{"id":25908,"date":"2025-07-25T07:29:11","date_gmt":"2025-07-25T15:29:11","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2025\/07\/25\/news-19628\/"},"modified":"2025-07-25T07:29:11","modified_gmt":"2025-07-25T15:29:11","slug":"news-19628","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2025\/07\/25\/news-19628\/","title":{"rendered":"Microsoft expands Zero Trust workshop to cover network, SecOps, and more"},"content":{"rendered":"<p><strong>Credit to Author: Rob Lefferts| Date: Wed, 09 Jul 2025 16:00:00 +0000<\/strong><\/p>\n<h2 class=\"wp-block-heading\" id=\"building-on-identity-devices-and-data-the-workshop-now-covers-network-infrastructure-and-secops\">Building on identity, devices, and data, the workshop now covers network, infrastructure, and SecOps<\/h2>\n<p class=\"wp-block-paragraph\">As the nature of cyberthreats and security challenges evolve, organizations have coalesced around a Zero Trust architecture as the approach to modernize their end-to-end security adoption and posture. In November 2024, we introduced a preview of the Microsoft Zero Trust workshop that focused on the traditional \u201csecure access\u201d pillars (identity, data, and devices). We are announcing the expansion of the <a href=\"https:\/\/aka.ms\/ZTWorkshop\">Zero Trust workshop<\/a> to cover the additional technical pillars of Zero Trust\u2014assisting customers on strategies that may contribute to securing their network, infrastructure, and connecting all these elements with security operations (SecOps). We invite you to take a look at the newly expanded workshop, give it a try, and share feedback with us as you continue on your end-to-end security modernization journey.<\/p>\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-11 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-75\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/aka.ms\/ZTWorkshop\">Learn more about the new Microsoft Zero Trust workshop<\/a><\/div>\n<\/p><\/div>\n<h2 class=\"wp-block-heading\" id=\"the-need-for-a-zero-trust-workshop\">The need for a Zero Trust workshop<\/h2>\n<p class=\"wp-block-paragraph\">Customers have consistently told us that they see <a href=\"https:\/\/www.microsoft.com\/security\/business\/zero-trust\">Zero Trust<\/a> as a strategic foundation for how they approach and run a modern security practice. However, customers have also shared that they need help and guidance understanding how their security products could help them achieve a Zero Trust vision, and how they can measure how far along they are on their journey to implement Zero Trust.<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2025\/07\/Picture1-1024x584.webp\" alt=\"Graph showing which areas customers want help with when implementing Zero Trust.\" class=\"wp-image-140935 webp-format\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2025\/07\/Picture1-1024x584.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2025\/07\/Picture1-300x171.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2025\/07\/Picture1-768x438.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2025\/07\/Picture1.webp 1202w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2025\/07\/Picture1-1024x584.webp\"><\/figure>\n<p class=\"wp-block-paragraph\"><em>Figure 1. Top areas customers ask for help with in advancing their Zero Trust journey.<\/em><\/p>\n<p class=\"wp-block-paragraph\">Last year, we introduced the Microsoft Zero Trust workshop as a valuable resource for our customers and partners. By guiding participants through a comprehensive journey across the pillars of Zero Trust, this workshop aims to assist with strategies to deploy security products and features. It outlines the priority of tasks, provides a framework to track progress, and allows participants to measure their advancements against established benchmarks in subsequent evaluations.<\/p>\n<p class=\"wp-block-paragraph\">In the initial launch, we focused on three key pillars of the Zero Trust framework:<\/p>\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Identity<\/strong>: Ensuring that the right people have access to the right resources through robust authentication and authorization mechanisms.<\/li>\n<li class=\"wp-block-list-item\"><strong>Devices<\/strong>: Securing endpoints to prevent unauthorized access and to ensure compliance with organizational policies.<\/li>\n<li class=\"wp-block-list-item\"><strong>Data<\/strong>: Protecting sensitive information through encryption, data classification, and access control.<\/li>\n<\/ul>\n<p class=\"wp-block-paragraph\">This foundational approach emphasizes strategies on preventative security capabilities and access control to resources. These pillars served as the cornerstone for ways in which organizations could better secure their systems against unauthorized access and data breaches. Since its launch, the workshop has been downloaded more than 3,000 times by customers to enhance their end-to-end security posture. More than 150 Microsoft Partners trained to use it as well, with several adopting it as a delivery mechanism.<\/p>\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-12 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-75\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/aka.ms\/ZTWorkshop\">Get started with the expanded Microsoft Zero Trust workshop<\/a><\/div>\n<\/p><\/div>\n<h2 class=\"wp-block-heading\" id=\"access-control-posture-and-detection-and-response\">Access control, posture, and detection and response<\/h2>\n<p class=\"wp-block-paragraph\">We\u2019re proud to announce that we have expanded the Zero Trust workshop from three Zero Trust pillars to cover a total of six pillars, adding: <\/p>\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Networking<\/strong>: Implementing micro-segmentation, real-time threat detection, and secure access to network resources to ensure comprehensive network security.