{"id":225,"date":"2025-01-20T16:37:00","date_gmt":"2025-01-21T00:37:00","guid":{"rendered":"https:\/\/hexagoncenter.org\/spotlight\/?p=225"},"modified":"2025-02-20T16:42:21","modified_gmt":"2025-02-21T00:42:21","slug":"building-another-layer-of-national-security-infrastructure","status":"publish","type":"post","link":"https:\/\/hexagoncenter.org\/spotlight\/building-another-layer-of-national-security-infrastructure\/","title":{"rendered":"Building (another layer of) national security infrastructure"},"content":{"rendered":"\n<p>The official NSA (National Security Agency) Podcast, No Such Podcast, says in their podcast episode 2 &#8220;Cybersecurity is National Security&#8221; that cybersecurity is no longer a separate domain \u2013 it\u2019s integrated into everything we do to keep the United States safe from foreign adversaries. As Russia, China, Iran, North Korea, and others conduct cyberattacks on national security systems and the Defense Industrial Base, the National Security Agency is on the job, detecting attacks, defending networks, and distributing declassified intelligence to help private industry partners. NSA\u2019s Director of Cybersecurity, Dave Luber,\u00a0<a href=\"https:\/\/directory.libsyn.com\/episode\/index\/id\/32885387\" target=\"_blank\" rel=\"noreferrer noopener\">joins No Such Podcast to shine the light on how NSA cybersecurity contributes to national security<\/a>.<\/p>\n\n\n\n<p>Cybersecurity is fundamentally intertwined with national security for several key reasons:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Critical Infrastructure:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Our modern society relies heavily on interconnected systems: power grids, transportation networks, financial markets, healthcare, and even national defense systems. \u00a0<\/li>\n\n\n\n<li>Cyberattacks can disrupt these critical infrastructures, causing widespread power outages, transportation gridlocks, financial market crashes, and even loss of life. \u00a0<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Espionage and Intelligence Gathering:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Cyberattacks are used to steal sensitive government data, military secrets, and intellectual property. \u00a0<\/li>\n\n\n\n<li>Foreign adversaries utilize cyber espionage to gain an advantage over the United States, whether it&#8217;s in military planning, economic competition, or political influence. \u00a0<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>National Defense:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Cyberattacks can directly target military systems, disrupting communications, compromising weapons systems, and even compromising national security installations. \u00a0<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Economic Impact:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Cyberattacks can cripple businesses, leading to job losses, economic instability, and a loss of national competitiveness. \u00a0<\/li>\n\n\n\n<li>These economic disruptions can have significant national security implications.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>National Security Agencies:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Government agencies responsible for national security heavily rely on secure computer systems and networks. \u00a0<\/li>\n\n\n\n<li>A breach of these systems could compromise sensitive intelligence operations and national security efforts. \u00a0<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Psychological Impact:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Large-scale cyberattacks can erode public trust in critical systems and institutions, creating societal unrest and undermining national stability. \u00a0<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p>In essence, cybersecurity is a critical component of national security.<sup><\/sup> Protecting our digital infrastructure is essential for maintaining economic prosperity, national defense, and overall societal well-being in the 21st century.<sup><\/sup><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The official NSA (National Security Agency) Podcast, No Such Podcast, says in their podcast episode 2 &#8220;Cybersecurity is National Security&#8221; that cybersecurity is no longer a separate domain \u2013 it\u2019s integrated into everything we do to keep the United States safe from foreign adversaries. As Russia, China, Iran, North Korea, and others conduct cyberattacks on [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":227,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[130,100,7,46,4,122,95,169,89,159],"tags":[31,77,128,219,140,79,8,121,223,218,215,50,221,216,125,97,172,192,217,220,214,40,182,222],"class_list":["post-225","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-critical-infrastructure","category-current-events","category-cyber-attack","category-cyber-threat","category-cybersecurity","category-data-protection","category-disinformation","category-national-security","category-safety-and-security","category-security-plan","tag-attackers","tag-business","tag-critical-infrastructure","tag-cyber-espionage","tag-cyber-threats","tag-cyberattacks","tag-cybersecurity","tag-data","tag-digital-infrastructure","tag-financial-market","tag-foreign-adversaries","tag-government","tag-influence","tag-intelligence","tag-international","tag-military","tag-national-security","tag-network","tag-podcast","tag-politics","tag-private","tag-security","tag-security-measures","tag-weapons"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Building (another layer of) national security infrastructure - HX Spotlight Files<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hexagoncenter.org\/spotlight\/building-another-layer-of-national-security-infrastructure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Building (another layer of) national security infrastructure - HX Spotlight Files\" \/>\n<meta property=\"og:description\" content=\"The official NSA (National Security Agency) Podcast, No Such Podcast, says in their podcast episode 2 &#8220;Cybersecurity is National Security&#8221; that cybersecurity is no longer a separate domain \u2013 it\u2019s integrated into everything we do to keep the United States safe from foreign adversaries. As Russia, China, Iran, North Korea, and others conduct cyberattacks on [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hexagoncenter.org\/spotlight\/building-another-layer-of-national-security-infrastructure\/\" \/>\n<meta property=\"og:site_name\" content=\"HX Spotlight Files\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-21T00:37:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-21T00:42:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hexagoncenter.org\/spotlight\/wp-content\/uploads\/2025\/01\/security-protection-anti-virus-software-60504.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1880\" \/>\n\t<meta property=\"og:image:height\" content=\"1253\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editorial\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editorial\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/building-another-layer-of-national-security-infrastructure\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/building-another-layer-of-national-security-infrastructure\\\/\"},\"author\":{\"name\":\"Editorial\",\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/#\\\/schema\\\/person\\\/2f8219c99512366965821b725b05cbb8\"},\"headline\":\"Building (another layer of) national security infrastructure\",\"datePublished\":\"2025-01-21T00:37:00+00:00\",\"dateModified\":\"2025-02-21T00:42:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/building-another-layer-of-national-security-infrastructure\\\/\"},\"wordCount\":334,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/building-another-layer-of-national-security-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/security-protection-anti-virus-software-60504.jpeg\",\"keywords\":[\"attackers\",\"business\",\"critical infrastructure\",\"cyber espionage\",\"cyber threats\",\"cyberattacks\",\"cybersecurity\",\"data\",\"digital infrastructure\",\"financial market\",\"foreign adversaries\",\"government\",\"influence\",\"intelligence\",\"international\",\"military\",\"national security\",\"network\",\"podcast\",\"politics\",\"private\",\"security\",\"security measures\",\"weapons\"],\"articleSection\":[\"Critical Infrastructure\",\"Current Events\",\"Cyber Attack\",\"Cyber Threat\",\"Cybersecurity\",\"Data Protection\",\"disinformation\",\"National Security\",\"Safety and Security\",\"Security Plan\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/building-another-layer-of-national-security-infrastructure\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/building-another-layer-of-national-security-infrastructure\\\/\",\"url\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/building-another-layer-of-national-security-infrastructure\\\/\",\"name\":\"Building (another layer of) national security infrastructure - HX Spotlight