{"id":52962,"date":"2016-09-29T20:00:19","date_gmt":"2016-09-30T03:00:19","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=52962"},"modified":"2024-02-19T23:00:41","modified_gmt":"2024-02-20T07:00:41","slug":"sharing-cybersecurity-threat-intelligence-way-win","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/sharing-cybersecurity-threat-intelligence-way-win\/","title":{"rendered":"Sharing Cybersecurity Threat Intelligence Is the Only Way We Win"},"content":{"rendered":"<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Threat-Intel-Sharing.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-52965\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Threat-Intel-Sharing-300x244.png\" alt=\"threat-intel-sharing\" width=\"300\" height=\"244\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Threat-Intel-Sharing-300x244.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Threat-Intel-Sharing.png 550w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Cybersecurity is a team sport. The bad guys share information, expertise, and code as they help one another. The good guys must do the same to keep pace. Sharing threat intelligence is a key aspect in which the knowledge gained by the owners of sensor networks can share data with\u00a0the security analysis community.\u00a0 This generosity provides\u00a0the necessary breadth of data to understand trends, new infections, how botnets are communicating, whether\u00a0directed targeting is occurring, and even if different attackers are collaborating.<\/p>\n<p>Sadly, sharing\u00a0is not the norm. Many security companies look at this data as a competitive advantage to sell their products and services. They keep it to themselves in hopes they can find a nugget and market it as\u00a0a way to win new customers. But the cost of this approach is losing the bigger picture of overall effectiveness.<\/p>\n<p>This attitude is\u00a0slowly changing. Some security firms are stepping up and sharing more and more data, redacted from\u00a0personal information and containing\u00a0only attack characteristics. The combined aspects are like pieces of\u00a0a massive puzzle that analysts can examine for trends. These puzzle pieces are\u00a0hugely important to everyone.<\/p>\n<p>I am glad to see <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/improve-protection-cyberattacks-shared-threat-intelligence\/\">major security vendors and researchers<\/a> beginning to share insights and data. Consortiums such as\u00a0the <a href=\"http:\/\/www.cyberthreatalliance.org\/\">Cyber Threat Alliance<\/a> and sites like <a href=\"https:\/\/www.virustotal.com\/\">VirusTotal<\/a>\u00a0lead the way.<br \/>\n<a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Cyber-Threat-Alliance.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-52966\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Cyber-Threat-Alliance.jpg\" alt=\"cyber-threat-alliance\" width=\"212\" height=\"84\" \/><\/a>The <a href=\"https:\/\/www.dhs.gov\/isao\">Information Sharing and Analysis Organization<\/a> (ISAO), established as part of a US presidential order in 2015, is developing voluntary standards for private and public data sharing.<\/p>\n<p>But we need more sharing! Attacks are occurring at a phenomenal rate. Malware alone is out of control, with about 44,000 unique samples discovered every day. Security organizations must leverage each other\u2019s information to better predict, prevent, detect, and respond to threats that their customers and organizations face.<\/p>\n<p>The battle that should be fought is not between security vendors, but rather between the threats and collective defensive organizations which\u00a0stand between attackers\u00a0and their victims. We must work together to stem the tide of cyberattacks. Public sentiment is very important. If we want\u00a0our technology to be safe, we must send a clear message to our security vendors. Share threat data or we will patronize a different supplier of security products and services. We have a voice and a vote (with our wallets).<\/p>\n<p>&nbsp;<\/p>\n<p>Interested in more?\u00a0 Follow me on\u00a0<a href=\"https:\/\/twitter.com\/Matt_Rosenquist\">Twitter (@Matt_Rosenquist)<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.linkedin.com\/today\/author\/matthewrosenquist\">LinkedIn<\/a>\u00a0to hear insights and what is going on in cybersecurity.<\/p>\n<p>My original post of this blog can be found on <a href=\"http:\/\/www.darkreading.com\/partner-perspectives\/intel\/sharing-cybersecurity-threat-intelligence-is-the-only-way-we-win\/a\/d-id\/1327022?\" target=\"_blank\" rel=\"nofollow noopener\">DarkReading<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is a team sport. The bad guys share information, expertise, and code as they help one another. The good&#8230;<\/p>\n","protected":false},"author":695,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[1814,4452,338,18],"coauthors":[4136],"class_list":["post-52962","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-computer-security","tag-cybersecurity","tag-endpoint-protection","tag-network-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Sharing Cybersecurity Threat Intelligence Is the Only Way We Win | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Cybersecurity is a team sport. The bad guys share information, expertise, and code as they help one another. The good guys must do the same to keep pace.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sharing Cybersecurity Threat Intelligence Is the Only Way We Win | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity is a team sport. The bad guys share information, expertise, and code as they help one another. The good guys must do the same to keep pace.