{"id":2034304,"date":"2024-10-25T13:18:57","date_gmt":"2024-10-25T17:18:57","guid":{"rendered":"https:\/\/securityboulevard.com\/?p=2034304"},"modified":"2024-10-25T13:20:29","modified_gmt":"2024-10-25T17:20:29","slug":"sonicwall-doubles-down-on-edge-security-with-risk-based-connectivity-and-threat-protection","status":"publish","type":"post","link":"https:\/\/securityboulevard.com\/2024\/10\/sonicwall-doubles-down-on-edge-security-with-risk-based-connectivity-and-threat-protection\/","title":{"rendered":"SonicWall Doubles Down on Edge Security With Risk-Based Connectivity and Threat Protection"},"content":{"rendered":"<p>The number of cybersecurity incidents has doubled since the pandemic and its costing organizations exorbitantly heavy tolls in direct and indirect losses, according to the International Monetary Fund of the United Nations. Close to a million companies are getting impacted by targeted cyberattacks each year.<\/p>\n<p>The hasty implementation of the hybrid work model overnight blurred the lines of the perimeter giving rise to a \u201cborderless network\u201d. This is a tad tricky to keep fenced from external threats as remote users often connect from public networks that are unsafe and open to bad actors. And with today\u2019s volume, traffic is ridiculously hard to monitor and manage. These and other factors make every digital interaction in the distributed landscape a potential risk.<\/p>\n<p><a href=\"https:\/\/www.sonicwall.com\/\">SonicWall<\/a> saw this coming a long time. \u201cWhat we had started seeing in 2019 is this collection of security tools that were built one on top of the other &#8211; which in hindsight looks pretty neat &#8211; but once you look at the connectivity from the user to the application, you see that it&#8217;s a ball of spaghetti,\u201d said Tarun Desikan, executive vice president. \u201cAfter COVID hit, small businesses to big companies, all started getting hacked using these very tools that they built.\u201d<\/p>\n<p>A three-decade-old startup, SonicWall is working to stop cyber-gangs from targeting remote users and gaining easy passage into protected digital environments. Its latest rollout, Cloud Secure Edge (CSE), is a Security Service Edge (SSE) solution that delivers \u201crisk-based connectivity and protection\u201d by placing security closer to the edge.<\/p>\n<p>SonicWall gained recognition in the cybersecurity niche for championing several genre-busting ideas. The company deals with distributed environments where aside from a physical footprint, typically companies have a bevy of workers and contractors operating remotely and at times from the office.<\/p>\n<p>Desikan predicted, \u201cIf the type of user profile keeps changing and you have more and more remote workers, your operations are going to get really complicated. Managing policies across all these systems will be hard, and your user experience is going to be bad because your users, when they&#8217;re in the office, have to do one thing, and when they go home, have to do something else. Worst of all, the security model will break down.\u201d<\/p>\n<p>Besides being rife with complex operations and poor levels of user experience, the older security model also has some serious loopholes which opened up wide and deep as the hybrid work model took effect.<\/p>\n<div class=\"jetpack-video-wrapper\">\n<div class=\"fitvids-video\"><iframe loading=\"lazy\" title=\"SonicWall Cloud Secure Edge\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/Svo3Rk9WPHo?feature=oembed&#038;enablejsapi=1&#038;origin=https:\/\/securityboulevard.com\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<\/div>\n<p><a href=\"https:\/\/www.sonicwall.com\/\">SonicWall<\/a> is trying to fix that with the launch of Cloud Secure Edge. Expanded by Banyan Security\u2019s technology, CSE aims to replace the crumbling pre-pandemic time model with one that is purpose-built, proactive and risk-based.<\/p>\n<p>CSE tightly connects the users and the devices where they are with the resources across physical distances, said Desikan, while showcasing the solution at the <a href=\"https:\/\/techfieldday.com\/event\/xfd12\/\">recent Security Field Day<\/a>, a <a href=\"https:\/\/techfieldday.com\">Tech Field Day<\/a> event, in California.<\/p>\n<p>\u201cIt&#8217;s an identity-centric system as opposed to a network-centric system,\u201d he said. \u201cYou can build an identity-centric system that connects users and devices where they are &#8211; in the office, or in a remote location &#8211; to whatever resource they need to do their job. The resource could be on premise, running in a data center, in a public cloud or SaaS or it could be just on the internet.\u201d<\/p>\n<p>When users send a request to connect to an application or resource, CSE passes it through stringent security checks for authentication. CSE works through a client installed on the user device that postures that device and establishes connectivity. A Dynamic Cloud Edge running in the cloud connects to the location nearest to the user before directing it to a SaaS console, Cloud Command Center, where risk is evaluated, user attributes and device posture are calculated, and routing decisions are made according to the defined policies.