{"id":92703,"date":"2018-11-14T09:23:45","date_gmt":"2018-11-14T17:23:45","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=92703"},"modified":"2025-08-13T00:32:57","modified_gmt":"2025-08-13T07:32:57","slug":"why-traditional-database-security-doesnt-protect-data","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/why-traditional-database-security-doesnt-protect-data\/","title":{"rendered":"Why Traditional Database Security Doesn\u2019t Protect Data"},"content":{"rendered":"<p>If we asked database administrators, security teams, and risk teams about their definition of what database security is, the answers would vary widely.<\/p>\n<p>Each team views the definition based on their own requirements, but the one answer that most likely won\u2019t appear is: \u201cTo protect data.\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-92704 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/11\/image002-1.png\" alt=\"\" width=\"1074\" height=\"578\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/image002-1.png 1074w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/image002-1-300x161.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/image002-1-768x413.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/image002-1-1024x551.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/image002-1-929x500.png 929w\" sizes=\"auto, (max-width: 1074px) 100vw, 1074px\" \/><\/p>\n<p>Traditionally, database security has always been seen as a means to protect the database systems from vulnerabilities, missing patches, simple misconfigurations, or SQL injections. While this certainly holds true in today\u2019s environments too, we cannot ignore the fact that requirements for securing a company\u2019s most valuable asset\u2014its data\u2014have changed.<\/p>\n<h2>Adding data to database security<\/h2>\n<p>With the increase in regulatory compliance requirements such as PCI-DSS, HIPAA, SOX, and GDPR, enterprises are asking more and more from their data protection solutions. Data is seen as the new oil\u2014a way to fuel companies. Protecting data must be at the core of every strategy. Where better to start than the one place most data resides, the database?<\/p>\n<p>Database security solutions in today\u2019s data- and compliance-driven environments must not only allow companies to measure the level of security of their databases but must provide the ability to locate personal identifiable data, business critical data, and any other data that is of value to the organization.<\/p>\n<p>In addition, any data that is discovered must be monitored, in real time, 24\/7. Long gone are the days when audit logs were sufficient or simple network monitoring was considered adequate. Data is the world\u2019s greatest asset and companies must invest in protecting their own data as well as their customers\u2019 data.<\/p>\n<h2>As-a-service: a world of shared responsibilities<\/h2>\n<p>Database(s)-as-a-service is one of the fastest growing markets within the world of cloud. It provides organizations with unparalleled amounts of scalability and compute power while at the same time removing many of the challenges that we would see as traditionally related to database security (vulnerability and patch management, for example). In the shared responsibility world of the cloud, the one constant is data. Customers are always responsible for protecting and monitoring their data.<\/p>\n<p>Too many data breaches are successful because the exfiltration of data was made possible by either very little or no real-time monitoring of the data. Traditional database security is not designed to protect data, it\u2019s designed to protect the database from malicious SQL injections or vulnerabilities. One might argue that is data protection. But in reality, database security in today\u2019s data-driven environments must allow organizations to monitor anyone and anything that accesses the \u201ccrown jewels,\u201d in real time, with the ability to stop unauthorized access to data.<\/p>\n<p>McAfee helps fill that gap by offering software-based database security solutions that allow the monitoring of database instances across both on-premises solutions and the cloud. Non-intrusive, lightweight, and easy to deploy, McAfee database security solutions allow customers to enjoy all the benefits of moving to a hybrid cloud enterprise database environment while retaining control over security, risk, and\u00a0<a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/solutions\/pervasive-data-protection.html\" target=\"_blank\" rel=\"noopener\">data protection<\/a>.<\/p>\n<p>For more information, visit the <a href=\"https:\/\/www.mcafee.com\/us\/products\/database-security\/index.aspx\" target=\"_blank\" rel=\"noopener\">database security product information page<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If we asked database administrators, security teams, and risk teams about their definition of what database security is, the answers&#8230;<\/p>\n","protected":false},"author":1018,"featured_media":92706,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,13],"tags":[],"coauthors":[5489],"class_list":["post-92703","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-privacy-identity-protection"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why Traditional Database Security Doesn\u2019t Protect Data | McAfee Blog<\/title>\n<meta name=\"description\" content=\"If we asked database administrators, security teams, and risk teams about their definition of what database security is, the answers would vary widely.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Traditional Database Security Doesn\u2019t Protect Data | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"If we asked database administrators, security teams, and risk teams about their definition of what database security is, the answers would vary widely.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/why-traditional-database-security-doesnt-protect-data\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-14T17:23:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-13T07:32:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/business_overhead_malefemale_talking.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1365\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Markus Strauss\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@markusstrauss4\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Markus Strauss\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/why-traditional-database-security-doesnt-protect-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/why-traditional-database-security-doesnt-protect-data\/\"},\"author\":{\"name\":\"Markus Strauss\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/b55ecfe1655f8cf04a3b7e0574e1420e\"},\"headline\":\"Why Traditional Database Security Doesn\u2019t Protect Data\",\"datePublished\":\"2018-11-14T17:23:45+00:00\",\"dateModified\":\"2025-08-13T07:32:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/why-traditional-database-security-doesnt-protect-data\/\"},\"wordCount\":513,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/why-traditional-database-security-doesnt-protect-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/business_overhead_malefemale_talking.jpg\",\"articleSection\":[\"Internet Security\",\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/why-traditional-database-security-doesnt-protect-data\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/why-traditional-database-security-doesnt-protect-data\/\",\"name\":\"Why Traditional Database Security Doesn\u2019t Protect Data | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/why-traditional-database-security-doesnt-protect-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/why-traditional-database-security-doesnt-protect-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/business_overhead_malefemale_talking.jpg\",\"datePublished\":\"2018-11-14T17:23:45+00:00\",\"dateModified\":\"2025-08-13T07:32:57+00:00\",\"description\":\"If we asked database administrators, security teams, and risk teams about their definition of what database security is, the answers would vary widely.