{"id":11339,"date":"2024-07-09T10:40:03","date_gmt":"2024-07-09T08:40:03","guid":{"rendered":"https:\/\/cyberinsights.iainfraser.net\/?p=11339"},"modified":"2024-11-21T14:11:26","modified_gmt":"2024-11-21T13:11:26","slug":"ai-pros-and-cons","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2024\/07\/09\/ai-pros-and-cons\/","title":{"rendered":"THREAT INTEL: AI- Learning the Benefits of AI and the Disadvantages if Not Applied Properly"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"11339\" class=\"elementor elementor-11339\">\n\t\t\t\t<div class=\"elementor-element elementor-element-134392fc e-flex e-con-boxed e-con e-parent\" data-id=\"134392fc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-40405df0 elementor-widget elementor-widget-html\" data-id=\"40405df0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1101loxy2\/creativeref:1101l50786\" rel=\"sponsored noopener\" target=\"_blank\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1101loxy2\/creativeref:1101l50786\" width=\"1456\" height=\"180\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-667e0ae e-con-full e-flex e-con e-parent\" data-id=\"667e0ae\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-4489ec6 e-con-full e-flex e-con e-child\" data-id=\"4489ec6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a7bed72 elementor-widget elementor-widget-image\" data-id=\"a7bed72\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.flickr.com\/photos\/groovysoup\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"200\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/ai-technology-microchip-background-digital-transformation-concept-300x200.jpg\" class=\"attachment-medium size-medium wp-image-11351\" alt=\"ai-technology-microchip-background-digital-transformation-concept\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/ai-technology-microchip-background-digital-transformation-concept-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/ai-technology-microchip-background-digital-transformation-concept.jpg 550w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: rawpixel.com\/FreePik<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b989f1 elementor-widget elementor-widget-html\" data-id=\"4b989f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1100loHrP\/creativeref:1011l114168\" rel=\"sponsored noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1100loHrP\/creativeref:1011l114168\" width=\"1080\" height=\"1080\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-264067b7 e-con-full e-flex e-con e-child\" data-id=\"264067b7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-724dfba1 elementor-widget elementor-widget-wp-widget-text\" data-id=\"724dfba1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>Gibraltar: Tuesday 09 July\u00a0 2024 at 11:00 CET<\/p>\n<p><strong>THREAT INTEL: AI- Learning the Benefits of AI and the Disadvantages if Not Applied Properly<\/strong><\/p>\n<p>By Andy Jenkinson \u2013 Guest Contributor |\u00a0 Group CEO\u00a0<a href=\"https:\/\/www.cybersecip.com\/\" target=\"_blank\" rel=\"noopener\">Cybersec Innovation Partners<\/a><br \/>\nvia <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">CYBERInsights<\/a><br \/>\nFirst for\u00a0<a href=\"https:\/\/www.google.com\/search?client=opera&amp;q=sme+cybersecurity+news&amp;sourceid=opera&amp;ie=UTF-8&amp;oe=UTF-8\" target=\"_blank\" rel=\"noopener\">SME Cybersecurity News<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=Learning+the+Benefits+of+AI+and+the+Disadvantages+if+Not+Applied+Properly&amp;sca_esv=2408318afbf8f435&amp;sca_upv=1&amp;sxsrf=ADLYWILja6yFYkyoqNeQhjGmW-YPHu0d2g%3A1720600581865&amp;ei=BUiOZobENMurkdUP3aaR6Ao&amp;ved=0ahUKEwjG2u3TiJyHAxXLVaQEHV1TBK0Q4dUDCA8&amp;uact=5&amp;oq=Learning+the+Benefits+of+AI+and+the+Disadvantages+if+Not+Applied+Properly&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiSUxlYXJuaW5nIHRoZSBCZW5lZml0cyBvZiBBSSBhbmQgdGhlIERpc2FkdmFudGFnZXMgaWYgTm90IEFwcGxpZWQgUHJvcGVybHlIAFAAWABwAHgBkAEAmAEAoAEAqgEAuAEDyAEA-AEBmAIAoAIAmAMAkgcAoAcA&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Google Indexed on 090724 at 11:40 CET<\/a><\/p>\n<p><em>#CyberInsights #SMECybersecurityNews #Cybersecurity #WhitethornShield #InternetSecurity #DNS #PKI<\/em><\/p>\n<div class=\" mr2\">\n<div class=\"feed-shared-inline-show-more-text feed-shared-update-v2__description feed-shared-inline-show-more-text--minimal-padding feed-shared-inline-show-more-text--expanded \">\n<div class=\"update-components-text relative update-components-update-v2__commentary \" dir=\"ltr\">\n<p><span class=\"break-words tvm-parent-container\"><span dir=\"ltr\">No matter what your opinions are on <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-ai-artificial-intelligence\/\" target=\"_blank\" rel=\"noopener\"><strong>AI<\/strong><\/a>, good, bad, or indifferent, truth be told, currently <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-ai-artificial-intelligence\/\" target=\"_blank\" rel=\"noopener\"><strong>AI<\/strong><\/a> can