<\/p>\n<p>SonicWall also supports clientless scenarios in which the browser serves as the application, informed Desikan.<\/p>\n<p>The standout capability of Cloud Secure Edge, according to Desikan, is trust scoring. The platform is capable of analyzing and contextualizing risks associated with a user or a device as opposed to making a static positive or negative determination.<\/p>\n<p>\u201cIt is not just hey, this is Tarun, he&#8217;s accessing an application. It&#8217;s Tarun on a trusted device that&#8217;s running a firewall in a home network. Therefore, he has a high level of trust and can access.\u201d<\/p>\n<p>A short-lived credential is issued granting access to all authentic users and devices.<\/p>\n<p>CSE also prevents trusted users from overreaching by keeping a record of all services and applications a user has permission to access, and revoking accesses when permissions are violated.<\/p>\n<p>CSE puts a tool at every front, scanning and examining the traffic and permitting or blocking as required. Application-level connectivity is guarded with zero-trust network access or privilege access. All accesses to SaaS applications are mediated by a cloud access security broker (CASB) that enforces policies between the user and the cloud service provider. And for traffic going to websites on the Internet, a secure web gateway (SWG) scans all movements and enforces corporate policies.<\/p>\n<p>All these products are packed into the single solution that is the Cloud Secure Edge to ensure that tool fragmentation is entirely sidestepped.<\/p>\n<p><a href=\"https:\/\/www.sonicwall.com\/\">SonicWall<\/a> also integrates with a variety of identity managers, device managers and security providers for better discovery and determination.<\/p>\n<p>For more, check out <a href=\"https:\/\/techfieldday.com\/appearance\/sonicwall-presents-at-security-field-day-12\/\">SonicWall\u2019s demo<\/a> from the <a href=\"https:\/\/techfieldday.com\/event\/xfd12\/\">Security Field Day event<\/a> at <a href=\"https:\/\/techfieldday.com\">TechFieldDay.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The number of cybersecurity incidents has doubled since the pandemic and its costing organizations exorbitantly heavy tolls in direct and indirect losses, according to the International Monetary Fund of the United Nations. Close to a million companies are getting impacted by targeted cyberattacks each year. The hasty implementation of the hybrid work model overnight blurred..<\/p>\n","protected":false},"author":21917,"featured_media":2034306,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[98631,99462,99461,85026],"tags":[104199,104200,52815,104057],"class_list":["post-2034304","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-social-facebook","category-social-linkedin","category-social-x","category-sponsored-content","tag-techfieldday","tag-writeroftech1","tag-sonicwall","tag-xfd12"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.9 (Yoast SEO v23.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SonicWall Doubles Down on Edge Security With Risk-Based Connectivity and Threat Protection - Security Boulevard<\/title>\n<meta name=\"description\" content=\"SonicWall is working to stop cyber-gangs from targeting remote users and gaining easy passage into protected digital environments.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securityboulevard.com\/2024\/10\/sonicwall-doubles-down-on-edge-security-with-risk-based-connectivity-and-threat-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SonicWall Doubles Down on Edge Security With Risk-Based Connectivity and Threat Protection\" \/>\n<meta property=\"og:description\" content=\"The number of cybersecurity incidents has doubled since the pandemic and its costing organizations exorbitantly heavy tolls in direct and indirect losses,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securityboulevard.com\/2024\/10\/sonicwall-doubles-down-on-edge-security-with-risk-based-connectivity-and-threat-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Boulevard\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/groups\/24445075146\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-25T17:18:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-25T17:20:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/10\/SonicWall-Cloud-Secure-Edge-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sulagna Saha\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@securityblvd\" \/>\n<meta name=\"twitter:site\" content=\"@securityblvd\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securityboulevard.com\/2024\/10\/sonicwall-doubles-down-on-edge-security-with-risk-based-connectivity-and-threat-protection\/\",\"url\":\"https:\/\/securityboulevard.com\/2024\/10\/sonicwall-doubles-down-on-edge-security-with-risk-based-connectivity-and-threat-protection\/\",\"name\":\"SonicWall Doubles Down on Edge Security With Risk-Based Connectivity and Threat Protection - Security Boulevard\",\"isPartOf\":{\"@id\":\"https:\/\/securityboulevard.