{"id":92545,"date":"2018-11-07T09:34:35","date_gmt":"2018-11-07T17:34:35","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=92545"},"modified":"2025-08-13T00:35:03","modified_gmt":"2025-08-13T07:35:03","slug":"new-security-age-approach","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-security-age-approach\/","title":{"rendered":"A New Security Age Needs a New Approach to Security"},"content":{"rendered":"<p style=\"text-align: left;\">Security evolves to meet the needs of the age. Keys, for example, were created to secure homes and possessions. Encryption, the elements of which stretch back for thousands of years, filled the need to secure messages over a long distance. Security \u2013 as both a concept and an industry \u2014 is relatively simple to understand but can be difficult to execute, and execute well. It seems, especially these days, that there\u2019s no end to the stream of devices in need of securing\u00a0\u2014 from traditional exposure points like computers and websites to newly internet-connected devices <u><a href=\"https:\/\/www.cnbc.com\/2014\/02\/21\/can-your-fridge-be-hacked-in-the-internet-of-things.html\" target=\"_blank\" rel=\"noopener\">like refrigerators<\/a><\/u>. But with these new devices comes new challenges \u2013 and new security strategy must emerge as a result.<\/p>\n<p style=\"text-align: center;\"><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/ey7VWId1h6o\" width=\"500\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><span data-mce-type=\"bookmark\" style=\"display: inline-block; width: 0px; overflow: hidden; line-height: 0;\" class=\"mce_SELRES_start\">\ufeff<\/span><\/iframe><\/p>\n<p style=\"text-align: left;\">At first, consumers protected their devices with passwords, which continue to be used to this day. Then, as the internet built out, early cybercriminals realized they could send messages to computers that would collect passwords, giving them access to a personal computer. This, of course, is a virus, also known as malware and we collectively responded to it with antivirus programs.<\/p>\n<p>But two new developments in technology have upended the equation. First, the miniaturization of processors, which has led to a massive boom in computing devices. Second, the rapid adoption of wireless technology, which has created a nearly always-on environment with almost various paths to connect to the internet. The combination of these two developments has given us the Internet of Things (IoT).<\/p>\n<h2>Four Key Concepts of Security<\/h2>\n<p>Now, we\u2019re always <u><a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/inside-a-modern-day-smart-home\/\" target=\"_blank\" rel=\"noopener\">surrounded by digital devices<\/a><\/u> \u2014 a trend that&#8217;s likely to continue given the accumulation of technology over time, and with these devices we leave a trail of data everywhere we go. To secure this personal data, security has to evolve. To us at McAfee, these needs can be broken out into four key concepts for consumers:<\/p>\n<p>\u2022 Identity<br \/>\n\u2022 Privacy<br \/>\n\u2022 Data<br \/>\n\u2022 Anonymity<\/p>\n<p>To secure these four facets, we recognize the need for advanced security that doesn\u2019t get in the way of our use of technology. As a leader in the security industry, we\u2019re working with partners and consumers to create a <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/seamless-security-for-the-connected-consumer\/\" target=\"_blank\" rel=\"noopener\">seamless security experience<\/a> that enables users today to fearlessly embrace new technological developments and connect with confidence. Such an experience, however, requires a new approach, one designed to protect today\u2019s IoT environments and keep its users safe and secure without impeding on functionality. At McAfee, we\u2019re working hard to provide you with a superior, easy-to-use platform that seamlessly protects you and your family\u2019s data and devices.<\/p>\n<p>When it comes to protecting your devices, and your privacy, in this day and age, it pays to stay one step ahead. To learn more about consumer security and our approach to it, be sure to follow us at <u><a href=\"https:\/\/twitter.com\/McAfee\" target=\"_blank\" rel=\"noopener\">@McAfee<\/a><\/u> and <u><a href=\"https:\/\/twitter.com\/McAfee_Home\" target=\"_blank\" rel=\"noopener\">@McAfee_Home<\/a><\/u>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security evolves to meet the needs of the age. Keys, for example, were created to secure homes and possessions. Encryption,&#8230;<\/p>\n","protected":false},"author":1040,"featured_media":160502,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,13],"tags":[4452,4131],"coauthors":[5587],"class_list":["post-92545","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-privacy-identity-protection","tag-cybersecurity","tag-internet-of-things"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A New Security Age Needs a New Approach to Security<\/title>\n<meta name=\"description\" content=\"Security evolves to meet the needs of the age. Keys, for example, were created to secure homes and possessions. Encryption, the elements of which stretch back for thousands of years, filled the need to secure messages over a long distance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A New Security Age Needs a New Approach to Security\" \/>\n<meta property=\"og:description\" content=\"Security evolves to meet the needs of the age. Keys, for example, were created to secure homes and possessions. Encryption, the elements of which stretch back for thousands of years, filled the need to secure messages over a long distance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-security-age-approach\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-07T17:34:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-13T07:35:03+00:00\" \/>\n<meta name=\"author\" content=\"Shailaja Shankar\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Shailaja Shankar\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-security-age-approach\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-security-age-approach\/\"},\"author\":{\"name\":\"Shailaja Shankar\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8f583cc591401f92521b5efd0542e5d5\"},\"headline\":\"A New Security Age Needs a New Approach to Security\",\"datePublished\":\"2018-11-07T17:34:35+00:00\",\"dateModified\":\"2025-08-13T07:35:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-security-age-approach\/\"},\"wordCount\":467,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-security-age-approach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Lets-Make-Security-Easypng.png\",\"keywords\":[\"cybersecurity\",\"Internet of Things\"],\"articleSection\":[\"Internet Security\",\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-security-age-approach\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-security-age-approach\/\",\"name\":\"A New Security Age Needs a New Approach to Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-security-age-approach\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-security-age-approach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Lets-Make-Security-Easypng.png\",\"datePublished\":\"2018-11-07T17:34:35+00:00\",\"dateModified\":\"2025-08-13T07:35:03+00:00\",\"description\":\"Security evolves to meet the needs of the age. Keys, for example, were created to secure homes and possessions. Encryption, the elements of which stretch back for thousands of years, filled the need to secure messages over a long distance.