{"id":64165,"date":"2016-11-07T12:02:26","date_gmt":"2016-11-07T20:02:26","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=64165"},"modified":"2025-06-06T01:16:58","modified_gmt":"2025-06-06T08:16:58","slug":"talking-about-cyber-risks-educates-the-community","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/talking-about-cyber-risks-educates-the-community\/","title":{"rendered":"Talking About Cyber Risks Educates the Community"},"content":{"rendered":"<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Table-Discussion.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-64166\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Table-Discussion.png\" alt=\"table-discussion\" width=\"1000\" height=\"667\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Table-Discussion.png 1000w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Table-Discussion-300x200.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Table-Discussion-768x512.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Table-Discussion-750x500.png 750w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/p>\n<p>In the last 12 months, we have seen an unprecedented number of cyberattacks occur or come to light.\u00a0Sophisticated attacks against governments, businesses, consumers, and the pillars of the Internet itself.\u00a0The future appears to be fraught with runaway risks.\u00a0Can security tame data breaches, ransomware, massive denial of service assaults, cyber theft, and attacks against autonomous and Internet-connected devices that potentially put people\u2019s lives in jeopardy?<\/p>\n<p>That was the topic for the advisory council members of the <a href=\"https:\/\/www.secureworldexpo.com\/bay-area\/home\" target=\"_blank\" rel=\"noopener\">Bay Area SecureWorld conference<\/a>,\u00a0recently held in San Jose, Calif. As moderator, I had the task is keeping control of a conversation with a room full of passionate experts who live and breathe these challenges every day.<\/p>\n<p>In the past year, a number of significant risks have risen.\u00a0The team had no hesitation in talking about some of the big issues.<\/p>\n<h2><strong>IoT DDoS attacks<\/strong><\/h2>\n<p>Consumers and business are feeling the impact of massive distributed denial of service (DDoS) attacks, fueled by insecure Internet of Things (IoT) devices.\u00a0The sheer impact of data and requests that these botnets can wield is an order of magnitude greater than the industry&#8217;s comfort zone.\u00a0The consensus is that everyone should be worried and the fix is not quick.\u00a0The IoT industry must change to embrace security across the life cycle of these devices. In a twisted way, these recent attacks are a good wake-up call for the industry. The group agreed that it is far better to have these incidents occur now rather than down the road, when billions more IoT devices will be connected to the Internet.<\/p>\n<h2><strong>Data breaches<\/strong><\/h2>\n<p>On the heels of the worst year (2015) for health care data breaches, the hemorrhaging continues. This is by no means limited to health care, as many other sectors are being impacted. An interesting debate emerged challenging the role and impacts of government regulations in this space.\u00a0One side postulated the government has weakened security by setting a confusing bar that is too low.\u00a0Compliance does not make organizations secure, which is an unfortunate mental trap. Many organizations fund only what is needed to achieve the minimal requirements.\u00a0On the other side, advocates of regulation and auditing pointed out that without a baseline many organizations would fall severely short.\u00a0As we all work together, we need assurance that other partners, parties, suppliers, and vendors are implementing security controls which meet expectations.<\/p>\n<p>Nobody believed the legislative process could effectively keep pace with the changes in the industry.\u00a0But all agreed that the lack of consistency, readability, and simplicity of regulations is a problem.\u00a0Complexity increases costs, delays implementation, and causes confusion.\u00a0Smarter, lightweight, and easily understood guidelines would benefit the community.<\/p>\n<h2><strong>Credit card and online fraud<\/strong><\/h2>\n<p>Major retailers saw a drop in in-store credit fraud with the introduction of new chip cards in the United States, accompanied with a correlated rise of online theft, in which the chip does not play a role.\u00a0In effect, fraud continues, but the bubble was squeezed from in-store to online properties.\u00a0It is a predictable outcome when threat agents are viewed as intelligent attackers.\u00a0They will adapt.\u00a0Shrinkage figures are not outrageous, but the online security teams are feeling the heat to keep them low. This pressure will likely require a combination of new technology, back-end analytics, and user-behavior changes.\u00a0Greed is a persistent attribute of cybercriminals.\u00a0Other activities, such as ransomware, are also currently painful for consumers, health care, and small businesses.\u00a0Enterprises have their ears open to shifts in which they may become the primary targets if attackers can find a way to reach into their deep pockets.<\/p>\n<h2><strong>Gone in 60 minutes<\/strong><\/h2>\n<p>The industry is full of risks and opportunities.\u00a0Sitting in a room of experienced professionals who are sharing their insights and experiences reveals one important fact. These conversations must occur more often if we are to keep pace with the attackers.\u00a0Our adversaries share information and are masterful at working together to our detriment.\u00a0We, the cybersecurity community, must do the same in order to survive. Our hour together raced by quickly.\u00a0I look forward to more meetings, discussions, debates, and venting sessions.<\/p>\n<p>&nbsp;<\/p>\n<p>Interested in more?\u00a0Follow me on\u00a0<a href=\"http:\/\/twitter.com\/Matt_Rosenquist\" target=\"_blank\" rel=\"noopener\">Twitter (@Matt_Rosenquist)<\/a>\u00a0and\u00a0<a href=\"http:\/\/www.linkedin.com\/today\/author\/matthewrosenquist\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a>\u00a0to hear insights and what is going on in cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the last 12 months, we have seen an unprecedented number of cyberattacks occur or come to light.\u00a0Sophisticated attacks against&#8230;<\/p>\n","protected":false},"author":695,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[4452,4131,4549],"coauthors":[4136],"class_list":["post-64165","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-cybersecurity","tag-internet-of-things","tag-ransomware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Talking About Cyber Risks Educates the Community | McAfee Blog<\/title>\n<meta name=\"description\" content=\"In the last 12 months, we have seen an unprecedented number of cyberattacks occur or come to light.