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/why-traditional-database-security-doesnt-protect-data\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/why-traditional-database-security-doesnt-protect-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/why-traditional-database-security-doesnt-protect-data\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/business_overhead_malefemale_talking.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/business_overhead_malefemale_talking.jpg\",\"width\":2048,\"height\":1365,\"caption\":\"man and woman talking about business\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/why-traditional-database-security-doesnt-protect-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy &amp; Identity Protection\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Why Traditional Database Security Doesn\u2019t Protect Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/b55ecfe1655f8cf04a3b7e0574e1420e\",\"name\":\"Markus Strauss\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/9ef131415e985b2dcce76602329d161b\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/05\/Markus-150x150.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/05\/Markus-150x150.jpg\",\"caption\":\"Markus Strauss\"},\"description\":\"Markus Strauss is a Product Manager at McAfee, driving the future of the McAfee Database Security product line. He is a seasoned professional with 20 years\u2019 experience in risk management and cybersecurity. Prior to McAfee, Markus spend time with GE, New Relic, and several other enterprise organizations where he held various leadership and technical roles. In his spare time, Markus enjoys working on his classic motorcycles and time or skill permitting, enjoys actually riding them along the Irish coastline.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/markusstrauss\/\",\"https:\/\/x.com\/markusstrauss4\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/markus-strauss\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why Traditional Database Security Doesn\u2019t Protect Data | McAfee Blog","description":"If we asked database administrators, security teams, and risk teams about their definition of what database security is, the answers would vary widely.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Why Traditional Database Security Doesn\u2019t Protect Data | McAfee Blog","og_description":"If we asked database administrators, security teams, and risk teams about their definition of what database security is, the answers would vary widely.","og_url":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/why-traditional-database-security-doesnt-protect-data\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2018-11-14T17:23:45+00:00","article_modified_time":"2025-08-13T07:32:57+00:00","og_image":[{"width":2048,"height":1365,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/business_overhead_malefemale_talking.jpg","type":"image\/jpeg"}],"author":"Markus Strauss","twitter_card":"summary_large_image","twitter_creator":"@markusstrauss4","twitter_site":"@McAfee","twitter_misc":{"Written by":"Markus Strauss","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/why-traditional-database-security-doesnt-protect-data\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/why-traditional-database-security-doesnt-protect-data\/"},"author":{"name":"Markus Strauss","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/b55ecfe1655f8cf04a3b7e0574e1420e"},"headline":"Why Traditional Database Security Doesn\u2019t Protect Data","datePublished":"2018-11-14T17:23:45+00:00","dateModified":"2025-08-13T07:32:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/why-traditional-database-security-doesnt-protect-data\/"},"wordCount":513,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/why-traditional-database-security-doesnt-protect-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/business_overhead_malefemale_talking.jpg","articleSection":["Internet Security","Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/why-traditional-database-security-doesnt-protect-data\/","url":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/why-traditional-database-security-doesnt-protect-data\/","name":"Why Traditional Database Security Doesn\u2019t Protect Data | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/why-traditional-database-security-doesnt-protect-data\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/why-traditional-database-security-doesnt-protect-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/business_overhead_malefemale_talking.jpg","datePublished":"2018-11-14T17:23:45+00:00","dateModified":"2025-08-13T07:32:57+00:00","description":"If we asked database administrators, security teams, and risk teams about their definition of what database security is, the answers would vary widely.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/why-traditional-database-security-doesnt-protect-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/why-traditional-database-security-doesnt-protect-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/why-traditional-database-security-doesnt-protect-data\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/business_overhead_malefemale_talking.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/business_overhead_malefemale_talking.jpg","width":2048,"height":1365,"caption":"man and woman talking about business"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/why-traditional-database-security-doesnt-protect-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Privacy &amp; Identity Protection","item":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/"},{"@type":"ListItem","position":3,"name":"Why Traditional Database Security Doesn\u2019t Protect Data"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/b55ecfe1655f8cf04a3b7e0574e1420e","name":"Markus Strauss","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/9ef131415e985b2dcce76602329d161b","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/05\/Markus-150x150.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/05\/Markus-150x150.jpg","caption":"Markus Strauss"},"description":"Markus Strauss is a Product Manager at McAfee, driving the future of the McAfee Database Security product line. He is a seasoned professional with 20 years\u2019 experience in risk management and cybersecurity. Prior to McAfee, Markus spend time with GE, New Relic, and several other enterprise organizations where he held various leadership and technical roles. In his spare time, Markus enjoys working on his classic motorcycles and time or skill permitting, enjoys actually riding them along the Irish coastline.","sameAs":["https:\/\/www.linkedin.com\/in\/markusstrauss\/","https:\/\/x.com\/markusstrauss4"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/markus-strauss\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/92703","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1018"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=92703"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/92703\/revisions"}],"predecessor-version":[{"id":219366,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/92703\/revisions\/219366"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/92706"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=92703"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=92703"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=92703"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=92703"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}