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securityboulevard.com\/2024\/10\/sonicwall-doubles-down-on-edge-security-with-risk-based-connectivity-and-threat-protection\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securityboulevard.com\/2024\/10\/sonicwall-doubles-down-on-edge-security-with-risk-based-connectivity-and-threat-protection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/10\/SonicWall-Cloud-Secure-Edge-1.png\",\"datePublished\":\"2024-10-25T17:18:57+00:00\",\"dateModified\":\"2024-10-25T17:20:29+00:00\",\"author\":{\"@id\":\"https:\/\/securityboulevard.com\/#\/schema\/person\/d5effdd656fe81817788da89a3cc84dc\"},\"description\":\"SonicWall is working to stop cyber-gangs from targeting remote users and gaining easy passage into protected digital environments.\",\"breadcrumb\":{\"@id\":\"https:\/\/securityboulevard.com\/2024\/10\/sonicwall-doubles-down-on-edge-security-with-risk-based-connectivity-and-threat-protection\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securityboulevard.com\/2024\/10\/sonicwall-doubles-down-on-edge-security-with-risk-based-connectivity-and-threat-protection\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/securityboulevard.com\/2024\/10\/sonicwall-doubles-down-on-edge-security-with-risk-based-connectivity-and-threat-protection\/#primaryimage\",\"url\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/10\/SonicWall-Cloud-Secure-Edge-1.png\",\"contentUrl\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/10\/SonicWall-Cloud-Secure-Edge-1.png\",\"width\":770,\"height\":330,\"caption\":\"SonicWall Cloud Secure Edge\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securityboulevard.com\/2024\/10\/sonicwall-doubles-down-on-edge-security-with-risk-based-connectivity-and-threat-protection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securityboulevard.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sponsored Content\",\"item\":\"https:\/\/securityboulevard.com\/category\/sponsored-content\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"SonicWall Doubles Down on Edge Security With Risk-Based Connectivity and Threat Protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securityboulevard.com\/#website\",\"url\":\"https:\/\/securityboulevard.com\/\",\"name\":\"Security Boulevard\",\"description\":\"The Home of the Security Bloggers Network\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securityboulevard.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/securityboulevard.com\/#\/schema\/person\/d5effdd656fe81817788da89a3cc84dc\",\"name\":\"Sulagna Saha\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/securityboulevard.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/08\/cropped-Bio-Picture-scaled-1-96x96.jpg\",\"contentUrl\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/08\/cropped-Bio-Picture-scaled-1-96x96.jpg\",\"caption\":\"Sulagna Saha\"},\"description\":\"Sulagna Saha is a technology writer. She covers all the latest things in enterprise tech. For the last three years, she has focused on cloud computing, AI, cybersecurity, application development, data storage and networking. These are deeply technical subjects. So she likes to dig into the details, and help readers break through the jargons and consume information easily. Her stories talk about how IT solutions can help their intended users navigate the day-to-day responsibilities at work, and why companies should adopt a certain technology over the other. Sulagna talks to company leaders, software engineers, SMEs and spokespeople to bring new research and insider perspective to her work. In her free time, Sulagna can be found spending time with her toddler, browsing a book or experimenting in the kitchen. Traveling and movies are other things that she is passionate about.\",\"url\":\"https:\/\/securityboulevard.com\/author\/sulagna-saha\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SonicWall Doubles Down on Edge Security With Risk-Based Connectivity and Threat Protection - Security Boulevard","description":"SonicWall is working to stop cyber-gangs from targeting remote users and gaining easy passage into protected digital environments.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securityboulevard.com\/2024\/10\/sonicwall-doubles-down-on-edge-security-with-risk-based-connectivity-and-threat-protection\/","og_locale":"en_US","og_type":"article","og_title":"SonicWall Doubles Down on Edge Security With Risk-Based Connectivity and Threat Protection","og_description":"The number of cybersecurity incidents has doubled since the pandemic and its costing organizations exorbitantly heavy tolls in direct and indirect losses,","og_url":"https:\/\/securityboulevard.com\/2024\/10\/sonicwall-doubles-down-on-edge-security-with-risk-based-connectivity-and-threat-protection\/","og_site_name":"Security Boulevard","article_publisher":"https:\/\/www.facebook.com\/groups\/24445075146\/","article_published_time":"2024-10-25T17:18:57+00:00","article_modified_time":"2024-10-25T17:20:29+00:00","og_image":[{"width":770,"height":330,"url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/10\/SonicWall-Cloud-Secure-Edge-1.png","type":"image\/png"}],"author":"Sulagna Saha","twitter_card":"summary_large_image","twitter_creator":"@securityblvd","twitter_site":"@securityblvd","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/securityboulevard.com\/2024\/10\/sonicwall-doubles-down-on-edge-security-with-risk-based-connectivity-and-threat-protection\/","url":"https:\/\/securityboulevard.com\/2024\/10\/sonicwall-doubles-down-on-edge-security-with-risk-based-connectivity-and-threat-protection\/","name":"SonicWall Doubles Down on Edge Security With Risk-Based Connectivity and Threat Protection - Security Boulevard","isPartOf":{"@id":"https:\/\/securityboulevard.