\u00a0Sophisticated attacks against governments, businesses,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Talking About Cyber Risks Educates the Community | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"In the last 12 months, we have seen an unprecedented number of cyberattacks occur or come to light.\u00a0Sophisticated attacks against governments, businesses,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.linkedin.com\/pulse\/lets-talk-cyber-risks-matthew-rosenquist\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-07T20:02:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-06T08:16:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Table-Discussion.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.linkedin.com\/pulse\/lets-talk-cyber-risks-matthew-rosenquist#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/talking-about-cyber-risks-educates-the-community\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"Talking About Cyber Risks Educates the Community\",\"datePublished\":\"2016-11-07T20:02:26+00:00\",\"dateModified\":\"2025-06-06T08:16:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/talking-about-cyber-risks-educates-the-community\/\"},\"wordCount\":714,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.linkedin.com\/pulse\/lets-talk-cyber-risks-matthew-rosenquist#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Table-Discussion.png\",\"keywords\":[\"cybersecurity\",\"Internet of Things\",\"ransomware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/talking-about-cyber-risks-educates-the-community\/\",\"url\":\"https:\/\/www.linkedin.com\/pulse\/lets-talk-cyber-risks-matthew-rosenquist\",\"name\":\"Talking About Cyber Risks Educates the Community | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.linkedin.com\/pulse\/lets-talk-cyber-risks-matthew-rosenquist#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.linkedin.com\/pulse\/lets-talk-cyber-risks-matthew-rosenquist#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Table-Discussion.png\",\"datePublished\":\"2016-11-07T20:02:26+00:00\",\"dateModified\":\"2025-06-06T08:16:58+00:00\",\"description\":\"In the last 12 months, we have seen an unprecedented number of cyberattacks occur or come to light.\u00a0Sophisticated attacks against governments, businesses,\",\"breadcrumb\":{\"@id\":\"https:\/\/www.linkedin.com\/pulse\/lets-talk-cyber-risks-matthew-rosenquist#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.linkedin.com\/pulse\/lets-talk-cyber-risks-matthew-rosenquist\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.linkedin.com\/pulse\/lets-talk-cyber-risks-matthew-rosenquist#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Table-Discussion.png\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Table-Discussion.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.linkedin.com\/pulse\/lets-talk-cyber-risks-matthew-rosenquist#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Talking About Cyber Risks Educates the Community\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Talking About Cyber Risks Educates the Community | McAfee Blog","description":"In the last 12 months, we have seen an unprecedented number of cyberattacks occur or come to light.\u00a0Sophisticated attacks against governments, businesses,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Talking About Cyber Risks Educates the Community | McAfee Blog","og_description":"In the last 12 months, we have seen an unprecedented number of cyberattacks occur or come to light.\u00a0Sophisticated attacks against governments, businesses,","og_url":"https:\/\/www.linkedin.com\/pulse\/lets-talk-cyber-risks-matthew-rosenquist","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-11-07T20:02:26+00:00","article_modified_time":"2025-06-06T08:16:58+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Table-Discussion.png","type":"image\/png"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.linkedin.com\/pulse\/lets-talk-cyber-risks-matthew-rosenquist#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/talking-about-cyber-risks-educates-the-community\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"Talking About Cyber Risks Educates the Community","datePublished":"2016-11-07T20:02:26+00:00","dateModified":"2025-06-06T08:16:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/talking-about-cyber-risks-educates-the-community\/"},"wordCount":714,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.linkedin.com\/pulse\/lets-talk-cyber-risks-matthew-rosenquist#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Table-Discussion.png","keywords":["cybersecurity","Internet of Things","ransomware"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/talking-about-cyber-risks-educates-the-community\/","url":"https:\/\/www.linkedin.com\/pulse\/lets-talk-cyber-risks-matthew-rosenquist","name":"Talking About Cyber Risks Educates the Community | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.linkedin.com\/pulse\/lets-talk-cyber-risks-matthew-rosenquist#primaryimage"},"image":{"@id":"https:\/\/www.linkedin.com\/pulse\/lets-talk-cyber-risks-matthew-rosenquist#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Table-Discussion.png","datePublished":"2016-11-07T20:02:26+00:00","dateModified":"2025-06-06T08:16:58+00:00","description":"In the last 12 months, we have seen an unprecedented number of cyberattacks occur or come to light.\u00a0Sophisticated attacks against governments, businesses,","breadcrumb":{"@id":"https:\/\/www.linkedin.com\/pulse\/lets-talk-cyber-risks-matthew-rosenquist#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.linkedin.com\/pulse\/lets-talk-cyber-risks-matthew-rosenquist"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.linkedin.com\/pulse\/lets-talk-cyber-risks-matthew-rosenquist#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Table-Discussion.png","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Table-Discussion.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.linkedin.com\/pulse\/lets-talk-cyber-risks-matthew-rosenquist#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Talking About Cyber Risks Educates the Community"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/64165","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=64165"}],"version-history":[{"count":1,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/64165\/revisions"}],"predecessor-version":[{"id":215168,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/64165\/revisions\/215168"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=64165"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=64165"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=64165"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=64165"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}