{"id":2473,"date":"2017-08-08T00:00:00","date_gmt":"2017-08-08T00:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2017\/08\/08\/alienvault-scours-the-dark-web-for-compromised-credentials\/"},"modified":"2021-01-28T16:18:49","modified_gmt":"2021-01-28T16:18:49","slug":"alienvault-scours-the-dark-web-for-compromised-credentials","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/alienvault-scours-the-dark-web-for-compromised-credentials\/","title":{"rendered":"AlienVault Scours the Dark Web for Compromised Credentials"},"content":{"rendered":"<div id=\"article-content\">\n<p>Cybersecurity firm AlienVault today took the wraps off a new AlienApp for its USM (Unified Security Management) Anywhere platform that alerts organizations to the presence of stolen credentials on the dark web.<\/p>\n<p>The company&#8217;s appropriately-named <a href=\"https:\/\/www.alienvault.com\/blogs\/security-essentials\/shine-a-light-on-the-dark-web-with-usm-anywhere\">AlienApp for Dark Web Monitoring<\/a> solution seeks out all the email addresses associated to a given domain. Additionally, users can specify 10 email addresses for top executives and other high-profile targets whose username and passwords wield a lot power on their corporate networks.<\/p>\n<p>Leaked passwords aren&#8217;t just a big headache for corporate IT security teams, they can also imperil many other parts of an enterprise organization.<\/p>\n<p>&#8220;According to the 2017 Verizon Data Breach Investigations Report, 81 percent of hacking-related breaches leveraged either stolen and\/or weak passwords,&#8221; reminded AlienVault product manager Jeff Olen. &#8220;In other words, if an organization is going to get breached, it&#8217;s likely to be due to compromised user credentials. Once an attacker gets access to the network using these credentials, they can take any number of actions,&#8221; including stealing intellectual property, financial information and other sensitive corporate data.<\/p>\n<p>And that&#8217;s just the start. Stolen credentials can lead to the installation and spread of malware on a network and enables an attacker to move laterally across a network. To add insult to injury, attackers commonly use a compromised credentials to stage &#8220;spear phishing attacks on other employees or externally,&#8221; said Olen.<\/p>\n<p>Once leaked passwords start making the rounds, the danger extends well beyond their home networks and accounts, thanks to the widespread reuse of username and password pairs across other online and cloud services. Earlier this year, a Gemalto survey revealed that <a href=\"https:\/\/www.esecurityplanet.com\/networks\/-security\/90-percent-of-it-pros-worry-about-password-reuse.html\">90 percent of IT professionals worry about password reuse<\/a>.<\/p>\n<p>Powered by SpyCloud, the solution queries the security intelligence breach-discovery company&#8217;s database every 24 hours. Austin, Texas-based <a href=\"http:\/\/www.businesswire.com\/trends\/\/home\/20170601005019\/en\/SpyCloud-Emerges-Stealth-Mode-Protect-Businesses-Data\">SpyCLoud emerged from stealth<\/a> and launched its eponymous exposed records detection platform in June.<\/p>\n<p>&#8220;With the AlienApp for Dark Web Monitoring, USM Anywhere customers are alerted immediately when corporate credentials are being actively trafficked in the dark web so that they can take immediate protective action with those accounts,&#8221; said Olen.<\/p>\n<p>If credentials are discovered in the dark corners of the online underground, AlienApp for Dark Web Monitoring notifies security teams, alerting them to the email addresses of exposed credentials. The solution can also inform users and if credentials have been detected in prior breaches or if exposed passwords were hashed or stored as cleartext, among other circumstances.<\/p>\n<p>The AlienApp for Dark Web Monitoring is available now at no extra cost to existing USM Anywhere customers.<\/p>\n<\/div>\n\n\n<div id=\"ta-campaign-widget-66d6d2f7dd513-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6d2f7dd513\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6d2f7dd513\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6d2f7dd513\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6d2f7dd513\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6d2f7dd513\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6d2f7dd513\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity firm AlienVault today took the wraps off a new AlienApp for its USM (Unified Security Management) Anywhere platform that alerts organizations to the presence of stolen credentials on the dark web. The company&#8217;s appropriately-named AlienApp for Dark Web Monitoring solution seeks out all the email addresses associated to a given domain. Additionally, users can [&hellip;]<\/p>\n","protected":false},"author":228,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14],"tags":[],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[377,404,375,376],"class_list":["post-2473","post","type-post","status-publish","format-standard","hentry","category-networks","b2b_audience-awareness-and-consideration","b2b_product-gateway-and-network-security","b2b_product-hackers","b2b_product-security-management","b2b_product-security-services"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>AlienVault Scans Dark Web for Compromised Credentials<\/title>\n<meta name=\"description\" content=\"AlienVault&#039;s new security-monitoring solution delves into the dark web to spot the illicit sharing of stolen user credentials.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/alienvault-scours-the-dark-web-for-compromised-credentials\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AlienVault Scans Dark Web for Compromised Credentials\" \/>\n<meta property=\"og:description\" content=\"AlienVault&#039;s new security-monitoring solution delves into the dark web to spot the illicit sharing of stolen user credentials.