{"id":98435,"date":"2020-02-10T21:01:13","date_gmt":"2020-02-11T05:01:13","guid":{"rendered":"\/blogs\/?p=98435"},"modified":"2025-06-02T01:27:22","modified_gmt":"2025-06-02T08:27:22","slug":"intelligence-in-the-enterprise","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/intelligence-in-the-enterprise\/","title":{"rendered":"Intelligence in the Enterprise"},"content":{"rendered":"<p>Intelligence\u00a0became an integral military discipline centuries ago.\u00a0More recently, this practice evolved into what is called Intelligence Preparation of the Battlefield, or IPB.\u00a0In both military and civilian agencies, the discipline uses information collection followed by analysis to provide guidance and direction to operators making tactical or organizational decisions. Used\u00a0strategically, this type of\u00a0intelligence puts an organization in a stronger position to operate offensively or defensively because in theory, they now know more than their enemy.<\/p>\n<p>This same concept can be applied in the theater of cybersecurity operations.\u00a0However, the current scope of intelligence in many enterprises describes just one aspect of the IPB discipline: information collection. The critical component missing to complete the process is a specialized researcher trained in this type of analysis and subsequent application of intelligence.<\/p>\n<p>A disciplined intelligence cycle goes deep\u2014applying advanced data collection methodologies from open, closed and propriety sources, social media, human intelligence and the dark web against areas such as cybercrime, hactivism, or cyber espionage to thoroughly analyze the adversary. Intelligence can ultimately be used to prepare organizations tactically and strategically to both anticipate and mitigate\u00a0modern threats.<\/p>\n<h2>The Latest From APG<\/h2>\n<p>The latest research and analysis from McAfee Advanced Program Group (APG) researcher Anne An detailing the actions of Chinese non-state threat actor groups is a great example of intelligence that is invaluable for organizations. This unique take on Chinese cyber criminality educates practitioners on the threats around them, empowering them to prepare their organization to be proactive, rather than reactive.\u00a0Further, there are many times where organizations are unaware they have been a victim of a cyberattack. This could include stolen data, which McAfee APG may find being sold on the dark markets, and in some cases, could have a devastating effect on their business.<\/p>\n<p>Sun Tzu, the Chinese general, and military strategist once articulated, \u201cThe art of war teaches us to rely not on the likelihood of the enemy\u2019s not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable.\u201d\u00a0 These ancient words are still very meaningful today.\u00a0If organizations robustly embrace the intelligence process, their defensive posture will exponentially improve.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Intelligence\u00a0became an integral military discipline centuries ago.\u00a0More recently, this practice evolved into what is called Intelligence Preparation of the Battlefield,&#8230;<\/p>\n","protected":false},"author":802,"featured_media":96564,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[4618],"class_list":["post-98435","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Intelligence in the Enterprise | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Intelligence\u00a0became an integral military discipline centuries ago.\u00a0More recently, this practice evolved into what is called Intelligence Preparation of\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Intelligence in the Enterprise | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Intelligence\u00a0became an integral military discipline centuries ago.\u00a0More recently, this practice evolved into what is called Intelligence Preparation of\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/intelligence-in-the-enterprise\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-11T05:01:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-02T08:27:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"659\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Patrick Flynn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@flynnpartyof5\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Patrick Flynn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/intelligence-in-the-enterprise\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/intelligence-in-the-enterprise\/\"},\"author\":{\"name\":\"Patrick Flynn\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/e5f3bcd4e5f40ce8a86db3115047de03\"},\"headline\":\"Intelligence in the Enterprise\",\"datePublished\":\"2020-02-11T05:01:13+00:00\",\"dateModified\":\"2025-06-02T08:27:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/intelligence-in-the-enterprise\/\"},\"wordCount\":380,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/intelligence-in-the-enterprise\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/intelligence-in-the-enterprise\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/intelligence-in-the-enterprise\/\",\"name\":\"Intelligence in the Enterprise | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/intelligence-in-the-enterprise\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/intelligence-in-the-enterprise\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg\",\"datePublished\":\"2020-02-11T05:01:13+00:00\",\"dateModified\":\"2025-06-02T08:27:22+00:00\",\"description\":\"Intelligence\u00a0became an integral military discipline centuries ago.