{"id":2036121,"date":"2024-11-13T00:42:06","date_gmt":"2024-11-13T05:42:06","guid":{"rendered":"https:\/\/securityboulevard.com\/?p=2036121"},"modified":"2024-11-13T08:32:09","modified_gmt":"2024-11-13T13:32:09","slug":"sealing-entry-points-and-weak-links-in-the-environment-how-dell-is-building-an-iron-wall-of-defense","status":"publish","type":"post","link":"https:\/\/securityboulevard.com\/2024\/11\/sealing-entry-points-and-weak-links-in-the-environment-how-dell-is-building-an-iron-wall-of-defense\/","title":{"rendered":"Sealing Entry Points and Weak Links in the Environment &#8211; How Dell is Building an Iron Wall of Defense"},"content":{"rendered":"<p>Preparing for cyberattacks is just part of being a discerning business organization. These days, the road to cyber preparedness begins with studying organizations\u2019 own vulnerabilities &#8211; and doing it often so that nothing escapes notice \u2013 rather than obsessing about the perils that live outside.<\/p>\n<p>SecOps and SOCs are on perpetual overtime running tests, doing reconnaissance, scanning endpoints, configuring tools and keeping an eye on every single vector that can potentially become a vulnerability.<\/p>\n<p>Laterally, they have to respond to a dizzying number of feeds and alerts sent down by both teams and tools in the environment.<\/p>\n<p>Recognizing risks and vulnerabilities unique to the organization is foundational to cyber protection as it helps pick the right tools for the right risks. However, many companies are grappling to do this end-to-end in the environment.<\/p>\n<div class=\"jetpack-video-wrapper\">\n<div class=\"fitvids-video\"><iframe loading=\"lazy\" title=\"Reduce the Attack Surface with Dell Technologies\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/9b-33RLvwi0?feature=oembed&#038;enablejsapi=1&#038;origin=https:\/\/securityboulevard.com\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<\/div>\n<p>Asking a few pointed questions can reveal deep details about the cyber health of an environment and tell you exactly where it\u2019s lacking, says Sameer Shah.<\/p>\n<p>\u201cThis is where organizations may have a feel for where they may have weaknesses and vulnerabilities specific to their environments,\u201d he said.<\/p>\n<p>Mr. Shah who is the marketing leader at <a href=\"https:\/\/www.dell.com\/en-us\" target=\"_blank\" rel=\"noopener\">Dell Technologies\u2019<\/a> cyber portfolio pointed to some of these questions while presenting at the <a href=\"https:\/\/techfieldday.com\/event\/xfd12\/\" target=\"_blank\" rel=\"noopener\">Security Field Day event<\/a> in October.<\/p>\n<p>Things like whether you have perimeter-based security implemented, or if you are protected against credential theft, he said, can instantly tell you if you are doing continuous verification, and how open the attack surface really is.<\/p>\n<p>\u201cA third of cyberattacks originate from some sort of credential theft or compromise,\u201d Mr. Shah noted.<\/p>\n<p>An equally worrying trend is rising physical and digital supply chain attacks that have exploded since the pandemic.<\/p>\n<p>\u201cWe&#8217;ve seen digital supply chain issues related to open-source code,\u201d he said. \u201cA few months ago, there was an open-source code vulnerability that a Microsoft developer happened to find and patch before it could cause any damage. It was a good reminder that we also have to think about software development digital supply chain and ensure that those risks are addressed.\u201d<\/p>\n<p>In talking to many CEOs, Mr. Shah learned that IT leaders consider signed BIOS and firmware updates critical to maintaining foundational security. However, many of these organizations lacked consistency in their cyber security practices. For example, penetration testing, attack simulation and vulnerability management are \u201conly as good as often as they are done. They are not one-and-done scenarios,\u201d he said.<\/p>\n<p>\u201cIt may seem kind of common sensical but when you think about the talent gap in cybersecurity, when you think about the understaffed and overworked SOC teams, the discipline falls as there&#8217;s a million alerts to deal with and not a big enough team. As a result, we are seeing a growing number of attacks that exploit vulnerabilities that exist from just the lack of regular patching.\u201d<\/p>\n<p>Through cycles of growth and regression, and continued evolution of the organization, these practices over and over ensure that tooling is synced with the changing risk profiles, he reminded.