Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the zoho-flow domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":2089,"date":"2024-01-08T21:50:52","date_gmt":"2024-01-08T21:50:52","guid":{"rendered":"https:\/\/jacksonholdingcompany.com\/top-cyber-threats-from-2023-and-beyond-cisco-newsroom-security\/"},"modified":"2024-01-08T21:50:52","modified_gmt":"2024-01-08T21:50:52","slug":"top-cyber-threats-from-2023-and-beyond-cisco-newsroom-security","status":"publish","type":"post","link":"https:\/\/jacksonholdingcompany.com\/top-cyber-threats-from-2023-and-beyond-cisco-newsroom-security\/","title":{"rendered":"Top cyber threats, from 2023 and beyond Cisco Newsroom: Security"},"content":{"rendered":"

Threat analyst Dave Liebenberg on the Cisco Talos Year in Review and how organizations can stay protected in 2024. More RSS Feeds: https:\/\/newsroom.cisco.com\/c\/r\/newsroom\/en\/us\/rss-feeds.html<\/p>\n

\u200bCisco Newsroom: Security\u00a0\u00a0Threat analyst Dave Liebenberg on the Cisco Talos Year in Review and how organizations can stay protected in 2024. More RSS Feeds: https:\/\/newsroom.cisco.com\/c\/r\/newsroom\/en\/us\/rss-feeds.html\u00a0Read More<\/a>\u00a0<\/p>\n

Cisco Talos<\/a> is one of the largest and most effective threat intelligence organizations in the world. And their Talos Year in Review<\/a> speaks volumes about the current trends and future threats defenders can expect to see in the coming year. \u00a0<\/p>\n

To learn more about this year\u2019s report, and what organizations can do to counter what\u2019s coming, we spoke with David Liebenberg, head of Strategic Analysis for Cisco Talos.\u00a0<\/p>\n

Thank you, Dave! Maybe we could start with a quick overview of Cisco Talos, and your role there.<\/em>\u00a0<\/p>\n

Thanks, Kevin. As part of Talos, I contribute to Cisco’s threat intelligence work. Talos\u2019s work includes protecting customers from threats, discovering vulnerabilities, and going out and interdicting adversaries. Within Talos, I run a group called Strategic Analysis. We analyze the most impactful adversaries and trends in the threat landscape. And we produce a number of internal and external intelligence products, Including the Year in Review.\u00a0<\/p>\n

What are the goals of the Talos Year in Review?\u00a0<\/em><\/p>\n

Cybersecurity is a very fast-moving field. So, taking the time to conduct retrospective analysis helps put those changes in context and can also help anticipate future developments. My team reviews the vast treasure trove of telemetry and expertise we have here at Cisco to tell a comprehensive story of the major adversaries we dealt with in 2023, and the key themes and trends that will define the coming year as well.\u00a0<\/p>\n

Once again, ransomware emerged as a major threat this year. What are some key trends in ransomware?\u00a0<\/em><\/p>\n

Yeah, so ransomware is truly an evergreen threat, as this report illustrates. In terms of adversaries, LockBit remains the most active group, which was the same as last year. And they are up there with ALPHV, Clop, and BianLian. Those are the four main groups that we saw. One interesting trend, Clop showed how well-resourced they are. They exploited several Zero Day vulnerabilities in a variety of different platforms. That\u2019s something we typically associate with an APT, advanced persistent threat.\u00a0<\/p>\n

Extortion emerged as a bigger threat in 2023. Could you explain that trend?\u00a0<\/em><\/p>\n

Yes, a lot of well-established ransomware groups, Babuk, BianLian, and Clop to name a few, are moving into these pure extortion plays. So, they\u2019re not actually encrypting anything; they’re just stealing data and threatening to leak it. In Q2 2023, these type of pure extortion events comprised nearly a third of everything we saw in incident response and surpassed even ransomware for that quarter. Also, these big ransomware groups have had their builders and their payloads leaked, which has allowed less sophisticated adversaries to take that, modify it, and then create and deploy their own ransomware payloads.\u00a0<\/p>\n

Which initial access vectors were exploited most in 2023?\u00a0<\/em><\/p>\n

It can sometimes be difficult to pinpoint with 100 percent accuracy what the initial access actually was. But according to our incident-response data, the top three initial access vectors included the exploitation of vulnerabilities in public-facing applications; the use of compromised credentials or valid accounts; and phishing. \u00a0<\/p>\n

To what extent are older infrastructures being targeted and exploited?\u00a0<\/em><\/p>\n

We found in this report that threat actors are consistently exploiting older software vulnerabilities in common applications. And some of the most popular vulnerabilities we saw targeted were more than 10 years old. It basically underscores that organizations must implement a healthy and effective patching program. \u00a0<\/p>\n

They like to exploit low-hanging fruit, don\u2019t they?\u00a0<\/em><\/p>\n

Yes, adversaries are only going to innovate as much as they need to. So, you’re going to continue to see older vulnerabilities and older infrastructure targeted and used as a pivot point to get into the network. Obviously, a modernized network is the best response. But again, even older equipment, if you patch it correctly, you\u2019ll have a better chance. \u00a0<\/p>\n

