{"id":83775,"date":"2018-01-19T09:00:55","date_gmt":"2018-01-19T17:00:55","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=83775"},"modified":"2025-08-31T19:23:19","modified_gmt":"2025-09-01T02:23:19","slug":"bringing-security-cloud-beyond","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/bringing-security-cloud-beyond\/","title":{"rendered":"Bringing Security to the Cloud and Beyond"},"content":{"rendered":"<p>I remember talking about cloud computing years ago as something in the future or as an \u201cexperiment,\u201d knowing that one day it would be our everyday reality. Now, we\u2019re there. Just ask yourself how many cloud applications you have on your smartphone or tablet to prove it. Cloud computing is everywhere and it is yet another example of how fast this industry evolves.<\/p>\n<p>Cloud computing is big business \u2013 one of the fastest-growing segments in technology. Today, 95 percent of all enterprises use some form of cloud computing, and nearly three-quarters of those instances are hybrid use cases. Sales of cloud services are increasing <a href=\"https:\/\/www.gartner.com\/newsroom\/id\/3815165\">almost 20 percent annually<\/a>, with some sub-segments increasing as much as 40 percent. Comparatively, the security market is seeing annual growth rates of 9 percent.<\/p>\n<p>While the adoption rate is growing, CIOs and CISOs consistently list security risks as one of the top inhibitors to cloud adoption. They simply don\u2019t have the tools for gaining visibility into cloud environments or the means for controlling their cloud-hosted data. We must resolve this security risk.<\/p>\n<h2>Skyhigh x McAfee<\/h2>\n<p>Recently, McAfee made a substantial investment in <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/solutions\/cloud-security.html\">cloud security<\/a> by announcing the acquisition of Skyhigh Networks, a leader in the cloud access security broker (CASB) market segment according to Gartner. CASB provides businesses with control over and insights into the data and users flowing in and out of cloud resources. With that visibility, businesses can better manage access and make smart decisions over data movement. In short, CASB fills the control gap by acting as an intermediary between an organization\u2019s on-premises infrastructure and a cloud provider\u2019s infrastructure.<\/p>\n<p>As our CEO Chris Young wrote, \u201cMcAfee and Skyhigh share more in common than values. We both aspire to make cybersecurity an accelerant to the limitless potential of our digital age. We both know that our employees are at the heart of everything we do. And we both are committed to modernizing cybersecurity environments for the future.\u201d<\/p>\n<p>I am excited about the Skyhigh acquisition and I hope you are, too. \u00a0We are set up for a successful 2018, and I am looking forward to seeing what the future holds for our partners and McAfee.<\/p>\n<p>While I\u2019m looking forward to continued success in 2018, I reflect on 2017 and am proud of what we\u2019ve accomplished. Together, we grew New Routes to Market, announced exciting partnerships through Security Innovation Alliances, completed Executive Briefing Centers that led to net new logos and substantial business, and attended events like Tech Forum and Partner Summit. Through the change back to McAfee as a standalone company, we had an incredible year to remember!<\/p>\n<p>This year, look forward to seeing more McAfee products, partnerships, and resources that will help us all secure the digital future.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I remember talking about cloud computing years ago as something in the future or as an \u201cexperiment,\u201d knowing that one&#8230;<\/p>\n","protected":false},"author":818,"featured_media":118189,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661],"tags":[],"coauthors":[4605],"class_list":["post-83775","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Bringing Security to the Cloud and Beyond | McAfee Blog<\/title>\n<meta name=\"description\" content=\"I remember talking about cloud computing years ago as something in the future or as an \u201cexperiment,\u201d knowing that one day it would be our everyday\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bringing Security to the Cloud and Beyond | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"I remember talking about cloud computing years ago as something in the future or as an \u201cexperiment,\u201d knowing that one day it would be our everyday\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/bringing-security-cloud-beyond\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-19T17:00:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-01T02:23:19+00:00\" \/>\n<meta name=\"author\" content=\"Ken McCray\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ken_mccray007\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ken McCray\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/bringing-security-cloud-beyond\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/bringing-security-cloud-beyond\/\"},\"author\":{\"name\":\"Ken McCray\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/0fcff1bf67bd102309d61acff4f9a8d6\"},\"headline\":\"Bringing Security to the Cloud and Beyond\",\"datePublished\":\"2018-01-19T17:00:55+00:00\",\"dateModified\":\"2025-09-01T02:23:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/bringing-security-cloud-beyond\/\"},\"wordCount\":460,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/bringing-security-cloud-beyond\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/Red-Cloud.jpeg\",\"articleSection\":[\"Internet Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/bringing-security-cloud-beyond\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/bringing-security-cloud-beyond\/\",\"name\":\"Bringing Security to the Cloud and Beyond | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/bringing-security-cloud-beyond\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/bringing-security-cloud-beyond\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/Red-Cloud.jpeg\",\"datePublished\":\"2018-01-19T17:00:55+00:00\",\"dateModified\":\"2025-09-01T02:23:19+00:00\",\"description\":\"I remember talking about cloud computing years ago as something in the future or as an \u201cexperiment,\u201d knowing that one day it would be our everyday\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/bringing-security-cloud-beyond\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/bringing-security-cloud-beyond\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/bringing-security-cloud-beyond\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/Red-Cloud.jpeg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/Red-Cloud.jpeg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/bringing-security-cloud-beyond\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Bringing Security to the Cloud and Beyond\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/0fcff1bf67bd102309d61acff4f9a8d6\",\"name\":\"Ken McCray\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/6e6b9771385975f5b59a38dc987eef51\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Ken-McCray-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Ken-McCray-96x96.jpg\",\"caption\":\"Ken