{"id":1585451,"date":"2017-08-23T13:56:50","date_gmt":"2017-08-23T19:56:50","guid":{"rendered":"http:\/\/secblvd.wpengine.com\/?page_id=1585451"},"modified":"2018-01-11T02:06:07","modified_gmt":"2018-01-11T07:06:07","slug":"security-analytics","status":"publish","type":"page","link":"https:\/\/securityboulevard.com\/security-analytics\/","title":{"rendered":"Security Analytics"},"content":{"rendered":"<div id=\"pl-1585451\"  class=\"panel-layout\" ><div id=\"pg-1585451-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-1585451-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-1585451-0-0-0\" class=\"so-panel widget_text panel-first-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-1585451-0-0-0\" >\t\t\t<div class=\"textwidget\"><h1>Analytics and Intelligence<\/h1>\n<\/div>\n\t\t<\/div><\/div><div id=\"panel-1585451-0-0-1\" class=\"widget_text so-panel widget_custom_html\" data-index=\"1\" ><div class=\"textwidget custom-html-widget\"><div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-scrollable pt-cv-colsys pt-cv-reused\" id=\"pt-cv-view-2f53dd3mdc\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div id=\"aa76dccuvj\" class=\"pt-cv-carousel pt-cv-slide\" data-ride=\"cvcarousel\" data-interval=10000>\n<div class=\"carousel-inner\"><div class=\"item active\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2034878\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/canada-china-cccs-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/canada-richixbw-nic-amaya-W8EP1hOwO7E-unsplash.png\" class=\"pt-cv-thumbnail img-none\" alt=\"Canadian \u201cmounties\u201d marching down the street\" srcset=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/canada-richixbw-nic-amaya-W8EP1hOwO7E-unsplash.png 770w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/canada-richixbw-nic-amaya-W8EP1hOwO7E-unsplash-300x117.png 300w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/canada-richixbw-nic-amaya-W8EP1hOwO7E-unsplash-768x299.png 768w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/canada-china-cccs-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >\u00d4! China Hacks Canada too, Says CCCS<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-01T12:44:35-04:00\">1 month ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2034486\"><a href=\"https:\/\/securityboulevard.com\/2024\/10\/jpmorgan-chase-bank-glitch-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/10\/jpmorgan-chase-glitch-richixbw.png\" class=\"pt-cv-thumbnail img-none\" alt=\"An unfortunate TikToker shows off his negative balance\" srcset=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/10\/jpmorgan-chase-glitch-richixbw.png 770w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/10\/jpmorgan-chase-glitch-richixbw-300x117.png 300w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/10\/jpmorgan-chase-glitch-richixbw-768x299.png 768w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/10\/jpmorgan-chase-bank-glitch-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >TikTok \u2018Infinite Money Glitch\u2019 \u2014 Idiots Chased by JPMorgan<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-10-29T12:11:23-04:00\">1 month ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2034377\"><a href=\"https:\/\/securityboulevard.com\/2024\/10\/pwc-survey-surfaces-lack-of-focus-on-cyber-resiliency\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/10\/feedback-3709752_1280-1-770x300.jpg\" class=\"pt-cv-thumbnail img-none\" alt=\"Survey, PwC,\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/10\/pwc-survey-surfaces-lack-of-focus-on-cyber-resiliency\/\" class=\"_self cvplbd\" target=\"_self\" >PwC Survey Surfaces Lack of Focus on Cyber Resiliency<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/mike-vizard\/\" rel=\"author\">Michael Vizard<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-10-28T07:00:33-04:00\">1 month ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div><\/div>\n<a class=\"left carousel-control\" data-target=\"#aa76dccuvj\" data-cvslide=\"prev\">\r\n\t\t\t\t\t\t<span class=\"glyphicon glyphicon-chevron-left\"><\/span>\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<a class=\"right carousel-control\" data-target=\"#aa76dccuvj\" data-cvslide=\"next\">\r\n\t\t\t\t\t\t<span class=\"glyphicon glyphicon-chevron-right\"><\/span>\r\n\t\t\t\t\t<\/a><\/div><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-1241780g4b\">#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 40px !important; font-weight: 600 !important; line-height: 1.0 !important; }\n@media (min-width: 768px) and (max-width: 991px) {#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 20px !important }}\n@media (max-width: 767px) {#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 14px !important }}\n#pt-cv-view-2f53dd3mdc .pt-cv-carousel-caption  { background-color: rgba(51,51,51,.6) !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-meta-fields * { color: #ffffff !