{"id":2034765,"date":"2024-10-31T12:01:45","date_gmt":"2024-10-31T16:01:45","guid":{"rendered":"https:\/\/securityboulevard.com\/?page_id=2034765"},"modified":"2024-11-06T12:03:23","modified_gmt":"2024-11-06T17:03:23","slug":"sponsored-content","status":"publish","type":"page","link":"https:\/\/securityboulevard.com\/sponsored-content\/","title":{"rendered":"Sponsored Content"},"content":{"rendered":"<div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-scrollable pt-cv-colsys\" id=\"pt-cv-view-b27d39f5ro\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div id=\"d3684a6uo7\" class=\"pt-cv-carousel pt-cv-slide\" data-ride=\"cvcarousel\" data-interval=10000>\n<div class=\"carousel-inner\"><div class=\"item active\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2036121\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/sealing-entry-points-and-weak-links-in-the-environment-how-dell-is-building-an-iron-wall-of-defense\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/Dell-Supply-Chain-Assurance-770x300.png\" class=\"pt-cv-thumbnail img-none\" alt=\"vulnerabilities, cyber, Dell,\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/sealing-entry-points-and-weak-links-in-the-environment-how-dell-is-building-an-iron-wall-of-defense\/\" class=\"_self cvplbd\" target=\"_self\" >Sealing Entry Points and Weak Links in the Environment &#8211; How Dell is Building an Iron Wall of Defense<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/sulagna-saha\/\" rel=\"author\">Sulagna Saha<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-13T00:42:06-05:00\">3 weeks ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-c5f38f9yz9\">#pt-cv-view-b27d39f5ro .pt-cv-title a, #pt-cv-view-b27d39f5ro  .panel-title { font-size: 40px !important; font-weight: 600 !important; line-height: 1.0 !important; }\n@media (min-width: 768px) and (max-width: 991px) {#pt-cv-view-b27d39f5ro .pt-cv-title a, #pt-cv-view-b27d39f5ro  .panel-title { font-size: 20px !important }}\n@media (max-width: 767px) {#pt-cv-view-b27d39f5ro .pt-cv-title a, #pt-cv-view-b27d39f5ro  .panel-title { font-size: 14px !important }}\n#pt-cv-view-b27d39f5ro .pt-cv-carousel-caption  { background-color: rgba(51,51,51,.6) !important; }\n#pt-cv-view-b27d39f5ro .pt-cv-meta-fields * { color: #ffffff !important; }\n#pt-cv-view-b27d39f5ro .pt-cv-readmore  { color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-b27d39f5ro .pt-cv-readmore:hover  { color: #ffffff !important; background-color: #00aeef !important; }<\/style>\r\n\t\t\t\n<div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-pinterest pt-cv-colsys pt-cv-shadow pt-cv-no-bb pt-cv-pgloadmore\" id=\"pt-cv-view-180c8f27dh\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2034630\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/10\/citrix-boosts-security-for-remote-application-accesses-with-more-security-layers\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"Citrix Secure Private Acess\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/10\/Citrix-Secure-Private-Acess-290x130.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/10\/citrix-boosts-security-for-remote-application-accesses-with-more-security-layers\/\" class=\"_self cvplbd\" target=\"_self\" >Citrix Boosts Security for Remote Application Accesses With \u201cMore Security Layers\u201d<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/sulagna-saha\/\" rel=\"author\"><img alt='Avatar photo' src='https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/08\/cropped-Bio-Picture-scaled-1-40x40.jpg' srcset='https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/08\/cropped-Bio-Picture-scaled-1-80x80.jpg 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Sulagna Saha<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-10-30T14:24:15-04:00\">October 30, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/techfieldday\/' title='@TechFieldDay' class='pt-cv-tax-techfieldday'>@TechFieldDay<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/writeroftech1\/' title='@WriterOfTech1' class='pt-cv-tax-writeroftech1'>@WriterOfTech1<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/citrix\/' title='Citrix' class='pt-cv-tax-citrix'>Citrix<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/xfd12\/' title='XFD12' class='pt-cv-tax-xfd12'>XFD12<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Connections on the internet are not secure by default, and bad actors frequently take advantage of users accessing organizations\u2019 applications and resources from remote locations, to burrow into corporate networks. Experts recommend picking a remote access management solution and adjusting the settings to the organization\u2019s individual access control policy to ... <a href=\"https:\/\/securityboulevard.com\/2024\/10\/citrix-boosts-security-for-remote-application-accesses-with-more-security-layers\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2034471\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/10\/digicert-its-a-matter-of-trust\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"DigiCert One\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/10\/DigiCert-One-1-290x130.