do MUCH more harm than good, you just cannot see it, yet&#8230;<\/span><\/span><\/p>\n<p>Like all new technology such as <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-blockchain\/\" target=\"_blank\" rel=\"noopener\"><strong>Blockchain<\/strong><\/a>, <strong>Quantum<\/strong>, and <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-ai-artificial-intelligence\/\" target=\"_blank\" rel=\"noopener\"><strong>AI<\/strong><\/a>, these technologies exploit and exacerbate already lax basic security controls and management &#8211; <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-ai-artificial-intelligence\/\" target=\"_blank\" rel=\"noopener\"><strong>AI<\/strong><\/a> is no different.<\/p>\n<p>The below subdomain, which at most is two years old, is sporting a Fake Certificate making this <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/what-is-ai-artificial-intelligence\/\" target=\"_blank\" rel=\"noopener\"><strong>AI<\/strong> <\/a>subdomain extremely compromised and incredibly dangerous.<\/p>\n<p>This error and exposure highlights the lack of controls and management and not unlike many other Internet Assets, is a major cause for concern and can provide access for nefarious use.<\/p>\n<p>Add <strong>IPv4&#8217;s<\/strong> on <strong>DNS<\/strong> Blacklists and extremely unusual redirections and it is clear the Digital Gold Rush has the power to cause much more harm and damage than good.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-42a0dfc3 elementor-widget elementor-widget-image\" data-id=\"42a0dfc3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"333\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/AJ_090724-1024x532.jpg\" class=\"attachment-large size-large wp-image-11350\" alt=\"AJ_090724\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/AJ_090724-1024x532.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/AJ_090724-300x156.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/AJ_090724-768x399.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/AJ_090724.jpg 1318w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-80db45f elementor-widget elementor-widget-wp-widget-text\" data-id=\"80db45f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><div class=\"feed-shared-inline-show-more-text feed-shared-update-v2__description feed-shared-inline-show-more-text--minimal-padding feed-shared-inline-show-more-text--expanded \">\n<div class=\"update-components-text relative update-components-update-v2__commentary \" dir=\"ltr\">\n<p>Facts can be stubborn thing, yet there they are- FACTS&#8230;<\/p>\n<p>Please DO NOT fall into Insecurity Entrapment. If your partners and suppliers DO NOT CARE, that leaves only you and you clearly MUST.<\/p>\n<p><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/cybersec-innovation-partners\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Cybersec Innovation Partners<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/information-commissioner%27s-office\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Information Commissioner&#8217;s Office<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/gchq\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">GCHQ<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/fbicyber\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">FBI Cyber Division<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/central-intelligence-agency\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Central Intelligence Agency<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/us-department-of-homeland-security\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">U.S. Department of Homeland Security<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/national-security-agency\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">National Security Agency<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/bbc-news\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">BBC News<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/itv-news\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">ITV News<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/cnbc\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">CNBC<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/abcnews\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">ABC News<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/fox-news-channel\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Fox News