<\/p>\n<p>Dell recognizes that there cannot be a silver bullet for the kinds of peril that exist today. However, embedding a set of security features in all products and solutions can annihilate a broad sweep of internal weak links.<\/p>\n<p>So, keeping a few key strategies in near focus &#8211; most crucially zero-trust &#8211; and targeting outcomes like supply chain security, system hardening, containment and authentication, <a href=\"https:\/\/www.dell.com\/en-us\" target=\"_blank\" rel=\"noopener\">Dell<\/a> has designed features that it has baked in across the length and breadth of its infrastructure and endpoint portfolio. These features, it says, will help organizations contract the attack surface and become slim targets to emerging threats.<\/p>\n<p>Dell\u2019s 14<sup>th<\/sup> generation PowerEdge servers are embedded with immutable, silicon-based Root of Trust (RoT). Designed into the hardware to protect against malware tampering, the silicon-based Root of Trust technology allows the servers to confirm the integrity of BIOS and iDRAC firmware, cryptographically.<\/p>\n<p>\u201cWe burn read-only encryption keys into our PowerEdge servers at the factory during the manufacturing process which makes it immutable,\u201d said Mr. Shah.<\/p>\n<p>Security is built-in on the networking side too through features like cryptographic encryption for data in flight, network segmentation, ACL restrictions on the control plane and secure authentication.<\/p>\n<p>One can never fully foresee the threats looming across the supply chain, nor have control over them.\u00a0 So Dell offers a range of endpoint security solutions that it says make its devices the \u201cmost secure commercial PCs.\u201d Dell invites customers to do a feature-by-feature comparison with other vendors to back this claim.<\/p>\n<p>Dell\u2019s endpoint solutions are secure from the first boot. Through rigorous supply chain controls and a combination of hardware and software security that allows it to provide supply chain assurance, secure development lifecycle and secure component verification, <a href=\"https:\/\/www.dell.com\/en-us\" target=\"_blank\" rel=\"noopener\">Dell<\/a> makes the endpoints secure by design.<\/p>\n<p>Mr. Shah highlighted that security at the BIOS and firmware level helps assure the security of all devices in use.<\/p>\n<p>In addition to features built into the box, Mr. Shah said that add-on features and software can be optionally added to PowerEdge servers for extra security.<\/p>\n<p>Offered alongside these are a spectrum of solutions like readiness assessment, penetration testing, vulnerability scanning and attack simulation management \u2013 that help unmask hidden vulnerabilities.<\/p>\n<p>\u201cThe services are a way to work in concert with the hardware to reduce the attack surface across the infrastructure.\u201d<\/p>\n<p>Furthermore, leveraging Dell Common Identity Management Solutions, users can create bespoke security solutions for use cases that apply across the portfolio.<\/p>\n<p>\u201cThis isn&#8217;t a product; what it does is it makes security management simpler by ensuring that all products work together,\u201d told Mr. Shah.<\/p>\n<p>In 2023, IT and telecom became the second leading vertical to invest in the Identity and Access Management space. According to <a href=\"https:\/\/futurumgroup.com\/futurum-intelligence\/\" target=\"_blank\" rel=\"noopener\">Futurum Intelligence<\/a> estimates, the vertical captured approximately 22% of the total IAM market worldwide.<\/p>\n<p>Go to <a href=\"https:\/\/techfieldday.com\" target=\"_blank\" rel=\"noopener\">Techfieldday.com<\/a> to watch the <a href=\"https:\/\/techfieldday.com\/appearance\/dell-technologies-presents-at-security-field-day-12\/\" target=\"_blank\" rel=\"noopener\">Security Field Day presentations<\/a> where Dell explains how the solutions work under the hood.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The road to cyber preparedness begins with studying organizations\u2019 own vulnerabilities &#8211; and doing it often so that nothing escapes notice \u2013 rather than obsessing about the perils that live outside.