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-readmore  { color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-readmore:hover  { color: #ffffff !important; background-color: #00aeef !important; }<\/style>\r\n\t\t\t<\/div><\/div><div id=\"panel-1585451-0-0-2\" class=\"widget_text so-panel widget_custom_html panel-last-child\" data-index=\"2\" ><div class=\"textwidget custom-html-widget\"><div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-pinterest pt-cv-colsys pt-cv-shadow pt-cv-no-bb pt-cv-pgloadmore pt-cv-reused\" id=\"pt-cv-view-63f1e1bp89\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037657\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/interpol-african-nations-arrest-1006-in-sweeping-operation-serengeti\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"Interpol Operation Synergia ransomware phishing\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/interpol-african-nations-arrest-1006-in-sweeping-operation-serengeti\/\" class=\"_self cvplbd\" target=\"_self\" >Interpol, African Nations Arrest 1,006 in Sweeping \u2018Operation Serengeti\u2019<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-27T14:28:48-05:00\">November 27, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/africa-cybersecurity\/' title='Africa Cybersecurity' class='pt-cv-tax-africa-cybersecurity'>Africa Cybersecurity<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/interpol\/' title='Interpol' class='pt-cv-tax-interpol'>Interpol<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/online-scams\/' title='online scams' class='pt-cv-tax-online-scams'>online scams<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ransomware\/' title='Ransomware' class='pt-cv-tax-ransomware'>Ransomware<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Interpol led 19 African countries in a massive anti-cybercriminal effort dubbed \"Operation Serengeti\" that shut down a range of scams and attacks that bled $193 million from 35,000 victims. More than 1,000 ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037571\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/the-quest-to-minimize-false-positives-reaches-another-significant-milestone\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"The Quest to Minimize False Positives Reaches Another Significant Milestone\" title=\"\" data-cvpsrc=\"https:\/\/blog.gitguardian.com\/content\/images\/2024\/11\/The-Quest-to-Minimize-False-Positives-Reaches-Another-Significant-Milestone.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/the-quest-to-minimize-false-positives-reaches-another-significant-milestone\/\" class=\"_self cvplbd\" target=\"_self\" >The Quest to Minimize False Positives Reaches Another Significant Milestone<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/guardians\/\" rel=\"author\">Guardians<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-25T12:09:54-05:00\">November 25, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/artificial-intelligence\/' title='Artificial Intelligence' class='pt-cv-tax-artificial-intelligence'>Artificial Intelligence<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/gitguardian\/' title='GitGuardian' class='pt-cv-tax-gitguardian'>GitGuardian<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Our breakthrough ML model FP Remover V2 slashes false positives by 80%, setting a new industry standard for secrets detection. Discover how we're helping security teams focus on real threats instead of ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=GitGuardian Blog - Take Control of Your Secrets Security&feed_id=881&blog_url=https:\/\/blog.gitguardian.com\/\">GitGuardian Blog - Take Control of Your Secrets Security<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037509\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/huge-leak-of-customer-data-includes-military-personnel-info\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"military\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/ai-generated-8662832_1280-1-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/huge-leak-of-customer-data-includes-military-personnel-info\/\" class=\"_self cvplbd\" target=\"_self\" >Huge Leak of Customer Data Includes Military Personnel Info<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-25T10:07:01-05:00\">November 25, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/china\/' title='china' class='pt-cv-tax-china'>china<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/elasticsearch\/' title='elasticsearch' class='pt-cv-tax-elasticsearch'>elasticsearch<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/enamelpins\/' title='enamelpins' class='pt-cv-tax-enamelpins'>enamelpins<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/leaked-data\/' title='leaked data' class='pt-cv-tax-leaked-data'>leaked data<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/phishing\/' title='Phishing' class='pt-cv-tax-phishing'>Phishing<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">EnamelPins, which manufactures and sells medals, pins, and other emblematic accessories, for months left open an Elasticsearch instance that exposed 300,000 customer emails, including 2,500 from military and