{"id":12101,"date":"2024-07-25T15:00:06","date_gmt":"2024-07-25T13:00:06","guid":{"rendered":"https:\/\/cyberinsights.iainfraser.net\/?p=12101"},"modified":"2024-11-21T13:46:46","modified_gmt":"2024-11-21T12:46:46","slug":"mastering-the-art-of-tokenisation","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2024\/07\/25\/mastering-the-art-of-tokenisation\/","title":{"rendered":"CYBER AWARENESS: The Art of Tokenisation: Going Dark in Modern Military Ops &#038; Corporate Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"12101\" class=\"elementor elementor-12101\">\n\t\t\t\t<div class=\"elementor-element elementor-element-71adbb34 e-flex e-con-boxed e-con e-parent\" data-id=\"71adbb34\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-45fc2de2 elementor-widget elementor-widget-html\" data-id=\"45fc2de2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1101loxy2\/creativeref:1101l50786\" rel=\"sponsored noopener\" target=\"_blank\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1101loxy2\/creativeref:1101l50786\" width=\"1456\" height=\"180\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6f15319 e-flex e-con-boxed e-con e-parent\" data-id=\"6f15319\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-20a049b3 e-con-full e-flex e-con e-child\" data-id=\"20a049b3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-143b9cad elementor-widget elementor-widget-image\" data-id=\"143b9cad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/zortrex.com\/about-company\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"169\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/1721898135382-300x169.png\" class=\"attachment-medium size-medium wp-image-12108\" alt=\"Tokenisation\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/1721898135382-300x169.png 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/1721898135382-1024x576.png 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/1721898135382-768x432.png 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/1721898135382.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: Zortrex<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6af370d3 elementor-widget elementor-widget-html\" data-id=\"6af370d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1100loHrP\/creativeref:1011l114168\" rel=\"sponsored noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1100loHrP\/creativeref:1011l114168\" width=\"1080\" height=\"1080\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-45ef4681 e-con-full e-flex e-con e-child\" data-id=\"45ef4681\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1bb909b5 elementor-widget elementor-widget-wp-widget-text\" data-id=\"1bb909b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>Helping keep European SMEs CYBERSafe!<br \/>\n<\/strong>Gibraltar: Thursday 25 July\u00a0 2024 at 15:00 CEST<\/p>\n<p><strong>CYBER AWARENESS \u2013 Mastering the Art of Tokenisation: Going Dark in Modern Military Operations and Corporate Security<\/strong><\/p>\n<p>By <a href=\"https:\/\/www.linkedin.com\/in\/susanbrownceozortrex\/\" target=\"_blank\" rel=\"noopener\">Susan Brown<\/a>\u00a0 |\u00a0 CEO\u00a0<a href=\"https:\/\/zortrex.com\/about-company\/\" target=\"_blank\" rel=\"noopener\">Zortrex\u00a0<\/a><br \/>\nvia\u00a0<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">CYBERInsights<\/a><br \/>\nFirst for\u00a0<a href=\"https:\/\/www.google.com\/search?client=opera&amp;q=sme+cybersecurity+news&amp;sourceid=opera&amp;ie=UTF-8&amp;oe=UTF-8\" target=\"_blank\" rel=\"noopener\">SME Cybersecurity News<\/a><\/p>\n<p><em>#CyberInsights #SMECybersecurity <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=cybersecurity&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7212363126564925440\" data-test-app-aware-link=\"\" target=\"_blank\" rel=\"noopener\"><span aria-hidden=\"true\">#<\/span>CyberSecurity<\/a> <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=lockbit&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7212363126564925440\" data-test-app-aware-link=\"\" target=\"_blank\" rel=\"noopener\"><span aria-hidden=\"true\">#<\/span>LockBit<\/a> <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=supplychainattack&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7212363126564925440\" data-test-app-aware-link=\"\" target=\"_blank\" rel=\"noopener\"><span aria-hidden=\"true\">#<\/span>SupplyChainAttack<\/a> <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=financialsecurity&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7212363126564925440\" data-test-app-aware-link=\"\" target=\"_blank\" rel=\"noopener\"><span aria-hidden=\"true\">#<\/span>FinancialSecurity<\/a> <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/zortrex-ltd\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">#Zortrex <\/a><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=zortrexvault&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7212363126564925440&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_messaging_conversation_detail%3BkiKGQsUBS4Wl8VrF843Npg%3D%3D\" data-test-app-aware-link=\"\" data-ntt-old-href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=zortrexvault&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7212363126564925440\" target=\"_blank\" rel=\"noopener\"><span aria-hidden=\"true\">#<\/span>zortrexvault<\/a> <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=tokenisationforthepeople&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7212363126564925440\" data-test-app-aware-link=\"\" target=\"_blank\" rel=\"noopener\"><span aria-hidden=\"true\">#<\/span>tokenisationforthepeople<\/a> <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=tokenisationresilience&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7212363126564925440\" data-test-app-aware-link=\"\" target=\"_blank\" rel=\"noopener\"><span aria-hidden=\"true\">#<\/span>tokenisationresilience<\/a><\/em><\/p>\n<p><strong>Mastering the Art of Tokenisation: Going Dark in Modern Military Operations and Corporate Security<\/strong><\/p>\n<p id=\"ember1111\" class=\"ember-view reader-text-block__paragraph\">In the realm of modern military strategy, mastering the techniques of camouflage, concealment, deception, and dispersal is paramount. As the battlespace evolves, so too must our tactics and technologies. The concept of &#8220;going dark&#8221; \u2013 operating with reduced or degraded access to the electromagnetic spectrum \u2013 has become a crucial element of military doctrine. <strong>Tokenisation<\/strong>, a method traditionally associated with data security, now presents a compelling case for its broader application in enhancing operational security and effectiveness in this challenging environment. Companies can also leverage <strong>Tokenisation<\/strong> to bolster their security measures.