{"id":7046,"date":"2017-03-20T10:30:16","date_gmt":"2017-03-20T18:30:16","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/03\/20\/news-837\/"},"modified":"2017-03-20T10:30:16","modified_gmt":"2017-03-20T18:30:16","slug":"news-837","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/03\/20\/news-837\/","title":{"rendered":"7 universal rules of threat intelligence"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt1.staticworld.net\/images\/article\/2017\/02\/1_threatening-100710025-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Ryan Francis| Date: Mon, 20 Mar 2017 10:00:00 -0700<\/strong><\/p>\n<p><a href=\"http:\/\/www.computerworld.com\/article\/3176089\/security\/7-universal-rules-of-threat-intelligence.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Ryan Francis| Date: Mon, 20 Mar 2017 10:00:00 -0700<\/strong><\/p>\n<article class=\"slideshow\">\n<figure class=\"slide\"><figcaption>Threatening<\/figcaption><img decoding=\"async\" data-imageid=\"100710025\" src=\"https:\/\/cms-images.idgesg.net\/images\/article\/2017\/02\/1_threatening-100710025-orig.jpg\" data-thumb-src=\"https:\/\/cms-images.idgesg.net\/images\/article\/2017\/02\/1_threatening-100710025-orig.jpg\" alt=\"1 threatening\" data-license=\"Getty Images\"\/><\/p>\n<p class=\"slideCredit\">Image by <span class=\"slideCreditText\">Thinkstock<\/span><\/p>\n<div class=\"slideBody\">\n<p>Cybersecurity is a heroic task. Every day, businesses and organizations face an onslaught of attacks from malicious actors across the globe. As part of your organization\u2019s cybersecurity efforts, it is your job to not just catch these attacks as they happen, but try to mitigate threats and prevent them before anything occurs.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3176089\/security\/7-universal-rules-of-threat-intelligence.html#jump\">To read this article in full or to leave a comment, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[11069,714],"class_list":["post-7046","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-data-security","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7046","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7046"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7046\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7046"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7046"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7046"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}