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/10\/digicert-its-a-matter-of-trust\/\" class=\"_self cvplbd\" target=\"_self\" >DigiCert \u2013 It\u2019s a Matter of Trust<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/sulagna-saha\/\" rel=\"author\"><img alt='Avatar photo' src='https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/08\/cropped-Bio-Picture-scaled-1-40x40.jpg' srcset='https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/08\/cropped-Bio-Picture-scaled-1-80x80.jpg 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Sulagna Saha<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-10-29T10:31:38-04:00\">October 29, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/techfieldday\/' title='@TechFieldDay' class='pt-cv-tax-techfieldday'>@TechFieldDay<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/writeroftech1\/' title='@WriterOfTech1' class='pt-cv-tax-writeroftech1'>@WriterOfTech1<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/digicert\/' title='DigiCert' class='pt-cv-tax-digicert'>DigiCert<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/xfd12\/' title='XFD12' class='pt-cv-tax-xfd12'>XFD12<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Starlink encountered a high-profile outage in April that caused service to go down for several hours. The reason was an expired digital certificate. Digital certificates have emerged as the currency of digital trust in the hyper-connected world of today. These electronic credentials enable devices to recognize, trust and interoperate with ... <a href=\"https:\/\/securityboulevard.com\/2024\/10\/digicert-its-a-matter-of-trust\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2034304\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/10\/sonicwall-doubles-down-on-edge-security-with-risk-based-connectivity-and-threat-protection\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"SonicWall Cloud Secure Edge\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/10\/SonicWall-Cloud-Secure-Edge-1-290x130.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/10\/sonicwall-doubles-down-on-edge-security-with-risk-based-connectivity-and-threat-protection\/\" class=\"_self cvplbd\" target=\"_self\" >SonicWall Doubles Down on Edge Security With Risk-Based Connectivity and Threat Protection<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/sulagna-saha\/\" rel=\"author\"><img alt='Avatar photo' src='https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/08\/cropped-Bio-Picture-scaled-1-40x40.jpg' srcset='https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/08\/cropped-Bio-Picture-scaled-1-80x80.jpg 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Sulagna Saha<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-10-25T13:18:57-04:00\">October 25, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/techfieldday\/' title='@TechFieldDay' class='pt-cv-tax-techfieldday'>@TechFieldDay<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/writeroftech1\/' title='@WriterOfTech1' class='pt-cv-tax-writeroftech1'>@WriterOfTech1<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/sonicwall\/' title='SonicWall' class='pt-cv-tax-sonicwall'>SonicWall<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/xfd12\/' title='XFD12' class='pt-cv-tax-xfd12'>XFD12<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">The number of cybersecurity incidents has doubled since the pandemic and its costing organizations exorbitantly heavy tolls in direct and indirect losses, according to the International Monetary Fund of the United Nations. Close to a million companies are getting impacted by targeted cyberattacks each year. The hasty implementation of the ... <a href=\"https:\/\/securityboulevard.com\/2024\/10\/sonicwall-doubles-down-on-edge-security-with-risk-based-connectivity-and-threat-protection\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-be2de1e7gu\">#pt-cv-view-180c8f27dh .pt-cv-content-item { padding-left: 3px !important; }\n#pt-cv-view-180c8f27dh  { margin-right: 3px !important; margin-left: 3px !important; }\n#pt-cv-view-180c8f27dh .pt-cv-pinmas { padding-left: 3px !important; }\n#pt-cv-view-180c8f27dh .pt-cv-title a, #pt-cv-view-180c8f27dh  .panel-title { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 20px !important; line-height: 1.3 !important; }\n#pt-cv-view-180c8f27dh  .pt-cv-title a:hover, #pt-cv-view-180c8f27dh  .panel-title:hover   { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-180c8f27dh .pt-cv-content , #pt-cv-view-180c8f27dh  .pt-cv-content *:not(.pt-cv-readmore):not(style):not(script) { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 16px !important; line-height: 1.3 !important; }\n#pt-cv-view-180c8f27dh .pt-cv-meta-fields .glyphicon {font-family: 'Glyphicons Halflings' !important; line-height: 1 !important;}\n#pt-cv-view-180c8f27dh .pt-cv-meta-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; }\n#pt-cv-view-180c8f27dh .pt-cv-custom-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; display: block !important; text-align: left !important; clear: both !important; }\n#pt-cv-view-180c8f27dh .pt-cv-readmore  { font-family: 'Roboto', Arial, serif !important; }\n#pt-cv-view-180c8f27dh .pt-cv-readmore:hover  { font-family: 'Roboto', Arial, serif !important; color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-180c8f27dh  + .pt-cv-pagination-wrapper .pt-cv-more-inactive , #pt-cv-view-180c8f27dh  + .pt-cv-pagination-wrapper .pagination a, .pt-cv-pagination[data-sid='180c8f27dh'] a { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-180c8f27dh  + .pt-cv-pagination-wrapper .pt-cv-more , #pt-cv-view-180c8f27dh  + .pt-cv-pagination-wrapper .pagination .active a, .pt-cv-pagination[data-sid='180c8f27dh'] .active a { font-family: 'Source Sans Pro', Arial, serif !important; color: #ffffff !important; background-color: #6190bb !important; }<\/style>\r\n\t\t\t<link href='\/\/fonts.googleapis.com\/css?family=Source+Sans+Pro' rel='stylesheet' type='text\/css'><link href='\/\/fonts.googleapis.com\/css?family=Roboto' rel='stylesheet' type='text\/css'>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":6042,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-2034765","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.9 (Yoast SEO v23.