{"id":46030,"date":"2015-11-06T11:19:16","date_gmt":"2015-11-06T19:19:16","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=46030"},"modified":"2025-05-27T22:55:35","modified_gmt":"2025-05-28T05:55:35","slug":"beware-rapid-proliferation-cyber-warfare-capabilities","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beware-rapid-proliferation-cyber-warfare-capabilities\/","title":{"rendered":"Beware the Rapid Proliferation of Cyber-warfare Capabilities"},"content":{"rendered":"<p>Governments across the globe continue to invest in cyber warfare operations.\u00a0\u00a0 Over 60 countries, a number that is rising, currently have some mechanism to play in the digital warfare and intelligence gathering game.\u00a0 This posturing has a very real consequence to everyday individuals and businesses.<\/p>\n<p>The global arms race has begun and it is not limited to just world powers.\u00a0 For countries with less resources, cyber warfare holds the lure of being a great equalizer, where they can compete on a larger stage where factors such as size or geographical location are less important.\u00a0 Most countries see it as a necessity for continuing intelligence-gathering activities.\u00a0 Knowing what other countries are up to, both friend and foe alike, reduces the chance of unpleasant surprises.\u00a0 For an elite few, who seek to operationalize and integrate the military capabilities, it is a natural extension of national policy, complementing options like weapon sales, economic influence, or deployment of military forces around the globe as part of force projection.\u00a0 No matter the reason, the world is in a cyber-arms race.\u00a0 But this race is far different than the escalation of traditional weapons.\u00a0 Unlike conventional arsenals, software and code are ethereal.\u00a0 Once released to the Internet or deployed against a target, they can be easily captured, transferred, reverse engineered, and duplicated.\u00a0 The tools may very well fall into the hands of criminals or other attackers, to be mass-produced and then used against everyday people and businesses.<\/p>\n<p><a href=\"http:\/\/www.wsj.com\/\">The Wall Street Journal<\/a> published a pair of great articles, which highlight the rapid proliferation of worldwide government cyber-warfare capabilities.\u00a0 The first, <a href=\"http:\/\/www.wsj.com\/articles\/cataloging-the-worlds-cyberforces-1444610710\">Cataloging the World\u2019s Cyberforces<\/a> (<em>may require subscription<\/em>), outlines the more than 60 countries which are developing such weapons.\u00a0 The second, <a href=\"http:\/\/www.wsj.com\/articles\/cyberwar-ignites-a-new-arms-race-1444611128\">Cyberwar Ignites a New Arms Race<\/a> (<em>may require subscription<\/em>) speaks to the technology escalation, which is emerging to dominate the cyber battlefield.\u00a0 With the intensity and investment growing, it is inevitable to spill over into the normal world where we all digitally exist.<\/p>\n<h2>The Journal\u2019s research shows:<\/h2>\n<p>29 countries have formal cyber offensive military or intelligence teams<\/p>\n<p>49 countries purchase offensive cyber tools<\/p>\n<p>63 countries leverage tools for either foreign or domestic surveillance<\/p>\n<p>These articles highlight the professional military side of cybersecurity.\u00a0 More and more the gap is growing between government and civilian capabilities in the world of cyber.\u00a0 With the tremendous financial, intellectual, and human-resource investments, military organizations will have a solid set of combined capabilities.\u00a0 Structures are maturing quickly with budgets now in the billions of dollars and entire career paths defined to ensure sustainable operational stability.\u00a0 Cyber is now the fifth operational domain, joining land, air, sea, and space warfare.<\/p>\n<p>The major difference in this arms race is the cascade effects of weapons which leads to unintended consequences.\u00a0 Once a cyber-weapon is unleashed, the world can grab it and reverse-engineer it to use exploit code, identify previously unknown vulnerabilities, and mimic innovative ways to remain stealthy and persistent.\u00a0 If it is made widely available, which is a normal occurrence, then everyone, even down to the lowly script-kiddie, can use the pieces for their twisted purposes.\u00a0 We have seen this in the past, where parts of professional grade code were harvested and reused in other malware.\u00a0 So the risk is great that at the very least, elements of military grade cyberweapons will eventually filter down to criminals and other malicious parties and turned against businesses, civilians, and other targets.\u00a0 This is the unintentional consequence to digital warfare.<\/p>\n<p>The question remains, will governments deploy them, knowing their creations might eventually be used to the detriment of innocent targets and critical infrastructures?\u00a0 That decision, just like any offensive maneuver, is made based upon the evaluation of value, risks, and consequences for any given situation.\u00a0 I would argue these investments are being made for a number of reasons with the overall intent of being used to gain an advantage.\u00a0 As John Paul Jones famously said, \u201c<em>It seems to be a law of nature, inflexible and inexorable, that those who will not risk cannot win<\/em>.\u201d\u00a0 For governments, it is their job to protect an entire nation, its people, interests, and allies.\u00a0 No easy task.\u00a0 Many are investing in cyber as a means of conducting surveillance, to deface or persuade others, and cause directed damage.\u00a0 This is just the beginning of the digital arms race, where the rules of engagement are not yet codified.<\/p>\n<p>The last time I spoke to the government types, I made one recommendation abundantly clear.\u00a0 \u201cAnytime you choose to make a cyberweapon, you better make the antidote at the same time.\u00a0 For it will be captured, reverse-engineered, and turned against its creators, their allies, and other bystanders.\u00a0 Be prepared.\u00a0 Predict it will happen and know how to detect, prevent, and respond when it come back to haunt you and the rest of the world.\u201d\u00a0 The message continues to hold true.\u00a0 It is a brave new world where cybersecurity professionals defending civilian organizations will find the challenges to grow quickly as nation-states become more advanced.\u00a0 It is just the nature of things.<\/p>\n<p>Offensive cyber is changing the security industry. As security professionals, tasked to protect individuals, businesses, and infrastructures, we must all be cognizant of the actions of these nation-states.