{"id":174256672,"date":"2022-03-29T12:00:42","date_gmt":"2022-03-29T16:00:42","guid":{"rendered":"https:\/\/www.citrix.com\/blogs\/?p=174256672"},"modified":"2023-09-19T15:55:47","modified_gmt":"2023-09-19T15:55:47","slug":"secure-your-critical-applications-against-state-sponsored-cyberattacks","status":"publish","type":"post","link":"https:\/\/www.netscaler.com\/blog\/application-and-api-security\/secure-your-critical-applications-against-state-sponsored-cyberattacks\/","title":{"rendered":"Secure your critical applications against state-sponsored cyberattacks"},"content":{"rendered":"<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned organizations that they should be prepared to defend against nation state-sponsored cyberattacks. &#8220;Every organization \u2014 large and small \u2014 must be prepared to respond to disruptive cyber activity,&#8221; <a href=\"https:\/\/www.cisa.gov\/shields-up\" target=\"_blank\" rel=\"noopener noreferrer\">the agency said in a recent update<\/a>.<\/p>\n<p>Applications have become the lifeblood of every organization: They\u2019re used for much more than revenue generation and can be a crucial link between an organization and its customers. But they can also provide an entry point for nation-sponsored threat actors. Research shows that these bad actors typically use publicly known <em>and <\/em>zero-day vulnerabilities in internet-facing applications as entry points to gain access to an organization\u2019s digital infrastructure. That\u2019s why web application security is crucial to protecting the sensitive assets of the <em>entire<\/em> business!<\/p>\n<h2>Nation-state sponsored cyberattack model<\/h2>\n<ul>\n<li><strong>Pre-exploit:<\/strong> Nation state-sponsored threat actors infect vulnerable hosts with malware that enables them to build the botnet necessary for their malicious actions.<\/li>\n<li><strong>Exploit:<\/strong> Threat actors target a business\u2019s critical applications and orchestrate a distributed denial of services (DDoS) attack or a more specific attack that exploits an application\u2019s particular vulnerabilities.<\/li>\n<li><strong>Post-exploit:<\/strong> Threat actors exfiltrate the PII\/PHI-like information to their command-and-control center or destroy systems to make the data useless.<\/li>\n<\/ul>\n<h2>How NetScaler can protect applications<\/h2>\n<p>In addition to following CISA&#8217;s recommendations to increase your vigilance. you can use NetScaler to improve the security of your applications.<\/p>\n<h3>Pre-exploit<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.netscaler.com\/articles\/what-is-bot-management\" target=\"_blank\" rel=\"noopener noreferrer\">NetScaler bot management <\/a>can help you to distinguish among the good bots, bad bots, and human clients in your traffic. NetScaler machine learning techniques can also detect signs that your devices are being recruited as part of a botnet.<\/li>\n<li><a href=\"https:\/\/community.netscaler.com\/s\/article\/DoS-DDoS-protection-with-NetScaler-Access-Control-Lists-ACLs\" target=\"_blank\" rel=\"noopener noreferrer\">NetScaler access control lists<\/a> are an effective first step in blocking malicious traffic from known sources.<\/li>\n<\/ul>\n<h3>Exploit<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.netscaler.com\/platform\/web-application-firewall-waf\" target=\"_blank\" rel=\"noopener noreferrer\">NetScaler Web App Firewall<\/a> protects applications from attacks like cross-site scripting, SQL injections, session redirects, and browser-based malware that uses JavaScript and privileged access.<\/li>\n<li><a href=\"https:\/\/www.netscaler.com\/platform\/ddos-protection\" target=\"_blank\" rel=\"noopener noreferrer\">NetScaler DDoS mitigation service<\/a> provides holistic DDoS protection against even the largest attacks. Available as an always-on or on-demand DDoS attack management service, it features one of the world\u2019s largest dedicated scrubbing networks with 14 PoPs across the globe and 12 Tbps capacity that protects applications from large-scale volumetric DDoS attacks.<\/li>\n<\/ul>\n<h3>Post-exploit<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.netscaler.com\/platform\/application-api-security-insights\" target=\"_blank\" rel=\"noopener noreferrer\">NetScaler application security insights<\/a> can help you detect the early indications of resource exhaustion and\/or data exfiltration attacks through the purpose-built machine learning models. This can mitigate further compromise of your systems by bad actors as they try to carry out lateral spread within your environment.<\/li>\n<\/ul>\n<h2>Learn more<\/h2>\n<p>NetScaler security expert Pons Arun walks you through basic and advanced security scenarios and provides actionable advice in this whiteboard video on <a href=\"https:\/\/community.netscaler.com\/s\/article\/NetScaler-Security-Whiteboard-Series-Part-1\" target=\"_blank\" rel=\"noopener\">how to implement application security with NetScaler.