<\/p>\n","protected":false},"author":21917,"featured_media":2036167,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[98631,99462,99461,85026],"tags":[104199,104282,104200,28248,104057],"class_list":["post-2036121","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-social-facebook","category-social-linkedin","category-social-x","category-sponsored-content","tag-techfieldday","tag-thefuturumgroup","tag-writeroftech1","tag-dell","tag-xfd12"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.9 (Yoast SEO v23.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Sealing Entry Points and Weak Links in the Environment - How Dell is Building an Iron Wall of Defense - Security Boulevard<\/title>\n<meta name=\"description\" content=\"The road to cyber preparedness begins with studying organizations\u2019 own vulnerabilities - and doing it often so that nothing escapes notice.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securityboulevard.com\/2024\/11\/sealing-entry-points-and-weak-links-in-the-environment-how-dell-is-building-an-iron-wall-of-defense\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sealing Entry Points and Weak Links in the Environment - How Dell is Building an Iron Wall of Defense\" \/>\n<meta property=\"og:description\" content=\"The road to cyber preparedness begins with studying organizations\u2019 own vulnerabilities - and doing it often so that nothing escapes notice \u2013 rather than obsessing about the perils that live outside.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securityboulevard.com\/2024\/11\/sealing-entry-points-and-weak-links-in-the-environment-how-dell-is-building-an-iron-wall-of-defense\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Boulevard\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/groups\/24445075146\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-13T05:42:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-13T13:32:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/Dell-Supply-Chain-Assurance.png\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sulagna Saha\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@securityblvd\" \/>\n<meta name=\"twitter:site\" content=\"@securityblvd\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securityboulevard.com\/2024\/11\/sealing-entry-points-and-weak-links-in-the-environment-how-dell-is-building-an-iron-wall-of-defense\/\",\"url\":\"https:\/\/securityboulevard.com\/2024\/11\/sealing-entry-points-and-weak-links-in-the-environment-how-dell-is-building-an-iron-wall-of-defense\/\",\"name\":\"Sealing Entry Points and Weak Links in the Environment - How Dell is Building an Iron Wall of Defense - Security Boulevard\",\"isPartOf\":{\"@id\":\"https:\/\/securityboulevard.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securityboulevard.com\/2024\/11\/sealing-entry-points-and-weak-links-in-the-environment-how-dell-is-building-an-iron-wall-of-defense\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securityboulevard.com\/2024\/11\/sealing-entry-points-and-weak-links-in-the-environment-how-dell-is-building-an-iron-wall-of-defense\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/Dell-Supply-Chain-Assurance.png\",\"datePublished\":\"2024-11-13T05:42:06+00:00\",\"dateModified\":\"2024-11-13T13:32:09+00:00\",\"author\":{\"@id\":\"https:\/\/securityboulevard.com\/#\/schema\/person\/d5effdd656fe81817788da89a3cc84dc\"},\"description\":\"The road to cyber preparedness begins with studying organizations\u2019 own vulnerabilities - and doing it often so that nothing escapes notice.\",\"breadcrumb\":{\"@id\":\"https:\/\/securityboulevard.com\/2024\/11\/sealing-entry-points-and-weak-links-in-the-environment-how-dell-is-building-an-iron-wall-of-defense\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securityboulevard.com\/2024\/11\/sealing-entry-points-and-weak-links-in-the-environment-how-dell-is-building-an-iron-wall-of-defense\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/securityboulevard.com\/2024\/11\/sealing-entry-points-and-weak-links-in-the-environment-how-dell-is-building-an-iron-wall-of-defense\/#primaryimage\",\"url\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/Dell-Supply-Chain-Assurance.png\",\"contentUrl\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/Dell-Supply-Chain-Assurance.png\",\"width\":770,\"height\":330,\"caption\":\"vulnerabilities, cyber, Dell,\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securityboulevard.com\/2024\/11\/sealing-entry-points-and-weak-links-in-the-environment-how-dell-is-building-an-iron-wall-of-defense\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securityboulevard.