\u00a0 What they develop today, may trickle down and find its way as a problem in our cybersecurity world tomorrow.\u00a0 It is tough enough to maintain parity with everyday hackers and organized criminals.\u00a0 Superweapons, created or funded with obscene resources by governments, would challenge even the most elite security operations team on their best day.\u00a0 As professionals, we must understand and be ready as the cyber arms race continues to escalate, as it will significantly change the equilibrium of computer security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Governments across the globe continue to invest in cyber warfare operations.\u00a0\u00a0 Over 60 countries, a number that is rising, currently&#8230;<\/p>\n","protected":false},"author":695,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[1814,4452],"coauthors":[4136],"class_list":["post-46030","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-computer-security","tag-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Beware the Rapid Proliferation of Cyber-warfare Capabilities<\/title>\n<meta name=\"description\" content=\"Over 60 countries, a number that is rising, currently have some mechanism to play in the digital warfare and intelligence gathering game.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Beware the Rapid Proliferation of Cyber-warfare Capabilities\" \/>\n<meta property=\"og:description\" content=\"Over 60 countries, a number that is rising, currently have some mechanism to play in the digital warfare and intelligence gathering game.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beware-rapid-proliferation-cyber-warfare-capabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-11-06T19:19:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-28T05:55:35+00:00\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beware-rapid-proliferation-cyber-warfare-capabilities\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beware-rapid-proliferation-cyber-warfare-capabilities\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"Beware the Rapid Proliferation of Cyber-warfare Capabilities\",\"datePublished\":\"2015-11-06T19:19:16+00:00\",\"dateModified\":\"2025-05-28T05:55:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beware-rapid-proliferation-cyber-warfare-capabilities\/\"},\"wordCount\":946,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"keywords\":[\"computer security\",\"cybersecurity\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beware-rapid-proliferation-cyber-warfare-capabilities\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beware-rapid-proliferation-cyber-warfare-capabilities\/\",\"name\":\"Beware the Rapid Proliferation of Cyber-warfare Capabilities\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"datePublished\":\"2015-11-06T19:19:16+00:00\",\"dateModified\":\"2025-05-28T05:55:35+00:00\",\"description\":\"Over 60 countries, a number that is rising, currently have some mechanism to play in the digital warfare and intelligence gathering game.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beware-rapid-proliferation-cyber-warfare-capabilities\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beware-rapid-proliferation-cyber-warfare-capabilities\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beware-rapid-proliferation-cyber-warfare-capabilities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Beware the Rapid Proliferation of Cyber-warfare Capabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Beware the Rapid Proliferation of Cyber-warfare Capabilities","description":"Over 60 countries, a number that is rising, currently have some mechanism to play in the digital warfare and intelligence gathering game.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Beware the Rapid Proliferation of Cyber-warfare Capabilities","og_description":"Over 60 countries, a number that is rising, currently have some mechanism to play in the digital warfare and intelligence gathering game.","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beware-rapid-proliferation-cyber-warfare-capabilities\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2015-11-06T19:19:16+00:00","article_modified_time":"2025-05-28T05:55:35+00:00","author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beware-rapid-proliferation-cyber-warfare-capabilities\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beware-rapid-proliferation-cyber-warfare-capabilities\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"Beware the Rapid Proliferation of Cyber-warfare Capabilities","datePublished":"2015-11-06T19:19:16+00:00","dateModified":"2025-05-28T05:55:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beware-rapid-proliferation-cyber-warfare-capabilities\/"},"wordCount":946,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"keywords":["computer security","cybersecurity"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beware-rapid-proliferation-cyber-warfare-capabilities\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beware-rapid-proliferation-cyber-warfare-capabilities\/","name":"Beware the Rapid Proliferation of Cyber-warfare Capabilities","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"datePublished":"2015-11-06T19:19:16+00:00","dateModified":"2025-05-28T05:55:35+00:00","description":"Over 60 countries, a number that is rising, currently have some mechanism to play in the digital warfare and intelligence gathering game.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beware-rapid-proliferation-cyber-warfare-capabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beware-rapid-proliferation-cyber-warfare-capabilities\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beware-rapid-proliferation-cyber-warfare-capabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Beware the Rapid Proliferation of Cyber-warfare Capabilities"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/46030","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=46030"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/46030\/revisions"}],"predecessor-version":[{"id":214574,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/46030\/revisions\/214574"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=46030"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=46030"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=46030"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=46030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}