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securityboulevard.com\/2024\/10\/sonicwall-doubles-down-on-edge-security-with-risk-based-connectivity-and-threat-protection\/#primaryimage"},"image":{"@id":"https:\/\/securityboulevard.com\/2024\/10\/sonicwall-doubles-down-on-edge-security-with-risk-based-connectivity-and-threat-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/10\/SonicWall-Cloud-Secure-Edge-1.png","datePublished":"2024-10-25T17:18:57+00:00","dateModified":"2024-10-25T17:20:29+00:00","author":{"@id":"https:\/\/securityboulevard.com\/#\/schema\/person\/d5effdd656fe81817788da89a3cc84dc"},"description":"SonicWall is working to stop cyber-gangs from targeting remote users and gaining easy passage into protected digital environments.","breadcrumb":{"@id":"https:\/\/securityboulevard.com\/2024\/10\/sonicwall-doubles-down-on-edge-security-with-risk-based-connectivity-and-threat-protection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securityboulevard.com\/2024\/10\/sonicwall-doubles-down-on-edge-security-with-risk-based-connectivity-and-threat-protection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/securityboulevard.com\/2024\/10\/sonicwall-doubles-down-on-edge-security-with-risk-based-connectivity-and-threat-protection\/#primaryimage","url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/10\/SonicWall-Cloud-Secure-Edge-1.png","contentUrl":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/10\/SonicWall-Cloud-Secure-Edge-1.png","width":770,"height":330,"caption":"SonicWall Cloud Secure Edge"},{"@type":"BreadcrumbList","@id":"https:\/\/securityboulevard.com\/2024\/10\/sonicwall-doubles-down-on-edge-security-with-risk-based-connectivity-and-threat-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securityboulevard.com\/"},{"@type":"ListItem","position":2,"name":"Sponsored Content","item":"https:\/\/securityboulevard.com\/category\/sponsored-content\/"},{"@type":"ListItem","position":3,"name":"SonicWall Doubles Down on Edge Security With Risk-Based Connectivity and Threat Protection"}]},{"@type":"WebSite","@id":"https:\/\/securityboulevard.com\/#website","url":"https:\/\/securityboulevard.com\/","name":"Security Boulevard","description":"The Home of the Security Bloggers Network","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securityboulevard.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/securityboulevard.com\/#\/schema\/person\/d5effdd656fe81817788da89a3cc84dc","name":"Sulagna Saha","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/securityboulevard.com\/#\/schema\/person\/image\/","url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/08\/cropped-Bio-Picture-scaled-1-96x96.jpg","contentUrl":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/08\/cropped-Bio-Picture-scaled-1-96x96.jpg","caption":"Sulagna Saha"},"description":"Sulagna Saha is a technology writer. She covers all the latest things in enterprise tech. For the last three years, she has focused on cloud computing, AI, cybersecurity, application development, data storage and networking. These are deeply technical subjects. So she likes to dig into the details, and help readers break through the jargons and consume information easily. Her stories talk about how IT solutions can help their intended users navigate the day-to-day responsibilities at work, and why companies should adopt a certain technology over the other. Sulagna talks to company leaders, software engineers, SMEs and spokespeople to bring new research and insider perspective to her work. In her free time, Sulagna can be found spending time with her toddler, browsing a book or experimenting in the kitchen. Traveling and movies are other things that she is passionate about.","url":"https:\/\/securityboulevard.com\/author\/sulagna-saha\/"}]}},"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/10\/SonicWall-Cloud-Secure-Edge-1.png","jetpack_shortlink":"https:\/\/wp.me\/p91vu9-8xdm","_links":{"self":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/posts\/2034304","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/users\/21917"}],"replies":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/comments?post=2034304"}],"version-history":[{"count":2,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/posts\/2034304\/revisions"}],"predecessor-version":[{"id":2034307,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/posts\/2034304\/revisions\/2034307"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media\/2034306"}],"wp:attachment":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media?parent=2034304"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/categories?post=2034304"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/tags?post=2034304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}