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sponsored Content\",\"item\":\"https:\/\/securityboulevard.com\/category\/sponsored-content\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Sealing Entry Points and Weak Links in the Environment &#8211; How Dell is Building an Iron Wall of Defense\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securityboulevard.com\/#website\",\"url\":\"https:\/\/securityboulevard.com\/\",\"name\":\"Security Boulevard\",\"description\":\"The Home of the Security Bloggers Network\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securityboulevard.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/securityboulevard.com\/#\/schema\/person\/d5effdd656fe81817788da89a3cc84dc\",\"name\":\"Sulagna Saha\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/securityboulevard.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/08\/cropped-Bio-Picture-scaled-1-96x96.jpg\",\"contentUrl\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/08\/cropped-Bio-Picture-scaled-1-96x96.jpg\",\"caption\":\"Sulagna Saha\"},\"description\":\"Sulagna Saha is a technology writer. She covers all the latest things in enterprise tech. For the last three years, she has focused on cloud computing, AI, cybersecurity, application development, data storage and networking. These are deeply technical subjects. So she likes to dig into the details, and help readers break through the jargons and consume information easily. Her stories talk about how IT solutions can help their intended users navigate the day-to-day responsibilities at work, and why companies should adopt a certain technology over the other. Sulagna talks to company leaders, software engineers, SMEs and spokespeople to bring new research and insider perspective to her work. In her free time, Sulagna can be found spending time with her toddler, browsing a book or experimenting in the kitchen. Traveling and movies are other things that she is passionate about.\",\"url\":\"https:\/\/securityboulevard.com\/author\/sulagna-saha\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Sealing Entry Points and Weak Links in the Environment - How Dell is Building an Iron Wall of Defense - Security Boulevard","description":"The road to cyber preparedness begins with studying organizations\u2019 own vulnerabilities - and doing it often so that nothing escapes notice.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securityboulevard.com\/2024\/11\/sealing-entry-points-and-weak-links-in-the-environment-how-dell-is-building-an-iron-wall-of-defense\/","og_locale":"en_US","og_type":"article","og_title":"Sealing Entry Points and Weak Links in the Environment - How Dell is Building an Iron Wall of Defense","og_description":"The road to cyber preparedness begins with studying organizations\u2019 own vulnerabilities - and doing it often so that nothing escapes notice \u2013 rather than obsessing about the perils that live outside.","og_url":"https:\/\/securityboulevard.com\/2024\/11\/sealing-entry-points-and-weak-links-in-the-environment-how-dell-is-building-an-iron-wall-of-defense\/","og_site_name":"Security Boulevard","article_publisher":"https:\/\/www.facebook.com\/groups\/24445075146\/","article_published_time":"2024-11-13T05:42:06+00:00","article_modified_time":"2024-11-13T13:32:09+00:00","og_image":[{"width":770,"height":330,"url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/Dell-Supply-Chain-Assurance.png","type":"image\/png"}],"author":"Sulagna Saha","twitter_card":"summary_large_image","twitter_creator":"@securityblvd","twitter_site":"@securityblvd","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/securityboulevard.com\/2024\/11\/sealing-entry-points-and-weak-links-in-the-environment-how-dell-is-building-an-iron-wall-of-defense\/","url":"https:\/\/securityboulevard.com\/2024\/11\/sealing-entry-points-and-weak-links-in-the-environment-how-dell-is-building-an-iron-wall-of-defense\/","name":"Sealing Entry Points and Weak Links in the Environment - How Dell is Building an Iron Wall of Defense - Security Boulevard","isPartOf":{"@id":"https:\/\/securityboulevard.