<\/a><\/p>\n<hr \/>\n<p><em>This document is provided for information purposes only and is not meant to be an exhaustive review of the nation state-sponsored cyber threat&#8217;s intentionality. It is provided on an &#8220;as is&#8221; basis, is current as of the date of publication and does not imply any kind of guarantee or warranty, including the warranties of merchantability or fitness for a particular use. Your use of the information provided in this document is at your own risk. NetScaler reserves the right to change or update this document at any time.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned organizations that they should be prepared to defend against nation state-sponsored cyberattacks. &#8220;Every organization \u2014 large and small \u2014 must be prepared to respond to disruptive cyber activity,&#8221; the agency said in a recent update. Applications have become the lifeblood of every organization: They\u2019re used [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":174259062,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[5],"tags":[42,41],"class_list":{"0":"post-174256672","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-application-and-api-security","8":"tag-api-security","9":"tag-application-security","10":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Secure your critical applications against state-sponsored cyberattacks<\/title>\n<meta name=\"description\" content=\"In accordance with CISA guidance, learn how NetScaler can help you secure your critical applications from attack by nation-state sponsored threat actors.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.netscaler.com\/blog\/application-and-api-security\/secure-your-critical-applications-against-state-sponsored-cyberattacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure your critical applications against state-sponsored cyberattacks\" \/>\n<meta property=\"og:description\" content=\"In accordance with CISA guidance, learn how NetScaler can help you secure your critical applications from attack by nation-state sponsored threat actors.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.netscaler.com\/blog\/application-and-api-security\/secure-your-critical-applications-against-state-sponsored-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"NetScaler Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-29T16:00:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-19T15:55:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2022\/03\/protect-data-security-hero-1290x526-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1290\" \/>\n\t<meta property=\"og:image:height\" content=\"526\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Pons Mudivai Arun\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@NetScaler\" \/>\n<meta name=\"twitter:site\" content=\"@NetScaler\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pons Mudivai Arun\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/application-and-api-security\/secure-your-critical-applications-against-state-sponsored-cyberattacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/application-and-api-security\/secure-your-critical-applications-against-state-sponsored-cyberattacks\/\"},\"author\":{\"name\":\"Pons Mudivai Arun\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/#\/schema\/person\/76e4f5569e7f9d4d89e0945a749c50cc\"},\"headline\":\"Secure your critical applications against state-sponsored cyberattacks\",\"datePublished\":\"2022-03-29T16:00:42+00:00\",\"dateModified\":\"2023-09-19T15:55:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/application-and-api-security\/secure-your-critical-applications-against-state-sponsored-cyberattacks\/\"},\"wordCount\":539,\"publisher\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/application-and-api-security\/secure-your-critical-applications-against-state-sponsored-cyberattacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2022\/03\/protect-data-security-hero-1290x526-1.png\",\"keywords\":[\"API Security\",\"Application security\"],\"articleSection\":[\"Application and API security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/application-and-api-security\/secure-your-critical-applications-against-state-sponsored-cyberattacks\/\",\"url\":\"https:\/\/www.netscaler.com\/blog\/application-and-api-security\/secure-your-critical-applications-against-state-sponsored-cyberattacks\/\",\"name\":\"Secure your critical applications against state-sponsored cyberattacks\",\"isPartOf\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/application-and-api-security\/secure-your-critical-applications-against-state-sponsored-cyberattacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/application-and-api-security\/secure-your-critical-applications-against-state-sponsored-cyberattacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2022\/03\/protect-data-security-hero-1290x526-1.png\",\"datePublished\":\"2022-03-29T16:00:42+00:00\",\"dateModified\":\"2023-09-19T15:55:47+00:00\",\"description\":\"In accordance with CISA guidance, learn how NetScaler can help you secure your critical applications from attack by nation-state sponsored threat actors.