{"id":11008,"date":"2024-07-09T07:00:50","date_gmt":"2024-07-09T05:00:50","guid":{"rendered":"https:\/\/cyberinsights.iainfraser.net\/?p=11008"},"modified":"2024-11-21T14:11:27","modified_gmt":"2024-11-21T13:11:27","slug":"cyberinsights-for-090724","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2024\/07\/09\/cyberinsights-for-090724\/","title":{"rendered":"CYBER INSIGHTS: Tuesday 09 July 2024 \u2013 Today\u2019s SME Cybersecurity News &#038; Intelligence"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"11008\" class=\"elementor elementor-11008\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b23cd6f e-flex e-con-boxed e-con e-parent\" data-id=\"2b23cd6f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-35c3c432 elementor-widget elementor-widget-html\" data-id=\"35c3c432\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1101loxy2\/creativeref:1101l50786\" rel=\"sponsored noopener\" target=\"_blank\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1101loxy2\/creativeref:1101l50786\" width=\"1456\" height=\"180\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-57d5f9f3 e-con-full e-flex e-con e-parent\" data-id=\"57d5f9f3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-60021ad1 e-con-full e-flex e-con e-child\" data-id=\"60021ad1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-20236da8 elementor-widget elementor-widget-image\" data-id=\"20236da8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:National_Cyber_Security_Centre_(United_Kingdom)_building_in_London.png\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"200\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/512px-National_Cyber_Security_Centre_United_Kingdom_building_in_London-300x200.png\" class=\"attachment-medium size-medium wp-image-11075\" alt=\"Image Credit: UK Government under Open Government Licence\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/512px-National_Cyber_Security_Centre_United_Kingdom_building_in_London-300x200.png 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/512px-National_Cyber_Security_Centre_United_Kingdom_building_in_London.png 512w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: UK Government under Open Government Licence<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1bde9d90 elementor-widget elementor-widget-html\" data-id=\"1bde9d90\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1100loHrP\/creativeref:1011l114168\" rel=\"sponsored noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1100loHrP\/creativeref:1011l114168\" width=\"1080\" height=\"1080\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1a51485e e-con-full e-flex e-con e-child\" data-id=\"1a51485e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4005f1a1 elementor-widget elementor-widget-wp-widget-text\" data-id=\"4005f1a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>Gibraltar: Tuesday\u00a0 09 July 2024 at 07:00 CET<\/p>\n<p><strong>CYBER INSIGHTS: The Latest <a href=\"https:\/\/www.google.com\/search?q=sme+cybersecurity+news&amp;sca_esv=350977eb0947f7bf&amp;sxsrf=ACQVn0-rYmAEbInLOanb9VZn4-wiMXumXw%3A1709712339874&amp;source=hp&amp;ei=0yPoZbGhM_GakdUPj-G_oAM&amp;iflsig=ANes7DEAAAAAZegx4zIh63qA8kSg92IhC_JF7xz151s1&amp;oq=sme+cyber&amp;gs_lp=Egdnd3Mtd2l6IglzbWUgY3liZXIqAggBMgQQIxgnMgQQIxgnMgQQIxgnMgUQABiABDIFEAAYgAQyBRAAGIAEMgUQABiABDIFEAAYgAQyBRAAGIAEMgYQABgWGB5IzCdQAFjlDXAAeACQAQCYAZ8CoAGgDaoBBTAuNS40uAEDyAEA-AEBmAIJoALSDsICChAjGIAEGIoFGCfCAgsQABiABBiKBRiRAsICCxAuGIAEGMcBGNEDwgIKEAAYgAQYigUYQ8ICBRAuGIAEwgIKEAAYgAQYFBiHApgDAJIHBzAuNS4zLjGgB7BS&amp;sclient=gws-wiz#ip=1\" target=\"_blank\" rel=\"noopener\">SME Cybersecurity News <\/a><\/strong><strong>&amp; Intelligence &#8230;<\/strong><br \/>\nWritten &amp; Curated By\u00a0<a href=\"https:\/\/www.google.com\/search?q=cybersecurity+journalist&amp;oq=Cybersec&amp;gs_lcrp=EgZjaHJvbWUqCQgAEEUYOxiABDIJCAAQRRg7GIAEMgYIARBFGDsyBwgCEAAYgAQyBggDEEUYQDIGCAQQRRg5MgcIBRAAGIAEMgcIBhAAGIAEMgcIBxAAGIAE0gEJMzc1MmowajE1qAIAsAIA&amp;sourceid=chrome&amp;ie=UTF-8\" target=\"_blank\" rel=\"noopener\">Iain Fraser \u2013 Cybersecurity Journalist<\/a><br \/>\nvia <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">CYBERInsights<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=sme+cybersecurity+news&amp;client=opera&amp;hs=QsT&amp;sca_esv=cd08aac0b4846c63&amp;sxsrf=ADLYWIIaZwnvuQfvJpPCaga2UcqJmvux4A%3A1719554579183&amp;ei=E1J-Zu30Cqbpi-gPva6Q6A8&amp;ved=0ahUKEwityvT-z_2GAxWm9AIHHT0XBP0Q4dUDCBA&amp;uact=5&amp;oq=sme+cybersecurity+news&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiFnNtZSBjeWJlcnNlY3VyaXR5IG5ld3MyBBAjGCcyBBAjGCcyBhAAGBYYHjILEAAYgAQYhgMYigUyCxAAGIAEGIYDGIoFMgsQABiABBiGAxiKBTIIEAAYgAQYogRI0hpQuwdYtBJwAXgBkAEAmAHBAaABkAiqAQMwLja4AQPIAQD4AQGYAgagApcHwgIHECMYsAMYJ8ICChAAGLADGNYEGEfCAgUQABiABJgDAIgGAZAGCZIHBTEuNC4xoAerMw&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">First