government personnel. The company, ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037503\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/in-a-growing-threat-landscape-companies-must-do-three-things-to-get-serious-about-cybersecurity\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"landscape, threat, securing the SMB\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2019\/05\/Fortifying-Security-Landscape-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/in-a-growing-threat-landscape-companies-must-do-three-things-to-get-serious-about-cybersecurity\/\" class=\"_self cvplbd\" target=\"_self\" >In a Growing Threat Landscape, Companies Must do Three Things to Get Serious About Cybersecurity<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/paul-laudanski\/\" rel=\"author\">Paul Laudanski<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-25T08:44:39-05:00\">November 25, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/c-suite\/' title='c-suite' class='pt-cv-tax-c-suite'>c-suite<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ciso\/' title='CISO' class='pt-cv-tax-ciso'>CISO<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cybersecurity\/' title='Cybersecurity' class='pt-cv-tax-cybersecurity'>Cybersecurity<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/nist\/' title='NIST' class='pt-cv-tax-nist'>NIST<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Several macro-trends \u2013 such as growing digital transformation, rising hybrid work and, especially, booming AI adoption \u2013 have created an increasingly sophisticated threat landscape ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037498\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/defining-cyber-risk-assessment-and-a-compliance-gap-analysis-and-how-they-can-be-used-together\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"risk, assessment, risk, Qualys, cyberinsurance compliance spending\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2019\/03\/Security-Risk-Assessment-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/defining-cyber-risk-assessment-and-a-compliance-gap-analysis-and-how-they-can-be-used-together\/\" class=\"_self cvplbd\" target=\"_self\" >Defining Cyber Risk Assessment and a Compliance Gap Analysis and How They Can be Used Together<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/greg-neville\/\" rel=\"author\">Greg Neville<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-25T08:17:11-05:00\">November 25, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/compliance-frameworks\/' title='Compliance Frameworks' class='pt-cv-tax-compliance-frameworks'>Compliance Frameworks<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cyber-risk-assessment\/' title='cyber risk assessment' class='pt-cv-tax-cyber-risk-assessment'>cyber risk assessment<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/gap-analysis\/' title='gap analysis' class='pt-cv-tax-gap-analysis'>gap analysis<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/threat-identification\/' title='threat identification' class='pt-cv-tax-threat-identification'>threat identification<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">A cyber risk assessment is a tool that helps organizations identify and prioritize risks associated with threats that are relevant to their unique environment ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037480\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/the-cyberthreats-from-china-are-ongoing-u-s-officials\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"China, threats, scams, CISA TP-Link Volt Typhoon Salt Typhoon\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/10\/China-Infiltrate-US-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/the-cyberthreats-from-china-are-ongoing-u-s-officials\/\" class=\"_self cvplbd\" target=\"_self\" >The Cyberthreats from China are Ongoing: U.S. Officials<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-25T07:32:00-05:00\">November 25, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/china-espionage\/' title='china espionage' class='pt-cv-tax-china-espionage'>china espionage<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/salt-typhoon-cyberattack\/' title='Salt Typhoon cyberattack' class='pt-cv-tax-salt-typhoon-cyberattack'>Salt Typhoon cyberattack<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/telecom-networks\/' title='Telecom Networks' class='pt-cv-tax-telecom-networks'>Telecom Networks<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/volt-typhoon\/' title='Volt Typhoon' class='pt-cv-tax-volt-typhoon'>Volt Typhoon<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">U.S. officials are pushing back at the ongoing threats posted by Chinese state-sponsored hackers like Volt Typhoon and Salt Typhoon, which have infiltrated critical infrastructure organizations to steal information and preposition themselves ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037360\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/u-s-agencies-seize-four-north-korean-it-worker-scam-websites\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"North