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/application-and-api-security\/secure-your-critical-applications-against-state-sponsored-cyberattacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.netscaler.com\/blog\/application-and-api-security\/secure-your-critical-applications-against-state-sponsored-cyberattacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/application-and-api-security\/secure-your-critical-applications-against-state-sponsored-cyberattacks\/#primaryimage\",\"url\":\"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2022\/03\/protect-data-security-hero-1290x526-1.png\",\"contentUrl\":\"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2022\/03\/protect-data-security-hero-1290x526-1.png\",\"width\":1290,\"height\":526},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/application-and-api-security\/secure-your-critical-applications-against-state-sponsored-cyberattacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.netscaler.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Secure your critical applications against state-sponsored cyberattacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/#website\",\"url\":\"https:\/\/www.netscaler.com\/blog\/\",\"name\":\"NetScaler Blog\",\"description\":\"Application delivery and security blog\",\"publisher\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.netscaler.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/#organization\",\"name\":\"NetScaler Blog\",\"url\":\"https:\/\/www.netscaler.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/06\/NetScaler_Logo_2color_Negative.png\",\"contentUrl\":\"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/06\/NetScaler_Logo_2color_Negative.png\",\"width\":2032,\"height\":486,\"caption\":\"NetScaler Blog\"},\"image\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/NetScaler\",\"https:\/\/www.linkedin.com\/company\/netscaler\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/#\/schema\/person\/76e4f5569e7f9d4d89e0945a749c50cc\",\"name\":\"Pons Mudivai Arun\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c5ab82e98f4367f49b0e5f641c2230477436b6d7197dc808c13b7b1e62c951cf?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c5ab82e98f4367f49b0e5f641c2230477436b6d7197dc808c13b7b1e62c951cf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c5ab82e98f4367f49b0e5f641c2230477436b6d7197dc808c13b7b1e62c951cf?s=96&d=mm&r=g\",\"caption\":\"Pons Mudivai Arun\"},\"url\":\"https:\/\/www.netscaler.com\/blog\/author\/ponnambalamm\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Secure your critical applications against state-sponsored cyberattacks","description":"In accordance with CISA guidance, learn how NetScaler can help you secure your critical applications from attack by nation-state sponsored threat actors.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.netscaler.com\/blog\/application-and-api-security\/secure-your-critical-applications-against-state-sponsored-cyberattacks\/","og_locale":"en_US","og_type":"article","og_title":"Secure your critical applications against state-sponsored cyberattacks","og_description":"In accordance with CISA guidance, learn how NetScaler can help you secure your critical applications from attack by nation-state sponsored threat actors.","og_url":"https:\/\/www.netscaler.com\/blog\/application-and-api-security\/secure-your-critical-applications-against-state-sponsored-cyberattacks\/","og_site_name":"NetScaler Blog","article_published_time":"2022-03-29T16:00:42+00:00","article_modified_time":"2023-09-19T15:55:47+00:00","og_image":[{"width":1290,"height":526,"url":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2022\/03\/protect-data-security-hero-1290x526-1.png","type":"image\/png"}],"author":"Pons Mudivai Arun","twitter_card":"summary_large_image","twitter_creator":"@NetScaler","twitter_site":"@NetScaler","twitter_misc":{"Written by":"Pons Mudivai Arun","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.netscaler.com\/blog\/application-and-api-security\/secure-your-critical-applications-against-state-sponsored-cyberattacks\/#article","isPartOf":{"@id":"https:\/\/www.netscaler.com\/blog\/application-and-api-security\/secure-your-critical-applications-against-state-sponsored-cyberattacks\/"},"author":{"name":"Pons Mudivai Arun","@id":"https:\/\/www.netscaler.com\/blog\/#\/schema\/person\/76e4f5569e7f9d4d89e0945a749c50cc"},"headline":"Secure your critical applications against state-sponsored cyberattacks","datePublished":"2022-03-29T16:00:42+00:00","dateModified":"2023-09-19T15:55:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.netscaler.com\/blog\/application-and-api-security\/secure-your-critical-applications-against-state-sponsored-cyberattacks\/"},"wordCount":539,"publisher":{"@id":"https:\/\/www.netscaler.