<\/li>\n<\/ul>\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;68839a92419fa&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-full wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2025\/07\/Picture2.webp\" alt=\"Image of the network pillar of the Zero Trust Workshop.\" class=\"wp-image-140936 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2025\/07\/Picture2.webp\"><button \t\t\tclass=\"lightbox-trigger\" \t\t\ttype=\"button\" \t\t\taria-haspopup=\"dialog\" \t\t\taria-label=\"Enlarge image: Image of the network pillar of the Zero Trust Workshop.\" \t\t\tdata-wp-init=\"callbacks.initTriggerButton\" \t\t\tdata-wp-on-async--click=\"actions.showLightbox\" \t\t\tdata-wp-style--right=\"state.imageButtonRight\" \t\t\tdata-wp-style--top=\"state.imageButtonTop\" \t\t> \t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\"> \t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/> \t\t\t<\/svg> \t\t<\/button><\/figure>\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Infrastructure<\/strong>: Securing cloud and on-premises infrastructure through robust configurations, access management, and continuous monitoring.<\/li>\n<\/ul>\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;68839a9244976&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-full wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2025\/07\/Picture3.webp\" alt=\"Image of the infrastructure pillar of the Zero Trust workshop.\" class=\"wp-image-140937 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2025\/07\/Picture3.webp\"><button \t\t\tclass=\"lightbox-trigger\" \t\t\ttype=\"button\" \t\t\taria-haspopup=\"dialog\" \t\t\taria-label=\"Enlarge image: Image of the infrastructure pillar of the Zero Trust workshop.\" \t\t\tdata-wp-init=\"callbacks.initTriggerButton\" \t\t\tdata-wp-on-async--click=\"actions.showLightbox\" \t\t\tdata-wp-style--right=\"state.imageButtonRight\" \t\t\tdata-wp-style--top=\"state.imageButtonTop\" \t\t> \t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\"> \t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/> \t\t\t<\/svg> \t\t<\/button><\/figure>\n<div class=\"alignright wp-block-bloginabox-theme-kicker\" data-bi-an=\"Kicker Left\">\n<div class=\"kicker\">\n<h2 class=\"kicker__title\"> \t\t\tWhat is threat detection and response?\t\t<\/h2>\n<p class=\"kicker__content\"> \t\t\t\t\t\t\t<a \t\t\t\t\thref=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/security-101\/what-is-threat-detection-response-tdr\" \t\t\t\t\tclass=\"kicker__link\" \t\t\t\t\ttarget=\"_blank\" rel=\"noopener noreferrer\"\t\t\t\t> \t\t\t\t\t\tRead more. \t\t\t\t\t\t\t\u2197<\/a> \t\t\t\t\t<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>SecOps<\/strong>: Strengthening threat detection and response capabilities through Microsoft Defender for Identity, Defender for Endpoint, Defender for Office, Defender for Cloud Apps, Defender XDR, and Microsoft Sentinel.<\/li>\n<\/ul>\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;68839a9247a43&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-full wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2025\/07\/screenshot.webp\" alt=\"Image of the Security Operations Pillar of the Zero Trust workshop.\" class=\"wp-image-141140 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2025\/07\/screenshot.webp\"><button \t\t\tclass=\"lightbox-trigger\" \t\t\ttype=\"button\" \t\t\taria-haspopup=\"dialog\" \t\t\taria-label=\"Enlarge image: Image of the Security Operations Pillar of the Zero Trust workshop.\" \t\t\tdata-wp-init=\"callbacks.initTriggerButton\" \t\t\tdata-wp-on-async--click=\"actions.showLightbox\" \t\t\tdata-wp-style--right=\"state.imageButtonRight\" \t\t\tdata-wp-style--top=\"state.imageButtonTop\" \t\t> \t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\"> \t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/> \t\t\t<\/svg> \t\t<\/button><\/figure>\n<p class=\"wp-block-paragraph\">These additions highlight the Microsoft commitment to a holistic approach to security: helping to better enable organizations with strategies and tools not only to strengthen protection against cyberthreats but also to detect and respond to incidents effectively. The full workshop has been tested by early adopting customers and partners, and the feedback has been very exciting:<\/p>\n<blockquote class=\"wp-block-quote has-quote-default-font-size is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-body-large-font-size wp-block-paragraph\"><em>\u201cYou\u2019ve captured the Zero Trust model better than any other [Cloud Solution Provider<\/em>] <em>CSP in the market. It\u2019s very well-articulated and aligns very strongly with the way we approach it.\u201d <\/em><\/p>\n<p class=\"has-body-large-font-size wp-block-paragraph\"><em>\u2014Denis O&#8217;Shea, Founder and Chief Executive Officer, Mobile Mentor<\/em><\/p>\n<\/blockquote>\n<h2 class=\"wp-block-heading has-h-2-font-size\" id=\"richer-guidance-connecting-the-dots\">Richer guidance connecting the dots<\/h2>\n<p class=\"wp-block-paragraph\">In addition to adding the three new pillars, we\u2019ve made significant enhancements to the workshop based on your feedback: <\/p>\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Implementation effort and user impact indicators<\/strong>: Now every step in any given pillar of the workshop comes with a high-level estimate of how much effort it would require of your team to deploy, as well as how much of an impact it would have on your users\u2014to help you fully assess when your team and your organization can take on each step.