Media<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=internetsecurity&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7216143652211863552&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_feed%3BivQmnEmcQyGq7S7nca1viA%3D%3D\" data-test-app-aware-link=\"\" data-ntt-old-href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=internetsecurity&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7216143652211863552\" target=\"_blank\" rel=\"noopener\">InternetSecurity<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=dns&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7216143652211863552\" data-test-app-aware-link=\"\" target=\"_blank\" rel=\"noopener\">DNS<\/a> <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=pki&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7216143652211863552\" data-test-app-aware-link=\"\" target=\"_blank\" rel=\"noopener\">PKI<\/a><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-36b45a09 e-con-full e-flex e-con e-child\" data-id=\"36b45a09\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-741b08ed elementor-align-center elementor-widget elementor-widget-button\" data-id=\"741b08ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-360f2fc7 elementor-widget elementor-widget-wp-widget-text\" data-id=\"360f2fc7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong><span lang=\"en-GB\">About Andy Jenkinson<\/span><\/strong><\/p>\n<p><strong><span lang=\"en-GB\">Group CEO CIP. Fellow Cyber Theory Institute. Director Fintech &amp; Cyber Security Alliance (FITCA) working with Governments. Recognised Expert in Internet Asset &amp; DNS Vulnerabilities.<\/span><\/strong><\/p>\n<p>Andy Jenkinson is a senior and seasoned innovative Executive with over 30 years\u2019 experience as a hands-on lateral thinking CEO, coach, and leader. A \u2018big deal\u2019 business accelerator, and inspirational, lateral thinker, Andy has crafted, created, and been responsible for delivering 100\u2019s \u00a3 millions of projects within the Cyber, Technical, Risk and Compliance markets for some of the world\u2019s largest, leading organisations. Andy has a demonstrable track record of largescale technical delivery and management within many sectors including the Professional, Managed, and Financial Services.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ea2e104 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"6ea2e104\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.linkedin.com\/in\/andy-jenkinson-96210727\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-67bc2c55 e-flex e-con-boxed e-con e-parent\" data-id=\"67bc2c55\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: rawpixel.com\/FreePik Learn More \/&#8230; Learn More \/&#8230;<\/p>\n","protected":false},"author":1,"featured_media":11351,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[440,544],"tags":[474,439],"ppma_author":[415],"class_list":["post-11339","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberthreat-intel","category-ai","tag-ai","tag-cyberthreat-intel"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/ai-technology-microchip-background-digital-transformation-concept.jpg",550,367,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/ai-technology-microchip-background-digital-transformation-concept-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/ai-technology-microchip-background-digital-transformation-concept-300x200.jpg",300,200,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/ai-technology-microchip-background-digital-transformation-concept.jpg",550,367,false],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/ai-technology-microchip-background-digital-transformation-concept.jpg",550,367,false],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/ai-technology-microchip-background-digital-transformation-concept.jpg",550,367,false],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/ai-technology-microchip-background-digital-transformation-concept.jpg",550,367,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/ai-technology-microchip-background-digital-transformation-concept.jpg",550,367,false],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/ai-technology-microchip-background-digital-transformation-concept-540x340.jpg",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberthreat-intel\/\" rel=\"category tag\">SME CYBER\/THREAT INTEL<\/a> <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/ai\/\" rel=\"category tag\">AI<\/a>","tag_info":"AI","comment_count":"0","authors":[{"term_id":415,"user_id":0,"is_guest":1,"slug":"cybersecurity-journalist-iain-fraser","display_name":"Cybersecurity Journalist - Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/11339","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=11339"}],"version-history":[{"count":1,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/11339\/revisions"}],"predecessor-version":[{"id":13389,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/11339\/revisions\/13389"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/11351"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=11339"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=11339"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=11339"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=11339"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}