<\/p>\n<p id=\"ember1112\" class=\"ember-view reader-text-block__paragraph\"><strong>The Essence of Going Dark<\/strong><\/p>\n<p id=\"ember1113\" class=\"ember-view reader-text-block__paragraph\">Going dark refers to the deliberate reduction or cessation of electromagnetic emissions to avoid detection by adversaries. This strategy is critical in environments were maintaining stealth and avoiding electronic surveillance are essential for mission success. Traditional methods involve minimising radio communications, reducing radar signatures, and employing physical camouflage. However, as technological advancements continue to redefine the battlespace, new methods of achieving these goals are emerging.<\/p>\n<p id=\"ember1114\" class=\"ember-view reader-text-block__paragraph\"><strong>Tokenisation: Beyond Data Security<\/strong><\/p>\n<p id=\"ember1115\" class=\"ember-view reader-text-block__paragraph\"><strong>Tokenisation<\/strong> involves replacing sensitive data with unique identifiers or tokens that are meaningless on their own. Unlike traditional obfuscation, which focuses on making data, code, or communications unintelligible to unauthorised users, tokenisation transforms the data into a form that is useless without the proper mapping back to the original information. When applied to military operations and corporate environments, <strong>Tokenisation<\/strong> can provide significant advantages in achieving concealment and deception, potentially replacing obfuscation in many scenarios.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-91cfb8d elementor-widget elementor-widget-image\" data-id=\"91cfb8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"360\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/1721898135382-768x432.png\" class=\"attachment-medium_large size-medium_large wp-image-12108\" alt=\"Tokenisation\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/1721898135382-768x432.png 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/1721898135382-300x169.png 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/1721898135382-1024x576.png 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/1721898135382.png 1280w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d280ec elementor-widget elementor-widget-wp-widget-text\" data-id=\"2d280ec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p id=\"ember1116\" class=\"ember-view reader-text-block__paragraph\"><strong>Why Tokenisation Comes Out on Top<\/strong><\/p>\n<p id=\"ember1117\" class=\"ember-view reader-text-block__paragraph\"><strong>1. Superior Data Security<\/strong><\/p>\n<p id=\"ember1118\" class=\"ember-view reader-text-block__paragraph\">Dynamic Communication Protocols:<\/p>\n<p id=\"ember1119\" class=\"ember-view reader-text-block__paragraph\"><strong>Tokenisation<\/strong> can be used to create dynamic and unpredictable communication protocols. By continually changing the tokens used in communications, military units and companies can obscure the nature and content of their transmissions, making it difficult for adversaries to intercept or decode them. This dynamic tokenisation ensures that even if transmissions are detected, they are rendered meaningless without the appropriate decryption keys.<\/p>\n<p id=\"ember1120\" class=\"ember-view reader-text-block__paragraph\">Securing Command and Control:<\/p>\n<p id=\"ember1121\" class=\"ember-view reader-text-block__paragraph\">In scenarios where command and control (C2) systems are at risk of being compromised, tokenisation can safeguard critical information. By tokenising orders and communications, the integrity and confidentiality of mission-critical data are maintained, even if the communication channels are compromised.<\/p>\n<p id=\"ember1122\" class=\"ember-view reader-text-block__paragraph\"><strong>2. Enhanced Camouflage and Deception<\/strong><\/p>\n<p id=\"ember1123\" class=\"ember-view reader-text-block__paragraph\">Digital Camouflage:<\/p>\n<p id=\"ember1124\" class=\"ember-view reader-text-block__paragraph\">Just as physical camouflage hides troops and equipment from visual detection, digital tokenisation can conceal digital footprints. Tokenising software and operational data can prevent adversaries from gaining insights into military capabilities and strategies through cyber reconnaissance.<\/p>\n<p id=\"ember1125\" class=\"ember-view reader-text-block__paragraph\">Operational Deception:<\/p>\n<p id=\"ember1126\" class=\"ember-view reader-text-block__paragraph\"><strong>Tokenisation<\/strong> techniques can be employed to create false signals and decoy communications. By generating and transmitting tokenised data that mimics real operational traffic, military units and companies can deceive adversaries about their true movements and intentions. This form of digital deception can be as effective as traditional physical decoys in misleading the enemy.