<\/li>\n<\/ul>\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;68839a924ad07&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-full wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2025\/07\/Picture5.webp\" alt=\"Image focusing on the implementation of effort of the Zero Trust Workshop.\" class=\"wp-image-140939 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2025\/07\/Picture5.webp\"><button \t\t\tclass=\"lightbox-trigger\" \t\t\ttype=\"button\" \t\t\taria-haspopup=\"dialog\" \t\t\taria-label=\"Enlarge image: Image focusing on the implementation of effort of the Zero Trust Workshop.\" \t\t\tdata-wp-init=\"callbacks.initTriggerButton\" \t\t\tdata-wp-on-async--click=\"actions.showLightbox\" \t\t\tdata-wp-style--right=\"state.imageButtonRight\" \t\t\tdata-wp-style--top=\"state.imageButtonTop\" \t\t> \t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\"> \t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/> \t\t\t<\/svg> \t\t<\/button><\/figure>\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Connecting the cross-pillars scenarios<\/strong>: In our Zero Trust deployment conversations with customers, one of the biggest challenges they\u2019ve raised is implementing scenarios that span multiple Zero Trust pillars. These scenarios are difficult because they typically involve different teams and stakeholders across their organization. The updated workshop now explicitly highlights these cross-pillar scenarios and identifies the relevant owners, helping customers bring the right people into the discussion and align on next steps.<\/li>\n<\/ul>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2025\/07\/Picture6.webp\" alt=\"Image of specific steps of the Zero Trust workshop.\" class=\"wp-image-140940 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2025\/07\/Picture6.webp\"><\/figure>\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-13 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-75\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/aka.ms\/ZTWorkshop\">Try the new and expanded Zero Trust workshop<\/a><\/div>\n<\/p><\/div>\n<h2 class=\"wp-block-heading\" id=\"we-re-committed-to-helping-you-secure-your-organization\">We\u2019re committed to helping you secure your organization<\/h2>\n<p class=\"wp-block-paragraph\">The Microsoft Zero Trust workshop is more than a training session\u2014it\u2019s a call to action for organizations to reimagine their approach to security in the modern digital landscape and operationalize this vision. With the expanded pillars, this workshop now includes comprehensive insights for implementing a Zero Trust strategy that covers posture, prevention, detection, and response. <a href=\"https:\/\/aka.ms\/ZTWorkshop\">Give it a try today<\/a>.<\/p>\n<p class=\"wp-block-paragraph\">We are committed to enabling our partners to utilize the workshop to assist our mutual customers in implementing comprehensive security solutions. If you are one of our valued partners, please review our <a href=\"https:\/\/learn.microsoft.com\/security\/zero-trust\/zero-trust-partner-kit\">Zero Trust partner kit<\/a>.<\/p>\n<p class=\"wp-block-paragraph\">Use the Zero Trust workshop together with the <a href=\"https:\/\/aka.ms\/ztdocs\">Zero Trust guidance center<\/a> and learn more about the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/zero-trust\">Zero Trust security framework<\/a>. <\/p>\n<p class=\"wp-block-paragraph\">If you have feedback to share with us about the workshop, please provide it <a href=\"https:\/\/aka.ms\/ztworkshop\/feedback\">here<\/a>.<\/p>\n<p class=\"wp-block-paragraph\">To learn more about Microsoft Security solutions, visit our <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\">website.<\/a> Bookmark the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Security blog<\/a> to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (<a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\">Microsoft Security<\/a>) and X (<a href=\"https:\/\/twitter.com\/@MSFTSecurity\">@MSFTSecurity<\/a>) for the latest news and updates on cybersecurity.<\/p>\n<figure class=\"wp-block-embed\">\n<div class=\"wp-block-embed__wrapper\"> https:\/\/aka.ms\/ztworkshop\/feedback <\/div>\n<\/figure>\n<p>The post <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/07\/09\/microsoft-expands-zero-trust-workshop-to-cover-network-secops-and-more\/\">Microsoft expands Zero Trust workshop to cover network, SecOps, and more<\/a> appeared first on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/07\/09\/microsoft-expands-zero-trust-workshop-to-cover-network-secops-and-more\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Rob Lefferts| Date: Wed, 09 Jul 2025 16:00:00 +0000<\/strong><\/p>\n<p>The Microsoft Zero Trust workshop has been expanded to cover all six pillars of Zero Trust security, providing a comprehensive guide for organizations to modernize their security posture. <\/p>\n<p>The post <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/07\/09\/microsoft-expands-zero-trust-workshop-to-cover-network-secops-and-more\/\">Microsoft expands Zero Trust workshop to cover network, SecOps, and more<\/a> appeared first on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[],"class_list":["post-25908","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25908","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=25908"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25908\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=25908"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=25908"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=25908"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}