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/alienvault-scours-the-dark-web-for-compromised-credentials\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2017-08-08T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-28T16:18:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Pedro Hernandez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pedro Hernandez\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/alienvault-scours-the-dark-web-for-compromised-credentials\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/alienvault-scours-the-dark-web-for-compromised-credentials\/\"},\"author\":{\"name\":\"Pedro Hernandez\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4372da8a1f45988c5b2714062b2b4816\"},\"headline\":\"AlienVault Scours the Dark Web for Compromised Credentials\",\"datePublished\":\"2017-08-08T00:00:00+00:00\",\"dateModified\":\"2021-01-28T16:18:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/alienvault-scours-the-dark-web-for-compromised-credentials\/\"},\"wordCount\":430,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"articleSection\":[\"Networks\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/alienvault-scours-the-dark-web-for-compromised-credentials\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/alienvault-scours-the-dark-web-for-compromised-credentials\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/alienvault-scours-the-dark-web-for-compromised-credentials\/\",\"name\":\"AlienVault Scans Dark Web for Compromised Credentials\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"datePublished\":\"2017-08-08T00:00:00+00:00\",\"dateModified\":\"2021-01-28T16:18:49+00:00\",\"description\":\"AlienVault's new security-monitoring solution delves into the dark web to spot the illicit sharing of stolen user credentials.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/alienvault-scours-the-dark-web-for-compromised-credentials\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/alienvault-scours-the-dark-web-for-compromised-credentials\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/alienvault-scours-the-dark-web-for-compromised-credentials\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AlienVault Scours the Dark Web for Compromised Credentials\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4372da8a1f45988c5b2714062b2b4816\",\"name\":\"Pedro Hernandez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/9Cld8Y2u_400x400-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/9Cld8Y2u_400x400-150x150.jpg\",\"caption\":\"Pedro Hernandez\"},\"description\":\"Pedro Hernandez is a contributor to eSecurity Planet, eWEEK, and the IT Business Edge Network. Previously, he served as a managing editor for the Internet.com network of IT-related websites and as the Green IT curator for GigaOM Pro.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/pedro-hernandez-esp\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AlienVault Scans Dark Web for Compromised Credentials","description":"AlienVault's new security-monitoring solution delves into the dark web to spot the illicit sharing of stolen user credentials.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/alienvault-scours-the-dark-web-for-compromised-credentials\/","og_locale":"en_US","og_type":"article","og_title":"AlienVault Scans Dark Web for Compromised Credentials","og_description":"AlienVault's new security-monitoring solution delves into the dark web to spot the illicit sharing of stolen user credentials.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/alienvault-scours-the-dark-web-for-compromised-credentials\/","og_site_name":"eSecurity Planet","article_published_time":"2017-08-08T00:00:00+00:00","article_modified_time":"2021-01-28T16:18:49+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png","type":"image\/png"}],"author":"Pedro Hernandez","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Pedro Hernandez","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/alienvault-scours-the-dark-web-for-compromised-credentials\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/alienvault-scours-the-dark-web-for-compromised-credentials\/"},"author":{"name":"Pedro Hernandez","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4372da8a1f45988c5b2714062b2b4816"},"headline":"AlienVault Scours the Dark Web for Compromised Credentials","datePublished":"2017-08-08T00:00:00+00:00","dateModified":"2021-01-28T16:18:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/alienvault-scours-the-dark-web-for-compromised-credentials\/"},"wordCount":430,"commentCount":0,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"articleSection":["Networks"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.esecurityplanet.com\/networks\/alienvault-scours-the-dark-web-for-compromised-credentials\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/alienvault-scours-the-dark-web-for-compromised-credentials\/","url":"https:\/\/www.esecurityplanet.com\/networks\/alienvault-scours-the-dark-web-for-compromised-credentials\/","name":"AlienVault Scans Dark Web for Compromised Credentials","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"datePublished":"2017-08-08T00:00:00+00:00","dateModified":"2021-01-28T16:18:49+00:00","description":"AlienVault's new security-monitoring solution delves into the dark web to spot the illicit sharing of stolen user credentials.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/alienvault-scours-the-dark-web-for-compromised-credentials\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/alienvault-scours-the-dark-web-for-compromised-credentials\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/alienvault-scours-the-dark-web-for-compromised-credentials\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"AlienVault Scours the Dark Web for Compromised Credentials"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4372da8a1f45988c5b2714062b2b4816","name":"Pedro Hernandez","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/9Cld8Y2u_400x400-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/9Cld8Y2u_400x400-150x150.jpg","caption":"Pedro Hernandez"},"description":"Pedro Hernandez is a contributor to eSecurity Planet, eWEEK, and the IT Business Edge Network. Previously, he served as a managing editor for the Internet.com network of IT-related websites and as the Green IT curator for GigaOM Pro.","url":"https:\/\/www.esecurityplanet.com\/author\/pedro-hernandez-esp\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/2473"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/228"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=2473"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/2473\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=2473"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=2473"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=2473"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=2473"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=2473"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=2473"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}