What responsibility do individual workers or company cultures have? \u00a0<\/em><\/p>\n

Individual workers and company culture can definitely contribute to a healthier cybersecurity ecosystem. For individuals, it means complying with company security policies, avoiding password reuse and simplistic passwords, taking proper precautions when working remotely, and remaining very vigilant against social-engineering attacks. For company culture, it means conducting frequent training and testing. And it\u2019s very important that people who are in charge of internal security and security operations are able to effectively influence company policy. \u00a0<\/p>\n

What are some key measures that those security experts should recommend?\u00a0<\/em><\/p>\n

Well, for example, they should institute things like multifactor authentication and network segmentation. Segmentation is essential. You want to block off your high-value assets as much as possible. And you want to really make sure that access and credential management and all those pieces are secure. Also, an incident response plan is essential \u2014\u00a0so that you can effectively respond to an incident without coming up with a plan on the spot.\u00a0<\/p>\n

Gen AI is playing in increasing role in things like social engineering attacks. And it\u2019s also enabling new defenses. What is the state of the AI arms race?\u00a0<\/em><\/p>\n

It\u2019s a burgeoning development that we’re definitely continuing to monitor. It\u2019s adding new complexities and dimensions to those classic security issues that we already respond to. You mentioned social engineering. That’s absolutely top of mind for me when I\u2019m thinking of AI, because it can enable threat actors to craft really sophisticated, compelling and targeted lures. On the other hand, as you mentioned, there are applications for AI in cybersecurity as well. At Talos, we\u2019ve researched machine-learning models that can help detect business email compromise. And we\u2019ve used machine learning to help detect online disinformation. So, there’s big opportunities for the defenders as well. \u00a0<\/p>\n

Any additional predictions for 2024?\u00a0<\/em><\/p>\n

Ransomware continuing is a safe bet. So, I’ll start with that. And commodity loaders, they\u2019re not going anywhere. That\u2019s a type of tool that can be bought on the dark web or open markets. They were on the rise in 2023, and that should continue.\u00a0<\/p>\n

One of the most popular commodity loaders that we’ve seen is Qakbot, which was actually disrupted this year. And typically, when this happens, a new variant will step in. With Qakbot\u2019s disruption, we could see new commodity loaders emerge. And then for advanced persistent threats, we\u2019re going to continue to see Ukraine being targeted by Russia-affiliated actors and China-affiliated actors improving their skills and targeting entities related to critical infrastructure and critical services in areas of strategic importance.\u00a0<\/p>\n

Given all that, are you optimistic about 2024?\u00a0<\/em><\/p>\n

Actually, I am. There are bright points in 2023 that gave me optimism. The intensity and increase in skills in advanced actors is being completely matched by the innovation and collaborative spirit of defenders. There\u2019s just so much collaboration happening across the industry. Things like the Cyber Threat Alliance<\/a> where we connect Talos and Cisco with other cybersecurity companies to tackle threats together. And we have the Network Resilience Coalition<\/a>. We\u2019ve discovered new threat actors and helped defend a bunch of different organizations from attacks, including in Ukraine. We\u2019ve achieved a ton of success, stopping bad guys wherever we can.\u00a0<\/p>\n

\u00a0<\/p>","protected":false},"excerpt":{"rendered":"