Korea IT worker scam\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2019\/03\/Hackathons-Cybersecurity-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/u-s-agencies-seize-four-north-korean-it-worker-scam-websites\/\" class=\"_self cvplbd\" target=\"_self\" >U.S. Agencies Seize Four North Korean IT Worker Scam Websites<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-22T09:54:07-05:00\">November 22, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/china-espionage\/' title='china espionage' class='pt-cv-tax-china-espionage'>china espionage<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/department-of-justice-doj\/' title='Department of Justice (DOJ)' class='pt-cv-tax-department-of-justice-doj'>Department of Justice (DOJ)<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/fake-it-worker-scam\/' title='fake IT worker scam' class='pt-cv-tax-fake-it-worker-scam'>fake IT worker scam<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/north-korean-cyber-espionage\/' title='North Korean cyber espionage' class='pt-cv-tax-north-korean-cyber-espionage'>North Korean cyber espionage<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">U.S. law enforcement agencies seized the websites of four North Korean fake IT worker scams that were uncovered by SentinelOne threat researchers and linked to a larger network of Chinese front companies ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037353\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/the-race-is-on-to-solve-the-quantum-computing-security-challenge\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"quantum computing, cryptography, cryptographic, cybersecurity quantum\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2022\/08\/canstockphoto17667969-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/the-race-is-on-to-solve-the-quantum-computing-security-challenge\/\" class=\"_self cvplbd\" target=\"_self\" >The Race is on to Solve the Quantum Computing Security Challenge<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/rahul-tyagi\/\" rel=\"author\">Rahul Tyagi<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-22T09:24:02-05:00\">November 22, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/cryptography\/' title='cryptography' class='pt-cv-tax-cryptography'>cryptography<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cyber\/' title='cyber' class='pt-cv-tax-cyber'>cyber<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/quantum-computing\/' title='quantum computing' class='pt-cv-tax-quantum-computing'>quantum computing<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Quantum computing has long been a topic of intense research and debate, particularly regarding its potential impact on current cryptographic systems ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037038\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/black-friday-scammers-are-hard-at-work-security-experts\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"PCI DSS, third-party, businessmman with a credit card and computer\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/05\/credit-card-rupixen-Q59HmzK38eQ-unsplash-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/black-friday-scammers-are-hard-at-work-security-experts\/\" class=\"_self cvplbd\" target=\"_self\" >Black Friday Scammers are Hard at Work: Security Experts<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-20T09:00:12-05:00\">November 20, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/black-friday\/' title='black friday' class='pt-cv-tax-black-friday'>black friday<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/impersonation-attacks\/' title='Impersonation attacks' class='pt-cv-tax-impersonation-attacks'>Impersonation attacks<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/online-shopping-scams\/' title='online shopping scams' class='pt-cv-tax-online-shopping-scams'>online shopping scams<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/phishing\/' title='Phishing' class='pt-cv-tax-phishing'>Phishing<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Scammers are using everything from fraudulent deals and fake ads to spoofed websites and brand impersonation to target online shoppers who are gearing up for Black Friday as the holiday buying season ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2036919\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/cisa-director-easterly-to-leave-when-trump-assumes-presidency\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"Director of the Cybersecurity and Infrastructure Security Agency, Jen Easterly\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/03\/jen-easterly-cisa-pd-290x130.