for SME Cybersecurity News<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=sme+cyber+news&amp;sca_esv=ac280b94449c27e4&amp;sca_upv=1&amp;sxsrf=ADLYWIL2EDFhyAGAbD5g_FALulRP9wJWlw%3A1720518479397&amp;ei=TweNZpT4F_rdxc8PhtiN4AM&amp;oq=sme+cyber+&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiCnNtZSBjeWJlciAqAggBMgoQIxiABBgnGIoFMgQQIxgnMgQQIxgnMgsQABiABBiRAhiKBTILEAAYgAQYkQIYigUyBRAAGIAEMgUQABiABDIGEAAYFhgeMgYQABgWGB4yBhAAGBYYHki3L1DsDFjzGXABeAGQAQCYAbQFoAGlFaoBCzAuMi4yLjEuMS4yuAEByAEA-AEBmAIEoAKhBsICBxAjGLADGCfCAgoQABiwAxjWBBhHwgILEAAYgAQYhgMYigXCAggQABiABBiiBJgDAIgGAZAGCpIHCTEuMS4xLjAuMaAH904&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Google Indexed on 090724 at 07:05 CET<\/a><\/p>\n<p><strong>Welcome to Today&#8217;s Edition of CYBERInsights &#8211; My Daily Roundup of the Latest European <a href=\"https:\/\/www.google.com\/search?q=sme+cybersecurity+news&amp;sca_esv=350977eb0947f7bf&amp;sxsrf=ACQVn0-rYmAEbInLOanb9VZn4-wiMXumXw%3A1709712339874&amp;source=hp&amp;ei=0yPoZbGhM_GakdUPj-G_oAM&amp;iflsig=ANes7DEAAAAAZegx4zIh63qA8kSg92IhC_JF7xz151s1&amp;oq=sme+cyber&amp;gs_lp=Egdnd3Mtd2l6IglzbWUgY3liZXIqAggBMgQQIxgnMgQQIxgnMgQQIxgnMgUQABiABDIFEAAYgAQyBRAAGIAEMgUQABiABDIFEAAYgAQyBRAAGIAEMgYQABgWGB5IzCdQAFjlDXAAeACQAQCYAZ8CoAGgDaoBBTAuNS40uAEDyAEA-AEBmAIJoALSDsICChAjGIAEGIoFGCfCAgsQABiABBiKBRiRAsICCxAuGIAEGMcBGNEDwgIKEAAYgAQYigUYQ8ICBRAuGIAEwgIKEAAYgAQYFBiHApgDAJIHBzAuNS4zLjGgB7BS&amp;sclient=gws-wiz#ip=1\" target=\"_blank\" rel=\"noopener\">SME Cybersecurity News<\/a> including: 1). Best Practice NCSC 2).Bitsight Third-party risk Management 3).AI Explained <\/strong><em>#CybersecurityJournalist #CyberInsights #SMECybersecurityNews #Bitsight #RiskManagement #AI<\/em><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4907495e e-con-full e-flex e-con e-child\" data-id=\"4907495e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-794d3d19 elementor-widget elementor-widget-wp-widget-text\" data-id=\"794d3d19\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>1).\u00a0BEST PRACTICE: NCSC &#8211;<\/strong> Improve your <strong>Cybersecurity<\/strong> with affordable, practical advice for Small Businesses. <strong>SME<\/strong> Cybersecurity doesn&#8217;t have to be daunting &#8211; UK Government Cyber body <a href=\"https:\/\/www.ncsc.gov.uk\/\" target=\"_blank\" rel=\"noopener\"><strong>NCSC<\/strong><\/a> or National Cyber Security Centre (part of GCHQ) has outlined five quick and easy protocols curated to save time, money and even business\u2019 reputation. If you want to improve your cyber security further, then you can also seek certification under the <strong>Cyber<\/strong> Essentials scheme.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6d66dc5e elementor-align-center elementor-widget elementor-widget-button\" data-id=\"6d66dc5e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-109c7ae elementor-widget elementor-widget-wp-widget-text\" data-id=\"109c7ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>2).\u00a0<\/strong><strong>SME CYBERSECURITY:\u00a0 Bitsight announces expansion of its third-party risk management solutions in Europe &#8211;<\/strong> Leading Cyber Risk Management firm <a href=\"https:\/\/www.bitsight.com\" target=\"_blank\" rel=\"noopener\"><strong>Bitsight<\/strong><\/a> has announced a series of strategic investments to expand its third-party risk management solutions in Europe. <strong>Bitsight<\/strong> already delivers a fully integrated solution to manage the supplier lifecycle and extended supply chain, the new capabilities will focus on helping enterprises to adhere to the looming <strong>NIS2<\/strong> Directive.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d6c3ba elementor-align-center elementor-widget elementor-widget-button\" data-id=\"d6c3ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c98106c elementor-widget elementor-widget-wp-widget-text\" data-id=\"6c98106c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>3). WHAT IS\u00a0<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-ai-artificial-intelligence\/\" target=\"_blank\" rel=\"noopener\">AI<\/a>? A COMPREHENSIVE GUIDE TO AI AND ITS IMPACT\u00a0? \u2013 CyberKPI:\u00a0<\/strong>An in-depth exploration of\u00a0<strong><a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-ai-artificial-intelligence\/\" target=\"_blank\" rel=\"noopener\">Artificial Intelligence<\/a>,\u00a0<\/strong>covering its types, the role of machine learning and deep learning, practical applications, its intersection with cybersecurity, governance and ethical considerations, and its future impact on society. AI plays a crucial role in transforming cybersecurity defences by enhancing data protection and threat detection capabilities.