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-security-age-approach\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-security-age-approach\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-security-age-approach\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Lets-Make-Security-Easypng.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Lets-Make-Security-Easypng.png\",\"width\":308,\"height\":208,\"caption\":\"woman in cybersecurity working on her laptop\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-security-age-approach\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"A New Security Age Needs a New Approach to Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8f583cc591401f92521b5efd0542e5d5\",\"name\":\"Shailaja Shankar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/2abe5e56865d1e1f7e90f294b861ea26\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/05\/Shaila-Shankar_Headshot-2020-e1621276254455-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/05\/Shaila-Shankar_Headshot-2020-e1621276254455-96x96.jpg\",\"caption\":\"Shailaja Shankar\"},\"description\":\"A seasoned technology and business executive with extensive experience building world class teams and best of breed software products. Shailaja has led global engineering teams delivering cloud-enabled security software solutions to &gt;500 million users. A passionate leader with a proven track record for launching innovative and first-to-market security solutions across consumer, SMB and enterprise segments. Most recently, as the General Manager of WW Mobile and ISP Business Unit, Shailaja lead the consumer IoT and connected home security strategy and execution leading a cross-functional team working with ISPs, Telcos, MVNOs and Router OEMs. Currently, Shailaja is responsible for security and threat defense solutions across endpoint platforms (ENS and EDR), eXtended detection and response platform (MVision XDR), data center security, and Cloud Native Application Protection Platform (MVision CNAPP).\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/shailaja-k-shankar-17740b1\/\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/shaila-shankar\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A New Security Age Needs a New Approach to Security","description":"Security evolves to meet the needs of the age. Keys, for example, were created to secure homes and possessions. Encryption, the elements of which stretch back for thousands of years, filled the need to secure messages over a long distance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"A New Security Age Needs a New Approach to Security","og_description":"Security evolves to meet the needs of the age. Keys, for example, were created to secure homes and possessions. Encryption, the elements of which stretch back for thousands of years, filled the need to secure messages over a long distance.","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-security-age-approach\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2018-11-07T17:34:35+00:00","article_modified_time":"2025-08-13T07:35:03+00:00","author":"Shailaja Shankar","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Shailaja Shankar","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-security-age-approach\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-security-age-approach\/"},"author":{"name":"Shailaja Shankar","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8f583cc591401f92521b5efd0542e5d5"},"headline":"A New Security Age Needs a New Approach to Security","datePublished":"2018-11-07T17:34:35+00:00","dateModified":"2025-08-13T07:35:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-security-age-approach\/"},"wordCount":467,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-security-age-approach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Lets-Make-Security-Easypng.png","keywords":["cybersecurity","Internet of Things"],"articleSection":["Internet Security","Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-security-age-approach\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-security-age-approach\/","name":"A New Security Age Needs a New Approach to Security","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-security-age-approach\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-security-age-approach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Lets-Make-Security-Easypng.png","datePublished":"2018-11-07T17:34:35+00:00","dateModified":"2025-08-13T07:35:03+00:00","description":"Security evolves to meet the needs of the age. Keys, for example, were created to secure homes and possessions. Encryption, the elements of which stretch back for thousands of years, filled the need to secure messages over a long distance.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-security-age-approach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/new-security-age-approach\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-security-age-approach\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Lets-Make-Security-Easypng.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Lets-Make-Security-Easypng.png","width":308,"height":208,"caption":"woman in cybersecurity working on her laptop"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-security-age-approach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"A New Security Age Needs a New Approach to Security"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8f583cc591401f92521b5efd0542e5d5","name":"Shailaja Shankar","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/2abe5e56865d1e1f7e90f294b861ea26","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/05\/Shaila-Shankar_Headshot-2020-e1621276254455-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/05\/Shaila-Shankar_Headshot-2020-e1621276254455-96x96.jpg","caption":"Shailaja Shankar"},"description":"A seasoned technology and business executive with extensive experience building world class teams and best of breed software products. Shailaja has led global engineering teams delivering cloud-enabled security software solutions to &gt;500 million users. A passionate leader with a proven track record for launching innovative and first-to-market security solutions across consumer, SMB and enterprise segments. Most recently, as the General Manager of WW Mobile and ISP Business Unit, Shailaja lead the consumer IoT and connected home security strategy and execution leading a cross-functional team working with ISPs, Telcos, MVNOs and Router OEMs. Currently, Shailaja is responsible for security and threat defense solutions across endpoint platforms (ENS and EDR), eXtended detection and response platform (MVision XDR), data center security, and Cloud Native Application Protection Platform (MVision CNAPP).","sameAs":["https:\/\/www.linkedin.com\/in\/shailaja-k-shankar-17740b1\/"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/shaila-shankar\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/92545","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1040"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=92545"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/92545\/revisions"}],"predecessor-version":[{"id":219369,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/92545\/revisions\/219369"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/160502"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=92545"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=92545"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=92545"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=92545"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}