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/cisa-director-easterly-to-leave-when-trump-assumes-presidency\/\" class=\"_self cvplbd\" target=\"_self\" >CISA Director Easterly to Leave When Trump Assumes Presidency<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-19T10:08:53-05:00\">November 19, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/cisa\/' title='cisa' class='pt-cv-tax-cisa'>cisa<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cybersecurity\/' title='Cybersecurity' class='pt-cv-tax-cybersecurity'>Cybersecurity<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/donald-trump\/' title='Donald Trump' class='pt-cv-tax-donald-trump'>Donald Trump<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/jen-easterly\/' title='Jen Easterly' class='pt-cv-tax-jen-easterly'>Jen Easterly<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/secure-by-design\/' title='secure by design' class='pt-cv-tax-secure-by-design'>secure by design<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Jen Easterly, who took over as CISA director in 2021, will step down in January when Donald Trump takes over as president, creating an uncertain future for the critical cybersecurity agency and ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"text-center pt-cv-pagination-wrapper\"><a href='https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1585451\/?_page=2' onclick='event.preventDefault()' class=\"pt-cv-more btn btn-primary btn-sm\" data-totalpages=\"50\" data-nextpages=\"2\" data-sid=\"63f1e1bp89\" data-unid=\"ff47d2fc8ff3f351ad9bd3f79079e046\" data-isblock=\"\" data-postid=\"\">Load more <span class=\"caret\"><\/span><\/a><img loading=\"lazy\" decoding=\"async\" width=\"15\" height=\"15\" class=\"pt-cv-spinner\" alt=\"Loading...\" src=\"data:image\/gif;base64,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\" \/><div class=\"clear pt-cv-clear-pagination\"><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-d3ae2f4zqc\">#pt-cv-view-63f1e1bp89 .pt-cv-content-item { padding-left: 3px !important; }\n#pt-cv-view-63f1e1bp89  { margin-right: 3px !important; margin-left: 3px !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-pinmas { padding-left: 3px !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-title a, #pt-cv-view-63f1e1bp89  .panel-title { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 20px !important; line-height: 1.3 !important; }\n#pt-cv-view-63f1e1bp89  .pt-cv-title a:hover, #pt-cv-view-63f1e1bp89  .panel-title:hover   { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-content , #pt-cv-view-63f1e1bp89  .pt-cv-content *:not(.pt-cv-readmore):not(style):not(script) { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 16px !important; line-height: 1.3 !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-meta-fields .glyphicon {font-family: 'Glyphicons Halflings' !important; line-height: 1 !important;}\n#pt-cv-view-63f1e1bp89 .pt-cv-meta-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-custom-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; display: block !important; text-align: left !important; clear: both !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-readmore  { font-family: 'Roboto', Arial, serif !important; color: #ffffff !important; background-color: #6190bb !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-readmore:hover  { font-family: 'Roboto', Arial, serif !important; color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pt-cv-more-inactive , #pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pagination a, .pt-cv-pagination[data-sid='63f1e1bp89'] a { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pt-cv-more , #pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pagination .active a, .pt-cv-pagination[data-sid='63f1e1bp89'] .active a { font-family: 'Source Sans Pro', Arial, serif !important; color: #ffffff !important; background-color: #6190bb !important; }<\/style>\r\n\t\t\t<link href='\/\/fonts.googleapis.com\/css?family=Source+Sans+Pro' rel='stylesheet' type='text\/css'><link href='\/\/fonts.googleapis.com\/css?family=Roboto' rel='stylesheet' type='text\/css'><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Analytics and Intelligence<\/p>\n","protected":false},"author":6042,"featured_media":1602749,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1585451","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.9 (Yoast SEO v23.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security Analytics - Security Boulevard<\/title>\n<meta name=\"description\" content=\"Latest updates on applying advanced analytics, automation and intelligence to help detect threats early and respond quickly.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securityboulevard.com\/security-analytics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Analytics\" \/>\n<meta property=\"og:description\" content=\"Analytics and Intelligence\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securityboulevard.com\/security-analytics\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Boulevard\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/groups\/24445075146\/\" \/>\n<meta property=\"article:modified_time\" content=\"2018-01-11T07:06:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/08\/canstockphoto47571119.