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securityboulevard.com\/2024\/11\/sealing-entry-points-and-weak-links-in-the-environment-how-dell-is-building-an-iron-wall-of-defense\/#primaryimage"},"image":{"@id":"https:\/\/securityboulevard.com\/2024\/11\/sealing-entry-points-and-weak-links-in-the-environment-how-dell-is-building-an-iron-wall-of-defense\/#primaryimage"},"thumbnailUrl":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/Dell-Supply-Chain-Assurance.png","datePublished":"2024-11-13T05:42:06+00:00","dateModified":"2024-11-13T13:32:09+00:00","author":{"@id":"https:\/\/securityboulevard.com\/#\/schema\/person\/d5effdd656fe81817788da89a3cc84dc"},"description":"The road to cyber preparedness begins with studying organizations\u2019 own vulnerabilities - and doing it often so that nothing escapes notice.","breadcrumb":{"@id":"https:\/\/securityboulevard.com\/2024\/11\/sealing-entry-points-and-weak-links-in-the-environment-how-dell-is-building-an-iron-wall-of-defense\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securityboulevard.com\/2024\/11\/sealing-entry-points-and-weak-links-in-the-environment-how-dell-is-building-an-iron-wall-of-defense\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/securityboulevard.com\/2024\/11\/sealing-entry-points-and-weak-links-in-the-environment-how-dell-is-building-an-iron-wall-of-defense\/#primaryimage","url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/Dell-Supply-Chain-Assurance.png","contentUrl":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/Dell-Supply-Chain-Assurance.png","width":770,"height":330,"caption":"vulnerabilities, cyber, Dell,"},{"@type":"BreadcrumbList","@id":"https:\/\/securityboulevard.com\/2024\/11\/sealing-entry-points-and-weak-links-in-the-environment-how-dell-is-building-an-iron-wall-of-defense\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securityboulevard.com\/"},{"@type":"ListItem","position":2,"name":"Sponsored Content","item":"https:\/\/securityboulevard.com\/category\/sponsored-content\/"},{"@type":"ListItem","position":3,"name":"Sealing Entry Points and Weak Links in the Environment &#8211; How Dell is Building an Iron Wall of Defense"}]},{"@type":"WebSite","@id":"https:\/\/securityboulevard.com\/#website","url":"https:\/\/securityboulevard.com\/","name":"Security Boulevard","description":"The Home of the Security Bloggers Network","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securityboulevard.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/securityboulevard.com\/#\/schema\/person\/d5effdd656fe81817788da89a3cc84dc","name":"Sulagna Saha","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/securityboulevard.com\/#\/schema\/person\/image\/","url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/08\/cropped-Bio-Picture-scaled-1-96x96.jpg","contentUrl":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/08\/cropped-Bio-Picture-scaled-1-96x96.jpg","caption":"Sulagna Saha"},"description":"Sulagna Saha is a technology writer. She covers all the latest things in enterprise tech. For the last three years, she has focused on cloud computing, AI, cybersecurity, application development, data storage and networking. These are deeply technical subjects. So she likes to dig into the details, and help readers break through the jargons and consume information easily. Her stories talk about how IT solutions can help their intended users navigate the day-to-day responsibilities at work, and why companies should adopt a certain technology over the other. Sulagna talks to company leaders, software engineers, SMEs and spokespeople to bring new research and insider perspective to her work. In her free time, Sulagna can be found spending time with her toddler, browsing a book or experimenting in the kitchen. Traveling and movies are other things that she is passionate about.","url":"https:\/\/securityboulevard.com\/author\/sulagna-saha\/"}]}},"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/Dell-Supply-Chain-Assurance.png","jetpack_shortlink":"https:\/\/wp.me\/p91vu9-8xGF","_links":{"self":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/posts\/2036121","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/users\/21917"}],"replies":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/comments?post=2036121"}],"version-history":[{"count":3,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/posts\/2036121\/revisions"}],"predecessor-version":[{"id":2036173,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/posts\/2036121\/revisions\/2036173"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media\/2036167"}],"wp:attachment":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media?parent=2036121"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/categories?post=2036121"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/tags?post=2036121"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}