{"id":49841,"date":"2016-05-24T11:20:54","date_gmt":"2016-05-24T18:20:54","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=49841"},"modified":"2025-06-08T19:55:07","modified_gmt":"2025-06-09T02:55:07","slug":"which-cybersecurity-data-should-you-trust","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/which-cybersecurity-data-should-you-trust\/","title":{"rendered":"Which Cybersecurity Data Should You Trust?"},"content":{"rendered":"<h2><strong>Limitations of security data<br \/>\n<\/strong><\/h2>\n<p>We are constantly battered\u00a0by cybersecurity data, reports, and marketing collateral\u2014and we shouldn&#8217;t treat all of this information equally. Security data has inherent limitations and biases, which result in varying value and relevance in how it should be applied.\u00a0It is important to understand which data is significant and how best to allow it to influence your decisions.<\/p>\n<p>A\u00a0tsunami of security metrics, reports, analyses, blogs, papers, and articles vie for our attention.\u00a0Sources range from reporters, researchers, professional security teams, consultants, dedicated marketing groups, and even security-operations people who are adding data, figures, and opinions to the cauldron.\u00a0We are flooded with data and opinions.<\/p>\n<p>It was not always this way. More than a decade ago, we lived in\u00a0an information desert, where even speculations were rare.\u00a0Making decisions driven by data has always been a good practice. Years ago, many advocates were working hard to convince the industry to share information.\u00a0Even a drop is better than none. Most groups that were capturing metrics were too frightened or embarrassed to share. Data was kept secret by everyone while decision makers were clamoring for security insights based upon industry numbers, which simply were not available.<\/p>\n<h2><strong>The impact of data secrecy<br \/>\n<\/strong><\/h2>\n<p>In the past, fear, uncertainty, and doubt ruled.\u00a0People expected the worst and unscrupulous security marketing advocates took advantage, fanning the flames to sell products and snake oil.\u00a0Those were dark times, promulgated with outlandish claims of easily eradicating cyber threats with their software or appliance products.\u00a0The market was riddled with magic boxes, silver-bullet software, and turnkey solutions to easily fix all security woes.\u00a0I can remember countless salespeople asserting \u201cwe solve security\u201d (at which point I stopped listening or kicked them out).\u00a0The concept of flipping a switch to make all the complex problems of computing security forever go away was what uninformed organizations wanted to hear, but that was simply unrealistic. Why customers chose to believe such nonsense (when the problem and the effectiveness of potential solutions could not be quantified) is beyond me, but many did.\u00a0Trust in the security solutions industry was lost for a time.<\/p>\n<p>Slowly, a trickle of informative sources began to produce reports and publish data.\u00a0Such initiatives gained momentum, with others joining to share in limited amounts. This was the\u00a0turning point.\u00a0Armed with data and critical thinking, clarity and common sense began to take root. The transition was not perfect or quick, but the introduction of data from credible sources empowered security organizations to better understand the challenge and effectively maneuver against threats.<\/p>\n<p>As the size of the market and competition grew, additional viewpoints joined the fray.\u00a0Today, we are bombarded by all manner of cybersecurity information. Some are credible, while others are not. There are several types of data being presented, ranging from speculations to hard research.\u00a0Being well informed is extremely valuable to decision makers. Now, the problem is figuring out how to filter and organize the data so that we are not misled.<\/p>\n<p>As part of my role as a cybersecurity strategist, I both publish information to the community and consume vast amounts of industry data.\u00a0To manage the burden and avoid the risks of believing less-than-trustworthy information, I have created a quick guide to help structure the process. It is burned into my mind as a set of filters and rules, and\u00a0I have committed it to paper\/screen to share.<\/p>\n<p>I categorize data into four buckets.\u00a0These are\u00a0<em>speculation, survey, actuarial, <\/em>and <em>research.\u00a0<\/em>Each has its pros and cons.\u00a0The key to managing security data overload is to understand the limitations of each category, its respective value and its recommended usage.<\/p>\n<p>For example, survey data is the most unreliable, but does have value in helping us understand the fears and perceptions of the respondent community.\u00a0Research data is normally very accurate but notoriously narrow in scope and may be late to the game. One of my favorites is actuarial data. I am a pragmatic guy.\u00a0 I want to know what is actually happening so I can make my own conclusions. But there are limitations to actuarial data as well. It tends to be very limited in size and scope, so you can\u2019t look too far into it. It is a reflection of the past, which may not align to the future.<\/p>\n<p>I hear lots of complaints and criticisms regarding the validity, scope, intent, and usage of data. I have my favorites and those that\u00a0I refuse to even read. Security data is notoriously difficult. There are so many limitations and biases, it is far easier to point out problems\u00a0than to see the diamonds in the rough. But data can be valuable if filtered, corrected for bias, and the limitations are known. Don\u2019t go in blind. Apply common sense. Follow a consistent method and structure to avoid pitfalls and maximize the data available to help you manage and maintain an optimal level of security.