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.netscaler.com\/blog\/application-and-api-security\/secure-your-critical-applications-against-state-sponsored-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2022\/03\/protect-data-security-hero-1290x526-1.png","keywords":["API Security","Application security"],"articleSection":["Application and API security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.netscaler.com\/blog\/application-and-api-security\/secure-your-critical-applications-against-state-sponsored-cyberattacks\/","url":"https:\/\/www.netscaler.com\/blog\/application-and-api-security\/secure-your-critical-applications-against-state-sponsored-cyberattacks\/","name":"Secure your critical applications against state-sponsored cyberattacks","isPartOf":{"@id":"https:\/\/www.netscaler.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.netscaler.com\/blog\/application-and-api-security\/secure-your-critical-applications-against-state-sponsored-cyberattacks\/#primaryimage"},"image":{"@id":"https:\/\/www.netscaler.com\/blog\/application-and-api-security\/secure-your-critical-applications-against-state-sponsored-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2022\/03\/protect-data-security-hero-1290x526-1.png","datePublished":"2022-03-29T16:00:42+00:00","dateModified":"2023-09-19T15:55:47+00:00","description":"In accordance with CISA guidance, learn how NetScaler can help you secure your critical applications from attack by nation-state sponsored threat actors.","breadcrumb":{"@id":"https:\/\/www.netscaler.com\/blog\/application-and-api-security\/secure-your-critical-applications-against-state-sponsored-cyberattacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.netscaler.com\/blog\/application-and-api-security\/secure-your-critical-applications-against-state-sponsored-cyberattacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.netscaler.com\/blog\/application-and-api-security\/secure-your-critical-applications-against-state-sponsored-cyberattacks\/#primaryimage","url":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2022\/03\/protect-data-security-hero-1290x526-1.png","contentUrl":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2022\/03\/protect-data-security-hero-1290x526-1.png","width":1290,"height":526},{"@type":"BreadcrumbList","@id":"https:\/\/www.netscaler.com\/blog\/application-and-api-security\/secure-your-critical-applications-against-state-sponsored-cyberattacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.netscaler.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Secure your critical applications against state-sponsored cyberattacks"}]},{"@type":"WebSite","@id":"https:\/\/www.netscaler.com\/blog\/#website","url":"https:\/\/www.netscaler.com\/blog\/","name":"NetScaler Blog","description":"Application delivery and security blog","publisher":{"@id":"https:\/\/www.netscaler.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.netscaler.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.netscaler.com\/blog\/#organization","name":"NetScaler Blog","url":"https:\/\/www.netscaler.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.netscaler.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/06\/NetScaler_Logo_2color_Negative.png","contentUrl":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/06\/NetScaler_Logo_2color_Negative.png","width":2032,"height":486,"caption":"NetScaler Blog"},"image":{"@id":"https:\/\/www.netscaler.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/NetScaler","https:\/\/www.linkedin.com\/company\/netscaler\/"]},{"@type":"Person","@id":"https:\/\/www.netscaler.com\/blog\/#\/schema\/person\/76e4f5569e7f9d4d89e0945a749c50cc","name":"Pons Mudivai Arun","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c5ab82e98f4367f49b0e5f641c2230477436b6d7197dc808c13b7b1e62c951cf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c5ab82e98f4367f49b0e5f641c2230477436b6d7197dc808c13b7b1e62c951cf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c5ab82e98f4367f49b0e5f641c2230477436b6d7197dc808c13b7b1e62c951cf?s=96&d=mm&r=g","caption":"Pons Mudivai Arun"},"url":"https:\/\/www.netscaler.com\/blog\/author\/ponnambalamm\/"}]}},"featured_image_src":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2022\/03\/protect-data-security-hero-1290x526-1-600x400.png","featured_image_src_square":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2022\/03\/protect-data-security-hero-1290x526-1-600x526.png","author_info":{"display_name":"Pons Mudivai Arun","author_link":"https:\/\/www.netscaler.com\/blog\/author\/ponnambalamm\/"},"_links":{"self":[{"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/posts\/174256672","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/comments?post=174256672"}],"version-history":[{"count":0,"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/posts\/174256672\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/media\/174259062"}],"wp:attachment":[{"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/media?parent=174256672"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/categories?post=174256672"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/tags?post=174256672"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}