\u00a0More recently, this practice evolved into what is called Intelligence Preparation of\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/intelligence-in-the-enterprise\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/intelligence-in-the-enterprise\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/intelligence-in-the-enterprise\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg\",\"width\":659,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/intelligence-in-the-enterprise\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Intelligence in the Enterprise\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/e5f3bcd4e5f40ce8a86db3115047de03\",\"name\":\"Patrick Flynn\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/8407022883bf49c802754371d6aa58f6\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Patrick-Flynn-96x96.jpeg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Patrick-Flynn-96x96.jpeg\",\"caption\":\"Patrick Flynn\"},\"description\":\"Patrick Flynn is a public sector security expert with more than 27 years' experience in the federal government and private sector. Flynn is currently Head, McAfee Advanced Programs Group, and previously served in similar roles at Northrop Grumman and General Dynamics. Flynn's public sector experience includes work at the U.S. Department of Homeland Security as the Director of Communications of the Joint Wireless Program Office. He also served as Assistant Chief of the CBP Office of Border Patrol. Prior to that role he served as a U.S. Border Patrol Agent. Flynn is retired from the U.S. Naval Reserve, Office of Naval Intelligence, and was awarded a Bronze Star for his service in Operation Enduring Freedom in Afghanistan. He formally, served on the both President Obama and Trump\u2019s National Security Telecommunications Advisory Council. Flynn holds a B.S. in the Administration of Criminal Justice.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/patrick-flynn-71a23a1\/\",\"https:\/\/x.com\/flynnpartyof5\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/patrick-flynn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Intelligence in the Enterprise | McAfee Blog","description":"Intelligence\u00a0became an integral military discipline centuries ago.\u00a0More recently, this practice evolved into what is called Intelligence Preparation of","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Intelligence in the Enterprise | McAfee Blog","og_description":"Intelligence\u00a0became an integral military discipline centuries ago.\u00a0More recently, this practice evolved into what is called Intelligence Preparation of","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/intelligence-in-the-enterprise\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2020-02-11T05:01:13+00:00","article_modified_time":"2025-06-02T08:27:22+00:00","og_image":[{"width":659,"height":500,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg","type":"image\/jpeg"}],"author":"Patrick Flynn","twitter_card":"summary_large_image","twitter_creator":"@flynnpartyof5","twitter_site":"@McAfee","twitter_misc":{"Written by":"Patrick Flynn","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/intelligence-in-the-enterprise\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/intelligence-in-the-enterprise\/"},"author":{"name":"Patrick Flynn","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/e5f3bcd4e5f40ce8a86db3115047de03"},"headline":"Intelligence in the Enterprise","datePublished":"2020-02-11T05:01:13+00:00","dateModified":"2025-06-02T08:27:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/intelligence-in-the-enterprise\/"},"wordCount":380,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/intelligence-in-the-enterprise\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/intelligence-in-the-enterprise\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/intelligence-in-the-enterprise\/","name":"Intelligence in the Enterprise | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/intelligence-in-the-enterprise\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/intelligence-in-the-enterprise\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg","datePublished":"2020-02-11T05:01:13+00:00","dateModified":"2025-06-02T08:27:22+00:00","description":"Intelligence\u00a0became an integral military discipline centuries ago.\u00a0More recently, this practice evolved into what is called Intelligence Preparation of","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/intelligence-in-the-enterprise\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/intelligence-in-the-enterprise\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/intelligence-in-the-enterprise\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Glass-focused-on-virus-in-digital-code-illustration-659x500.jpg","width":659,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/intelligence-in-the-enterprise\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Intelligence in the Enterprise"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/e5f3bcd4e5f40ce8a86db3115047de03","name":"Patrick Flynn","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/8407022883bf49c802754371d6aa58f6","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Patrick-Flynn-96x96.jpeg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Patrick-Flynn-96x96.jpeg","caption":"Patrick Flynn"},"description":"Patrick Flynn is a public sector security expert with more than 27 years' experience in the federal government and private sector. Flynn is currently Head, McAfee Advanced Programs Group, and previously served in similar roles at Northrop Grumman and General Dynamics. Flynn's public sector experience includes work at the U.S. Department of Homeland Security as the Director of Communications of the Joint Wireless Program Office. He also served as Assistant Chief of the CBP Office of Border Patrol. Prior to that role he served as a U.S. Border Patrol Agent. Flynn is retired from the U.S. Naval Reserve, Office of Naval Intelligence, and was awarded a Bronze Star for his service in Operation Enduring Freedom in Afghanistan. He formally, served on the both President Obama and Trump\u2019s National Security Telecommunications Advisory Council. Flynn holds a B.S. in the Administration of Criminal Justice.","sameAs":["https:\/\/www.linkedin.com\/in\/patrick-flynn-71a23a1\/","https:\/\/x.com\/flynnpartyof5"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/patrick-flynn\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/98435","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/802"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=98435"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/98435\/revisions"}],"predecessor-version":[{"id":214820,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/98435\/revisions\/214820"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/96564"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=98435"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=98435"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=98435"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=98435"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}