<\/p>\n<p>The following are a few examples, in my opinion, of credible cybersecurity data across the spectrum of categories. Keep in mind the limitations of each group and don\u2019t make the mistake of using the information improperly! Look to speculation for the best opinions, survey for the pulse of industry perceptions, actuarial for real events, and research for deep analysis:<\/p>\n<h2><strong>\u00a0<\/strong><strong>Speculation<\/strong><\/h2>\n<ul>\n<li><strong>2016 Cybersecurity Threat Predictions<\/strong> from McAfee Labs.<\/li>\n<li><strong>$243 billion\u2013$1 trillion:<\/strong>\u00a0The potential cost of a single attack against the US power grid, per Lloyds Insurance.<\/li>\n<li><strong>~$3 trillion: <\/strong>The\u00a0aggregate economic impact of cybersecurity on technology trends through 2020, from the World Economic Forum 2014 report &#8220;<a href=\"http:\/\/www3.weforum.org\/docs\/WEF_RiskResponsibility_HyperconnectedWorld_Report_2014.pdf\">Risk and Responsibility in a Hyperconnected World<\/a>.&#8221;<\/li>\n<li><strong>$90 trillion:<\/strong>\u00a0The cyber impact for one (worst case) scenario affecting the global benefits of information and communications technologies by 2030, from the <a href=\"http:\/\/www.atlanticcouncil.org\/cyberrisks\/\">Atlantic Council\u2019s report estimate<\/a>.<\/li>\n<li><strong>55% compound annual growth rate:<\/strong>\u00a0The growth of the global Internet of Things security market for the period 2016\u20132020, from ResearchandMarkets.com.<\/li>\n<li><a href=\"http:\/\/www.slideshare.net\/MatthewRosenquist\/top-10-cybersecurity-predictions-for-2016-by-matthew-rosenquist\"><strong>My 2016 Cybersecurity Predictions:<\/strong><\/a>\u00a0Most of <a href=\"https:\/\/www.linkedin.com\/today\/author\/matthewrosenquist\">my blogs<\/a> are in the speculation category.<\/li>\n<\/ul>\n<h2><strong>Survey<\/strong><\/h2>\n<ul>\n<li><strong>Threat Intelligence Sharing survey:<\/strong>\u00a0<a href=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/sep-2016-threats-report-takeaways\/\">McAfee Labs Threats Report<\/a> March 2016.<\/li>\n<li><strong>20% jump in cybercrime<\/strong> in the United Kingdom since 2014, with nearly two-thirds of businesses expressing no confidence in the ability of law enforcement to deal with it, from <a href=\"http:\/\/www.pwc.com\/gx\/en\/economic-crime-survey\/pdf\/GlobalEconomicCrimeSurvey2016.pdf\">PwC<\/a>.<\/li>\n<li><strong>25% Americans believe they have experienced a data breach<\/strong> or cyber attack, from a\u00a0Travelers survey.<\/li>\n<li><strong>43%<\/strong>\u00a0<strong>of organizations<\/strong> surveyed indicated increases in cybersecurity will drive the most technology spending, from the 2016 <a href=\"http:\/\/www.infosecurityeurope.com\/__novadocuments\/232349\">ESG IT spending intentions research report<\/a>.<\/li>\n<li><strong>61% of CEOs <\/strong>believe cyber threats pose a danger to corporate growth, from a <a href=\"http:\/\/www.scmagazine.com\/pwc-ceo-survey-61-percent-believe-cyberthreats-pose-a-danger-to-corporate-growth\/article\/466066\/\">PwC survey<\/a>.<\/li>\n<\/ul>\n<h2><strong>Actuarial<\/strong><\/h2>\n<ul>\n<li><strong>3 out of 5 Californians<\/strong> were victims of data breaches in 2015, according to the state attorney general, from the 2016 California Data Breach Report.<\/li>\n<li><strong>~35% of the US population:<\/strong>\u00a0Top 10 health care breaches of 2015 affected about one-third of the US population, from the Department of Health and Human Services\u00a0<a href=\"https:\/\/ocrportal.hhs.gov\/ocr\/breach\/breach_report.jsf\">Office for Civil Rights<\/a>.<\/li>\n<li><strong>Data Breach Investigations Report, <\/strong><a href=\"http:\/\/www.verizonenterprise.com\/verizon-insights-lab\/dbir\/2016\/\">from\u00a0Verizon<\/a>.<\/li>\n<li><strong>2016 Annual Security Report,<\/strong> from\u00a0<a href=\"http:\/\/www.cisco.com\/c\/en\/us\/products\/security\/annual_security_report.html\">Cisco<\/a>.<\/li>\n<li><strong>42 million<\/strong> new unique pieces of malware discovered in Q4 2015, bringing the total known samples to almost 500 million, from the\u00a0<a href=\"https:\/\/www.mcafee.com\/us\/resources\/reports\/rp-quarterly-threats-mar-2016.pdf\">McAfee Labs Threats Report<\/a>\u00a0of March 2016.<\/li>\n<li><strong>Security Intelligence Report,<\/strong>\u00a0from the biannual report by <a href=\"https:\/\/www.microsoft.com\/security\/sir\/default.aspx\">Microsoft<\/a>.<\/li>\n<\/ul>\n<h2><strong>Research<\/strong><\/h2>\n<ul>\n<li><strong>$325 million: <\/strong>Losses attributed to CryptoWall v3 ransomware, from analysis by the Cyber Threat Alliance.<\/li>\n<li><strong>$13.1 billion: <\/strong>US\u00a0government spending on cybersecurity in 2015, from FISMA report from the OMB.<\/li>\n<li><strong>\u201cCarbanak\u201d:<\/strong>\u00a0Advanced attack analysis from Kaspersky Lab.<\/li>\n<\/ul>\n<p>By the way, this very blog should be considered speculation.\u00a0Treat it as such.<\/p>\n<p>&nbsp;<\/p>\n<p>Interested in more?