McCray\"},\"description\":\"Ken McCray is Head of Channel Sales and Operations for the Americas at McAfee. In this role, McCray is responsible for all channel-related business, generating revenue exceeding $1 billion. McCray is nearing 30 years of experience in the high-tech industry and is a highly respected channel veteran with a wealth of field expertise. Over the years McCray has been recognized for countless industry awards. Most recently, he was named one of CRN\u2019s 2018 Top 50 Most Influential people and 2018 Top 25 Channel Chiefs. McCray began his career at McAfee in 1993 as a Channel Account Manager. During his tenure, he has been known for many milestones in transforming the channel organization. Some of those milestones include: creation of the accelerated deal registration program and portal, which is now used globally by over 30,000 partners; expanding our routes-to-market through McAfee Security Innovation Alliances and Managed Services Providers; and launching the Partner Care team in Bangalore to provide back-office support to more than 8,500 reseller partners and distributors. Additionally, McCray is an advocate for diversity and equality in the technology industry and serves as McAfee\u2019s executive sponsor of Women of the Channel. McCray received his bachelor\u2019s in computer science from DeVry University and an MBA from Rochester Institute of Technology.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/kenneth-mccray-3ab807\/\",\"https:\/\/x.com\/ken_mccray007\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/ken-mccray\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bringing Security to the Cloud and Beyond | McAfee Blog","description":"I remember talking about cloud computing years ago as something in the future or as an \u201cexperiment,\u201d knowing that one day it would be our everyday","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Bringing Security to the Cloud and Beyond | McAfee Blog","og_description":"I remember talking about cloud computing years ago as something in the future or as an \u201cexperiment,\u201d knowing that one day it would be our everyday","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/bringing-security-cloud-beyond\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2018-01-19T17:00:55+00:00","article_modified_time":"2025-09-01T02:23:19+00:00","author":"Ken McCray","twitter_card":"summary_large_image","twitter_creator":"@ken_mccray007","twitter_site":"@McAfee","twitter_misc":{"Written by":"Ken McCray","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/bringing-security-cloud-beyond\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/bringing-security-cloud-beyond\/"},"author":{"name":"Ken McCray","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/0fcff1bf67bd102309d61acff4f9a8d6"},"headline":"Bringing Security to the Cloud and Beyond","datePublished":"2018-01-19T17:00:55+00:00","dateModified":"2025-09-01T02:23:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/bringing-security-cloud-beyond\/"},"wordCount":460,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/bringing-security-cloud-beyond\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/Red-Cloud.jpeg","articleSection":["Internet Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/bringing-security-cloud-beyond\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/bringing-security-cloud-beyond\/","name":"Bringing Security to the Cloud and Beyond | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/bringing-security-cloud-beyond\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/bringing-security-cloud-beyond\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/Red-Cloud.jpeg","datePublished":"2018-01-19T17:00:55+00:00","dateModified":"2025-09-01T02:23:19+00:00","description":"I remember talking about cloud computing years ago as something in the future or as an \u201cexperiment,\u201d knowing that one day it would be our everyday","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/bringing-security-cloud-beyond\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/bringing-security-cloud-beyond\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/bringing-security-cloud-beyond\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/Red-Cloud.jpeg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/Red-Cloud.jpeg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/bringing-security-cloud-beyond\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Bringing Security to the Cloud and Beyond"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/0fcff1bf67bd102309d61acff4f9a8d6","name":"Ken McCray","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/6e6b9771385975f5b59a38dc987eef51","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Ken-McCray-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Ken-McCray-96x96.jpg","caption":"Ken McCray"},"description":"Ken McCray is Head of Channel Sales and Operations for the Americas at McAfee. In this role, McCray is responsible for all channel-related business, generating revenue exceeding $1 billion. McCray is nearing 30 years of experience in the high-tech industry and is a highly respected channel veteran with a wealth of field expertise. Over the years McCray has been recognized for countless industry awards. Most recently, he was named one of CRN\u2019s 2018 Top 50 Most Influential people and 2018 Top 25 Channel Chiefs. McCray began his career at McAfee in 1993 as a Channel Account Manager. During his tenure, he has been known for many milestones in transforming the channel organization. Some of those milestones include: creation of the accelerated deal registration program and portal, which is now used globally by over 30,000 partners; expanding our routes-to-market through McAfee Security Innovation Alliances and Managed Services Providers; and launching the Partner Care team in Bangalore to provide back-office support to more than 8,500 reseller partners and distributors. Additionally, McCray is an advocate for diversity and equality in the technology industry and serves as McAfee\u2019s executive sponsor of Women of the Channel. McCray received his bachelor\u2019s in computer science from DeVry University and an MBA from Rochester Institute of Technology.","sameAs":["https:\/\/www.linkedin.com\/in\/kenneth-mccray-3ab807\/","https:\/\/x.com\/ken_mccray007"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/ken-mccray\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/83775","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/818"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=83775"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/83775\/revisions"}],"predecessor-version":[{"id":221764,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/83775\/revisions\/221764"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/118189"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=83775"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=83775"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=83775"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=83775"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}