;","block_context":{"text":"Attack Surface Management","link":"https:\/\/sn1persecurity.com\/wordpress\/category\/attack-surface-management\/"},"img":{"alt_text":"Automate Your Security Workflow with Sn1per","src":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Automate-Your-Security-Workflow-with-Sn1per.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Automate-Your-Security-Workflow-with-Sn1per.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Automate-Your-Security-Workflow-with-Sn1per.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Automate-Your-Security-Workflow-with-Sn1per.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":15445,"url":"https:\/\/sn1persecurity.com\/wordpress\/passive-reconnaissance-techniques-for-penetration-testing\/","url_meta":{"origin":22981,"position":4},"title":"Passive Reconnaissance Techniques For Penetration Testing","author":"xer0dayz","date":"April 19, 2021","format":false,"excerpt":"As a top ranked bug bounty researcher and Sr. Penetration Tester, I've discovered some critical vulnerabilities without ever directly accessing or scanning the target in question. These vulnerabilities are typically found by querying 3rd party services to discover cached and historic URL's from a target and searching interesting URL's. In\u2026","rel":"","context":"In &quot;Attack Surface Management&quot;","block_context":{"text":"Attack Surface Management","link":"https:\/\/sn1persecurity.com\/wordpress\/category\/attack-surface-management\/"},"img":{"alt_text":"Passive Attack Surface Reconnaissance","src":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/06\/Passive-Attack-Surface-Reconnaissance2.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/06\/Passive-Attack-Surface-Reconnaissance2.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/06\/Passive-Attack-Surface-Reconnaissance2.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/06\/Passive-Attack-Surface-Reconnaissance2.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/06\/Passive-Attack-Surface-Reconnaissance2.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/06\/Passive-Attack-Surface-Reconnaissance2.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":58323,"url":"https:\/\/sn1persecurity.com\/wordpress\/sn1per-se-v11-released\/","url_meta":{"origin":22981,"position":5},"title":"\ud83d\udd25 Sn1per SE v11.0 Now Available \u2013 Major Refactor, New Tools, Faster Recon, Smarter Resumes","author":"xer0dayz","date":"January 8, 2026","format":false,"excerpt":"We\u2019re excited to announce the release of Sn1per SE v11.0, a major update that delivers a fully refactored codebase, new reconnaissance and vulnerability scanning tools, and powerful scan resume and debugging capabilities. This release focuses on stability, performance, and visibility, making large-scale penetration testing, red teaming, and continuous security assessments\u2026","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/sn1persecurity.com\/wordpress\/category\/news\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2025\/02\/Sn1per-SE-Update.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2025\/02\/Sn1per-SE-Update.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2025\/02\/Sn1per-SE-Update.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2025\/02\/Sn1per-SE-Update.png?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/posts\/22981","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/comments?post=22981"}],"version-history":[{"count":5,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/posts\/22981\/revisions"}],"predecessor-version":[{"id":22987,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/posts\/22981\/revisions\/22987"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/media\/19952"}],"wp:attachment":[{"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/media?parent=22981"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/categories?post=22981"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/tags?post=22981"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}