Threat analyst Dave Liebenberg on the Cisco Talos Year in […]<\/p>\n","protected":false},"author":0,"featured_media":2090,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-2089","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cisco-newsroom-security"],"yoast_head":"\nTop cyber threats, from 2023 and beyond Cisco Newsroom: Security - JHC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jacksonholdingcompany.com\/top-cyber-threats-from-2023-and-beyond-cisco-newsroom-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top cyber threats, from 2023 and beyond Cisco Newsroom: Security\" \/>\n<meta property=\"og:description\" content=\"Threat analyst Dave Liebenberg on the Cisco Talos Year in […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jacksonholdingcompany.com\/top-cyber-threats-from-2023-and-beyond-cisco-newsroom-security\/\" \/>\n<meta property=\"og:site_name\" content=\"JHC\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-08T21:50:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/01\/Talos_year_review_1200x675_photo-sXkM7k.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/top-cyber-threats-from-2023-and-beyond-cisco-newsroom-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/top-cyber-threats-from-2023-and-beyond-cisco-newsroom-security\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Top cyber threats, from 2023 and beyond Cisco Newsroom: Security\",\"datePublished\":\"2024-01-08T21:50:52+00:00\",\"dateModified\":\"2024-01-08T21:50:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/top-cyber-threats-from-2023-and-beyond-cisco-newsroom-security\/\"},\"wordCount\":1249,\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/top-cyber-threats-from-2023-and-beyond-cisco-newsroom-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/01\/Talos_year_review_1200x675_photo-sXkM7k.jpeg\",\"articleSection\":[\"\u200bCisco Newsroom: Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/top-cyber-threats-from-2023-and-beyond-cisco-newsroom-security\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/top-cyber-threats-from-2023-and-beyond-cisco-newsroom-security\/\",\"name\":\"Top cyber threats, from 2023 and beyond Cisco Newsroom: Security - JHC\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/top-cyber-threats-from-2023-and-beyond-cisco-newsroom-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/top-cyber-threats-from-2023-and-beyond-cisco-newsroom-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/01\/Talos_year_review_1200x675_photo-sXkM7k.jpeg\",\"datePublished\":\"2024-01-08T21:50:52+00:00\",\"dateModified\":\"2024-01-08T21:50:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/top-cyber-threats-from-2023-and-beyond-cisco-newsroom-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jacksonholdingcompany.com\/top-cyber-threats-from-2023-and-beyond-cisco-newsroom-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/top-cyber-threats-from-2023-and-beyond-cisco-newsroom-security\/#primaryimage\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/01\/Talos_year_review_1200x675_photo-sXkM7k.jpeg\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/01\/Talos_year_review_1200x675_photo-sXkM7k.jpeg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/top-cyber-threats-from-2023-and-beyond-cisco-newsroom-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jacksonholdingcompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top cyber threats, from 2023 and beyond Cisco Newsroom: Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"name\":\"JHC\",\"description\":\"Your Business Is Our Business\",\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\",\"name\":\"JHC\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"width\":452,\"height\":149,\"caption\":\"JHC\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Top cyber threats, from 2023 and beyond Cisco Newsroom: Security - JHC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jacksonholdingcompany.com\/top-cyber-threats-from-2023-and-beyond-cisco-newsroom-security\/","og_locale":"en_US","og_type":"article","og_title":"Top cyber threats, from 2023 and beyond Cisco Newsroom: Security","og_description":"Threat analyst Dave Liebenberg on the Cisco Talos Year in […]","og_url":"https:\/\/jacksonholdingcompany.com\/top-cyber-threats-from-2023-and-beyond-cisco-newsroom-security\/","og_site_name":"JHC","article_published_time":"2024-01-08T21:50:52+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/01\/Talos_year_review_1200x675_photo-sXkM7k.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jacksonholdingcompany.com\/top-cyber-threats-from-2023-and-beyond-cisco-newsroom-security\/#article","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/top-cyber-threats-from-2023-and-beyond-cisco-newsroom-security\/"},"author":{"name":"","@id":""},"headline":"Top cyber threats, from 2023 and beyond Cisco Newsroom: Security","datePublished":"2024-01-08T21:50:52+00:00","dateModified":"2024-01-08T21:50:52+00:00","mainEntityOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/top-cyber-threats-from-2023-and-beyond-cisco-newsroom-security\/"},"wordCount":1249,"publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/top-cyber-threats-from-2023-and-beyond-cisco-newsroom-security\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/01\/Talos_year_review_1200x675_photo-sXkM7k.jpeg","articleSection":["\u200bCisco Newsroom: Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jacksonholdingcompany.com\/top-cyber-threats-from-2023-and-beyond-cisco-newsroom-security\/","url":"https:\/\/jacksonholdingcompany.com\/top-cyber-threats-from-2023-and-beyond-cisco-newsroom-security\/","name":"Top cyber threats, from 2023 and beyond Cisco Newsroom: Security - JHC","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/top-cyber-threats-from-2023-and-beyond-cisco-newsroom-security\/#primaryimage"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/top-cyber-threats-from-2023-and-beyond-cisco-newsroom-security\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/01\/Talos_year_review_1200x675_photo-sXkM7k.jpeg","datePublished":"2024-01-08T21:50:52+00:00","dateModified":"2024-01-08T21:50:52+00:00","breadcrumb":{"@id":"https:\/\/jacksonholdingcompany.com\/top-cyber-threats-from-2023-and-beyond-cisco-newsroom-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jacksonholdingcompany.com\/top-cyber-threats-from-2023-and-beyond-cisco-newsroom-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/top-cyber-threats-from-2023-and-beyond-cisco-newsroom-security\/#primaryimage","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/01\/Talos_year_review_1200x675_photo-sXkM7k.jpeg","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/01\/Talos_year_review_1200x675_photo-sXkM7k.jpeg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/jacksonholdingcompany.com\/top-cyber-threats-from-2023-and-beyond-cisco-newsroom-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jacksonholdingcompany.com\/"},{"@type":"ListItem","position":2,"name":"Top cyber threats, from 2023 and beyond Cisco Newsroom: Security"}]},{"@type":"WebSite","@id":"https:\/\/jacksonholdingcompany.com\/#website","url":"https:\/\/jacksonholdingcompany.com\/","name":"JHC","description":"Your Business Is Our Business","publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jacksonholdingcompany.com\/#organization","name":"JHC","url":"https:\/\/jacksonholdingcompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","width":452,"height":149,"caption":"JHC"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/2089","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/comments?post=2089"}],"version-history":[{"count":0,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/2089\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media\/2090"}],"wp:attachment":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media?parent=2089"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/categories?post=2089"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/tags?post=2089"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}