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-142c70e8 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"142c70e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-ai-artificial-intelligence\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-545ace2d elementor-widget elementor-widget-wp-widget-text\" data-id=\"545ace2d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>ABOUT IAIN FRASER \u2013<\/strong> I am a Gibraltar based, Accredited Journalist, (*NUJ, IFJ &amp; ONA) Authority Writer,\u00a0 Commentator &amp; Publisher of <a href=\"https:\/\/cyberinsights.iainfraser.net\" target=\"_blank\" rel=\"noopener\"><strong>CYBERinsights<\/strong><\/a> and cover all aspects of <strong>Cybersecurity<\/strong> [Awareness, Threat Management, Best Practice Compliance &amp; Mitigation] and report throughout Europe &amp; the UK<\/p>\n<p>In addition to <strong>Cybersecurity<\/strong>, I also cover the sectors where I have either operational experience or subject matter expert knowledge including: <strong>Geopolitics, Defence Technology, AI &amp; National Security<\/strong> and contribute to a broad range of European facing news channels, blogs and digital magazines as either Guest Feature Writer, Columnist or Consultant Editor.<\/p>\n<p>LinkedIn Bio: <a href=\"https:\/\/www.linkedin.com\/in\/iainfraserjournalist\/\" target=\"_blank\" rel=\"noopener\">IainFraserJournalist<\/a><br \/>\nEmail: <a href=\"mailto:iain@iainfraser.net\">iain@iainfraser.net<\/a> | <a href=\"http:\/\/www.iainfraser.net\" target=\"_blank\" rel=\"noopener\">www.iainfraser.net<\/a><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: UK Government under Open Government Licence Learn More \/&#8230; Learn More \/&#8230; Learn&#8230;<\/p>\n","protected":false},"author":1,"featured_media":11075,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[14],"tags":[419],"ppma_author":[415],"class_list":["post-11008","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberinsights","tag-cyberinsights"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/512px-National_Cyber_Security_Centre_United_Kingdom_building_in_London.png",512,341,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/512px-National_Cyber_Security_Centre_United_Kingdom_building_in_London-150x150.png",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/512px-National_Cyber_Security_Centre_United_Kingdom_building_in_London-300x200.png",300,200,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/512px-National_Cyber_Security_Centre_United_Kingdom_building_in_London.png",512,341,false],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/512px-National_Cyber_Security_Centre_United_Kingdom_building_in_London.png",512,341,false],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/512px-National_Cyber_Security_Centre_United_Kingdom_building_in_London.png",512,341,false],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/512px-National_Cyber_Security_Centre_United_Kingdom_building_in_London.png",512,341,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/512px-National_Cyber_Security_Centre_United_Kingdom_building_in_London.png",512,341,false],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/512px-National_Cyber_Security_Centre_United_Kingdom_building_in_London.png",510,340,false]},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberinsights\/\" rel=\"category tag\">SMECYBERIINSIGHTS<\/a>","tag_info":"SMECYBERIINSIGHTS","comment_count":"0","authors":[{"term_id":415,"user_id":0,"is_guest":1,"slug":"cybersecurity-journalist-iain-fraser","display_name":"Cybersecurity Journalist - Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/11008","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=11008"}],"version-history":[{"count":1,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/11008\/revisions"}],"predecessor-version":[{"id":15945,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/11008\/revisions\/15945"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/11075"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=11008"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=11008"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=11008"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=11008"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}