<\/p>\n<p id=\"ember1127\" class=\"ember-view reader-text-block__paragraph\"><strong>3. Scalability and Flexibility<\/strong><\/p>\n<p id=\"ember1128\" class=\"ember-view reader-text-block__paragraph\">Efficient Implementation:<\/p>\n<p id=\"ember1129\" class=\"ember-view reader-text-block__paragraph\">Unlike obfuscation, which can involve complex and resource-intensive processes, tokenisation is straightforward to implement. It provides a scalable solution that can be easily integrated into existing systems without significant overhead.<\/p>\n<p id=\"ember1130\" class=\"ember-view reader-text-block__paragraph\">Versatile Applications:<\/p>\n<p id=\"ember1131\" class=\"ember-view reader-text-block__paragraph\"><strong>Tokenisation<\/strong> is highly versatile and can be adapted for various uses within military operations and corporate security, from securing communications to protecting sensitive data and enhancing operational deception. This flexibility makes it an ideal choice for a wide range of security needs.<\/p>\n<p id=\"ember1132\" class=\"ember-view reader-text-block__paragraph\"><strong>4. Future-Proof Security<\/strong><\/p>\n<p id=\"ember1133\" class=\"ember-view reader-text-block__paragraph\">Adaptability to Emerging Threats:<\/p>\n<p id=\"ember1134\" class=\"ember-view reader-text-block__paragraph\">As threats evolve, tokenisation can be adapted to meet new challenges. Its dynamic nature allows for continual updates and improvements, ensuring that it remains effective against emerging threats.<\/p>\n<p id=\"ember1135\" class=\"ember-view reader-text-block__paragraph\">Integration with Advanced Technologies:<\/p>\n<p id=\"ember1136\" class=\"ember-view reader-text-block__paragraph\"><strong>Tokenisation<\/strong> can be seamlessly integrated with other advanced security technologies, such as artificial intelligence and machine learning, to provide enhanced protection and operational capabilities.<\/p>\n<p id=\"ember1137\" class=\"ember-view reader-text-block__paragraph\">Conclusion<\/p>\n<p id=\"ember1138\" class=\"ember-view reader-text-block__paragraph\">The integration of <strong>Tokenisation<\/strong> into military operations represents a significant leap forward in the art of going dark. By leveraging <strong>Tokenisation<\/strong>, military forces and companies can enhance their ability to operate undetected, protect critical information, and deceive adversaries. This approach not only complements traditional methods of concealment and deception but also addresses the challenges posed by the increasingly digital and interconnected nature of modern warfare.<\/p>\n<p id=\"ember1139\" class=\"ember-view reader-text-block__paragraph\">As the military and corporate environments continue to adapt to the complexities of the modern battlespace, mastering the art of <strong>Tokenisation<\/strong> will be essential. This technique offers a powerful means of achieving stealth and security, ensuring that operations can continue to thrive even in the most contested and hostile environments. In an era where electromagnetic dominance is often contested, the ability to go dark and operate effectively in the shadows will be a decisive factor in achieving mission success. <strong>Tokenisation<\/strong>, with its dynamic and versatile applications, stands at the forefront of this new wave of operational security measures.<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d6a338d elementor-align-center elementor-widget elementor-widget-button\" data-id=\"1d6a338d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4ddedd7 e-flex e-con-boxed e-con e-parent\" data-id=\"4ddedd7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cf1ac56 e-flex e-con-boxed e-con e-parent\" data-id=\"cf1ac56\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-15bdd5f elementor-widget elementor-widget-wp-widget-text\" data-id=\"15bdd5f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: Zortrex Learn More \/&#8230;<\/p>\n","protected":false},"author":2,"featured_media":12108,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[440,516],"tags":[439],"ppma_author":[415],"class_list":["post-12101","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberthreat-intel","category-cyberawareness","tag-cyberthreat-intel"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/1721898135382.png",1280,720,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/1721898135382-150x150.png",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/1721898135382-300x169.png",300,169,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/1721898135382-768x432.png",640,360,true],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/1721898135382-1024x576.png",640,360,true],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/1721898135382.png",1280,720,false],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/1721898135382.png",1280,720,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/1721898135382-1024x576.png",1024,576,true],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/1721898135382-540x340.png",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist - Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberthreat-intel\/\" rel=\"category tag\">SME CYBER\/THREAT INTEL<\/a> <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberawareness\/\" rel=\"category tag\">SME CYBER AWARENESS<\/a>","tag_info":"SME CYBER AWARENESS","comment_count":"0","authors":[{"term_id":415,"user_id":0,"is_guest":1,"slug":"cybersecurity-journalist-iain-fraser","display_name":"Cybersecurity Journalist - Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/12101","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=12101"}],"version-history":[{"count":15,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/12101\/revisions"}],"predecessor-version":[{"id":12132,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/12101\/revisions\/12132"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/12108"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=12101"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=12101"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=12101"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=12101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}