\u00a0 Follow me on\u00a0<a href=\"https:\/\/twitter.com\/Matt_Rosenquist\">Twitter (@Matt_Rosenquist)<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.linkedin.com\/today\/author\/matthewrosenquist\">LinkedIn<\/a>\u00a0to hear insights and what is going on in cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Limitations of security data We are constantly battered\u00a0by cybersecurity data, reports, and marketing collateral\u2014and we shouldn&#8217;t treat all of this&#8230;<\/p>\n","protected":false},"author":695,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[4452],"coauthors":[4136],"class_list":["post-49841","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Which Cybersecurity Data Should You Trust? | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Limitations of security data We are constantly battered\u00a0by cybersecurity data, reports, and marketing collateral\u2014and we shouldn&#039;t treat all of this\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Which Cybersecurity Data Should You Trust? | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Limitations of security data We are constantly battered\u00a0by cybersecurity data, reports, and marketing collateral\u2014and we shouldn&#039;t treat all of this\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/which-cybersecurity-data-should-you-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-05-24T18:20:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-09T02:55:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/wp-content\/uploads\/Vault2.jpg\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/which-cybersecurity-data-should-you-trust\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/which-cybersecurity-data-should-you-trust\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"Which Cybersecurity Data Should You Trust?\",\"datePublished\":\"2016-05-24T18:20:54+00:00\",\"dateModified\":\"2025-06-09T02:55:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/which-cybersecurity-data-should-you-trust\/\"},\"wordCount\":1255,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"keywords\":[\"cybersecurity\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/which-cybersecurity-data-should-you-trust\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/which-cybersecurity-data-should-you-trust\/\",\"name\":\"Which Cybersecurity Data Should You Trust? | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"datePublished\":\"2016-05-24T18:20:54+00:00\",\"dateModified\":\"2025-06-09T02:55:07+00:00\",\"description\":\"Limitations of security data We are constantly battered\u00a0by cybersecurity data, reports, and marketing collateral\u2014and we shouldn't treat all of this\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/which-cybersecurity-data-should-you-trust\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/which-cybersecurity-data-should-you-trust\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/which-cybersecurity-data-should-you-trust\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Which Cybersecurity Data Should You Trust?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Which Cybersecurity Data Should You Trust? | McAfee Blog","description":"Limitations of security data We are constantly battered\u00a0by cybersecurity data, reports, and marketing collateral\u2014and we shouldn't treat all of this","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Which Cybersecurity Data Should You Trust? | McAfee Blog","og_description":"Limitations of security data We are constantly battered\u00a0by cybersecurity data, reports, and marketing collateral\u2014and we shouldn't treat all of this","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/which-cybersecurity-data-should-you-trust\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-05-24T18:20:54+00:00","article_modified_time":"2025-06-09T02:55:07+00:00","og_image":[{"url":"https:\/\/www.mcafee.com\/wp-content\/uploads\/Vault2.jpg","type":"","width":"","height":""}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/which-cybersecurity-data-should-you-trust\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/which-cybersecurity-data-should-you-trust\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"Which Cybersecurity Data Should You Trust?","datePublished":"2016-05-24T18:20:54+00:00","dateModified":"2025-06-09T02:55:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/which-cybersecurity-data-should-you-trust\/"},"wordCount":1255,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"keywords":["cybersecurity"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/which-cybersecurity-data-should-you-trust\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/which-cybersecurity-data-should-you-trust\/","name":"Which Cybersecurity Data Should You Trust? | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"datePublished":"2016-05-24T18:20:54+00:00","dateModified":"2025-06-09T02:55:07+00:00","description":"Limitations of security data We are constantly battered\u00a0by cybersecurity data, reports, and marketing collateral\u2014and we shouldn't treat all of this","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/which-cybersecurity-data-should-you-trust\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/which-cybersecurity-data-should-you-trust\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/which-cybersecurity-data-should-you-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Which Cybersecurity Data Should You Trust?"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/49841","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=49841"}],"version-history":[{"count":11,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/49841\/revisions"}],"predecessor-version":[{"id":215292,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/49841\/revisions\/215292"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=49841"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=49841"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=49841"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=49841"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}