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Sponsored Content - Security Boulevard<\/title>\n<meta name=\"description\" content=\"The Industry Spotlight Section of Security Boulevard is the place where tools and service providers in the security field contribute to the community discussion with original content.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securityboulevard.com\/sponsored-content\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sponsored Content\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securityboulevard.com\/sponsored-content\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Boulevard\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/groups\/24445075146\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-06T17:03:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/01\/TwitterLogo-002.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1524\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@securityblvd\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securityboulevard.com\/sponsored-content\/\",\"url\":\"https:\/\/securityboulevard.com\/sponsored-content\/\",\"name\":\"Sponsored Content - Security Boulevard\",\"isPartOf\":{\"@id\":\"https:\/\/securityboulevard.com\/#website\"},\"datePublished\":\"2024-10-31T16:01:45+00:00\",\"dateModified\":\"2024-11-06T17:03:23+00:00\",\"description\":\"The Industry Spotlight Section of Security Boulevard is the place where tools and service providers in the security field contribute to the community discussion with original content.\",\"breadcrumb\":{\"@id\":\"https:\/\/securityboulevard.com\/sponsored-content\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securityboulevard.com\/sponsored-content\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securityboulevard.com\/sponsored-content\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securityboulevard.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sponsored Content\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securityboulevard.com\/#website\",\"url\":\"https:\/\/securityboulevard.com\/\",\"name\":\"Security Boulevard\",\"description\":\"The Home of the Security Bloggers Network\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securityboulevard.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Sponsored Content - Security Boulevard","description":"The Industry Spotlight Section of Security Boulevard is the place where tools and service providers in the security field contribute to the community discussion with original content.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securityboulevard.com\/sponsored-content\/","og_locale":"en_US","og_type":"article","og_title":"Sponsored Content","og_url":"https:\/\/securityboulevard.com\/sponsored-content\/","og_site_name":"Security Boulevard","article_publisher":"https:\/\/www.facebook.com\/groups\/24445075146\/","article_modified_time":"2024-11-06T17:03:23+00:00","og_image":[{"width":1524,"height":512,"url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/01\/TwitterLogo-002.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@securityblvd","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/securityboulevard.com\/sponsored-content\/","url":"https:\/\/securityboulevard.com\/sponsored-content\/","name":"Sponsored Content - Security Boulevard","isPartOf":{"@id":"https:\/\/securityboulevard.com\/#website"},"datePublished":"2024-10-31T16:01:45+00:00","dateModified":"2024-11-06T17:03:23+00:00","description":"The Industry Spotlight Section of Security Boulevard is the place where tools and service providers in the security field contribute to the community discussion with original content.","breadcrumb":{"@id":"https:\/\/securityboulevard.com\/sponsored-content\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securityboulevard.com\/sponsored-content\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/securityboulevard.com\/sponsored-content\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securityboulevard.com\/"},{"@type":"ListItem","position":2,"name":"Sponsored Content"}]},{"@type":"WebSite","@id":"https:\/\/securityboulevard.com\/#website","url":"https:\/\/securityboulevard.com\/","name":"Security Boulevard","description":"The Home of the Security Bloggers Network","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securityboulevard.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P91vu9-8xkN","_links":{"self":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/2034765","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/users\/6042"}],"replies":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/comments?post=2034765"}],"version-history":[{"count":4,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/2034765\/revisions"}],"predecessor-version":[{"id":2035678,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/2034765\/revisions\/2035678"}],"wp:attachment":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media?parent=2034765"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}