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"739\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@securityblvd\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securityboulevard.com\/security-analytics\/\",\"url\":\"https:\/\/securityboulevard.com\/security-analytics\/\",\"name\":\"Security Analytics - Security Boulevard\",\"isPartOf\":{\"@id\":\"https:\/\/securityboulevard.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securityboulevard.com\/security-analytics\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securityboulevard.com\/security-analytics\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/08\/canstockphoto47571119.jpg\",\"datePublished\":\"2017-08-23T19:56:50+00:00\",\"dateModified\":\"2018-01-11T07:06:07+00:00\",\"description\":\"Latest updates on applying advanced analytics, automation and intelligence to help detect threats early and respond quickly.\",\"breadcrumb\":{\"@id\":\"https:\/\/securityboulevard.com\/security-analytics\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securityboulevard.com\/security-analytics\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/securityboulevard.com\/security-analytics\/#primaryimage\",\"url\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/08\/canstockphoto47571119.jpg\",\"contentUrl\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/08\/canstockphoto47571119.jpg\",\"width\":739,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securityboulevard.com\/security-analytics\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securityboulevard.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Analytics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securityboulevard.com\/#website\",\"url\":\"https:\/\/securityboulevard.com\/\",\"name\":\"Security Boulevard\",\"description\":\"The Home of the Security Bloggers Network\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securityboulevard.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security Analytics - Security Boulevard","description":"Latest updates on applying advanced analytics, automation and intelligence to help detect threats early and respond quickly.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securityboulevard.com\/security-analytics\/","og_locale":"en_US","og_type":"article","og_title":"Security Analytics","og_description":"Analytics and Intelligence","og_url":"https:\/\/securityboulevard.com\/security-analytics\/","og_site_name":"Security Boulevard","article_publisher":"https:\/\/www.facebook.com\/groups\/24445075146\/","article_modified_time":"2018-01-11T07:06:07+00:00","og_image":[{"width":739,"height":200,"url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/08\/canstockphoto47571119.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@securityblvd","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/securityboulevard.com\/security-analytics\/","url":"https:\/\/securityboulevard.com\/security-analytics\/","name":"Security Analytics - Security Boulevard","isPartOf":{"@id":"https:\/\/securityboulevard.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securityboulevard.com\/security-analytics\/#primaryimage"},"image":{"@id":"https:\/\/securityboulevard.com\/security-analytics\/#primaryimage"},"thumbnailUrl":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/08\/canstockphoto47571119.jpg","datePublished":"2017-08-23T19:56:50+00:00","dateModified":"2018-01-11T07:06:07+00:00","description":"Latest updates on applying advanced analytics, automation and intelligence to help detect threats early and respond quickly.","breadcrumb":{"@id":"https:\/\/securityboulevard.com\/security-analytics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securityboulevard.com\/security-analytics\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/securityboulevard.com\/security-analytics\/#primaryimage","url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/08\/canstockphoto47571119.jpg","contentUrl":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/08\/canstockphoto47571119.jpg","width":739,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/securityboulevard.com\/security-analytics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securityboulevard.com\/"},{"@type":"ListItem","position":2,"name":"Security Analytics"}]},{"@type":"WebSite","@id":"https:\/\/securityboulevard.com\/#website","url":"https:\/\/securityboulevard.com\/","name":"Security Boulevard","description":"The Home of the Security Bloggers Network","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securityboulevard.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P91vu9-6ErN","_links":{"self":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1585451","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/users\/6042"}],"replies":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/comments?post=1585451"}],"version-history":[{"count":0,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1585451\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media\/1602749"}],"wp:attachment":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media?parent=1585451"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}