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/sharing-cybersecurity-threat-intelligence-way-win\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-30T03:00:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-20T07:00:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Threat-Intel-Sharing-300x244.png\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/sharing-cybersecurity-threat-intelligence-way-win\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/sharing-cybersecurity-threat-intelligence-way-win\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"Sharing Cybersecurity Threat Intelligence Is the Only Way We Win\",\"datePublished\":\"2016-09-30T03:00:19+00:00\",\"dateModified\":\"2024-02-20T07:00:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/sharing-cybersecurity-threat-intelligence-way-win\/\"},\"wordCount\":424,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/sharing-cybersecurity-threat-intelligence-way-win\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Threat-Intel-Sharing-300x244.png\",\"keywords\":[\"computer security\",\"cybersecurity\",\"endpoint protection\",\"network security\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/sharing-cybersecurity-threat-intelligence-way-win\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/sharing-cybersecurity-threat-intelligence-way-win\/\",\"name\":\"Sharing Cybersecurity Threat Intelligence Is the Only Way We Win | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/sharing-cybersecurity-threat-intelligence-way-win\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/sharing-cybersecurity-threat-intelligence-way-win\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Threat-Intel-Sharing-300x244.png\",\"datePublished\":\"2016-09-30T03:00:19+00:00\",\"dateModified\":\"2024-02-20T07:00:41+00:00\",\"description\":\"Cybersecurity is a team sport. The bad guys share information, expertise, and code as they help one another. The good guys must do the same to keep pace.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/sharing-cybersecurity-threat-intelligence-way-win\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/sharing-cybersecurity-threat-intelligence-way-win\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/sharing-cybersecurity-threat-intelligence-way-win\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Threat-Intel-Sharing-300x244.png\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Threat-Intel-Sharing-300x244.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/sharing-cybersecurity-threat-intelligence-way-win\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Sharing Cybersecurity Threat Intelligence Is the Only Way We Win\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sharing Cybersecurity Threat Intelligence Is the Only Way We Win | McAfee Blog","description":"Cybersecurity is a team sport. The bad guys share information, expertise, and code as they help one another. The good guys must do the same to keep pace.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Sharing Cybersecurity Threat Intelligence Is the Only Way We Win | McAfee Blog","og_description":"Cybersecurity is a team sport. The bad guys share information, expertise, and code as they help one another. The good guys must do the same to keep pace.","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/sharing-cybersecurity-threat-intelligence-way-win\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-09-30T03:00:19+00:00","article_modified_time":"2024-02-20T07:00:41+00:00","og_image":[{"url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Threat-Intel-Sharing-300x244.png","type":"","width":"","height":""}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/sharing-cybersecurity-threat-intelligence-way-win\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/sharing-cybersecurity-threat-intelligence-way-win\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"Sharing Cybersecurity Threat Intelligence Is the Only Way We Win","datePublished":"2016-09-30T03:00:19+00:00","dateModified":"2024-02-20T07:00:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/sharing-cybersecurity-threat-intelligence-way-win\/"},"wordCount":424,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/sharing-cybersecurity-threat-intelligence-way-win\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Threat-Intel-Sharing-300x244.png","keywords":["computer security","cybersecurity","endpoint protection","network security"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/sharing-cybersecurity-threat-intelligence-way-win\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/sharing-cybersecurity-threat-intelligence-way-win\/","name":"Sharing Cybersecurity Threat Intelligence Is the Only Way We Win | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/sharing-cybersecurity-threat-intelligence-way-win\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/sharing-cybersecurity-threat-intelligence-way-win\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Threat-Intel-Sharing-300x244.png","datePublished":"2016-09-30T03:00:19+00:00","dateModified":"2024-02-20T07:00:41+00:00","description":"Cybersecurity is a team sport. The bad guys share information, expertise, and code as they help one another. The good guys must do the same to keep pace.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/sharing-cybersecurity-threat-intelligence-way-win\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/sharing-cybersecurity-threat-intelligence-way-win\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/sharing-cybersecurity-threat-intelligence-way-win\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Threat-Intel-Sharing-300x244.png","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Threat-Intel-Sharing-300x244.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/sharing-cybersecurity-threat-intelligence-way-win\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Sharing Cybersecurity Threat Intelligence Is the Only Way We Win"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/52962","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=52962"}],"version-history":[{"count":1,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/52962\/revisions"}],"predecessor-version":[{"id":183204,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/52962\/revisions\/183204"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=52962"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=52962"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=52962"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=52962"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}