Files\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/building-another-layer-of-national-security-infrastructure\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/building-another-layer-of-national-security-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/security-protection-anti-virus-software-60504.jpeg\",\"datePublished\":\"2025-01-21T00:37:00+00:00\",\"dateModified\":\"2025-02-21T00:42:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/building-another-layer-of-national-security-infrastructure\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/building-another-layer-of-national-security-infrastructure\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/building-another-layer-of-national-security-infrastructure\\\/#primaryimage\",\"url\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/security-protection-anti-virus-software-60504.jpeg\",\"contentUrl\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/security-protection-anti-virus-software-60504.jpeg\",\"width\":1880,\"height\":1253,\"caption\":\"Photo by Pixabay on Pexels.com\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/building-another-layer-of-national-security-infrastructure\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Building (another layer of) national security infrastructure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/#website\",\"url\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/\",\"name\":\"HX Spotlight Files\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/#organization\",\"name\":\"HX Spotlight Files\",\"url\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/logo.webp\",\"contentUrl\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/logo.webp\",\"width\":338,\"height\":72,\"caption\":\"HX Spotlight Files\"},\"image\":{\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/#\\\/schema\\\/person\\\/2f8219c99512366965821b725b05cbb8\",\"name\":\"Editorial\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9314bba5e6586f27b7eb074fdb0b5601ac3c14d10a8e559210e60bb9d69b4f4f?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9314bba5e6586f27b7eb074fdb0b5601ac3c14d10a8e559210e60bb9d69b4f4f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9314bba5e6586f27b7eb074fdb0b5601ac3c14d10a8e559210e60bb9d69b4f4f?s=96&d=mm&r=g\",\"caption\":\"Editorial\"},\"url\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/author\\\/ldsdaniel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Building (another layer of) national security infrastructure - HX Spotlight Files","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hexagoncenter.org\/spotlight\/building-another-layer-of-national-security-infrastructure\/","og_locale":"en_US","og_type":"article","og_title":"Building (another layer of) national security infrastructure - HX Spotlight Files","og_description":"The official NSA (National Security Agency) Podcast, No Such Podcast, says in their podcast episode 2 &#8220;Cybersecurity is National Security&#8221; that cybersecurity is no longer a separate domain \u2013 it\u2019s integrated into everything we do to keep the United States safe from foreign adversaries. As Russia, China, Iran, North Korea, and others conduct cyberattacks on [&hellip;]","og_url":"https:\/\/hexagoncenter.org\/spotlight\/building-another-layer-of-national-security-infrastructure\/","og_site_name":"HX Spotlight Files","article_published_time":"2025-01-21T00:37:00+00:00","article_modified_time":"2025-02-21T00:42:21+00:00","og_image":[{"width":1880,"height":1253,"url":"https:\/\/hexagoncenter.org\/spotlight\/wp-content\/uploads\/2025\/01\/security-protection-anti-virus-software-60504.jpeg","type":"image\/jpeg"}],"author":"Editorial","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Editorial","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hexagoncenter.org\/spotlight\/building-another-layer-of-national-security-infrastructure\/#article","isPartOf":{"@id":"https:\/\/hexagoncenter.org\/spotlight\/building-another-layer-of-national-security-infrastructure\/"},"author":{"name":"Editorial","@id":"https:\/\/hexagoncenter.org\/spotlight\/#\/schema\/person\/2f8219c99512366965821b725b05cbb8"},"headline":"Building (another layer of) national security infrastructure","datePublished":"2025-01-21T00:37:00+00:00","dateModified":"2025-02-21T00:42:21+00:00","mainEntityOfPage":{"@id":"https:\/\/hexagoncenter.org\/spotlight\/building-another-layer-of-national-security-infrastructure\/"},"wordCount":334,"commentCount":0,"publisher":{"@id":"https:\/\/hexagoncenter.org\/spotlight\/#organization"},"image":{"@id":"https:\/\/hexagoncenter.org\/spotlight\/building-another-layer-of-national-security-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/hexagoncenter.org\/spotlight\/wp-content\/uploads\/2025\/01\/security-protection-anti-virus-software-60504.jpeg","keywords":["attackers","business","critical infrastructure","cyber espionage","cyber threats","cyberattacks","cybersecurity","data","digital infrastructure","financial market","foreign adversaries","government","influence","intelligence","international","military","national security","network","podcast","politics","private","security","security measures","weapons"],"articleSection":["Critical Infrastructure","Current Events","Cyber Attack","Cyber Threat","Cybersecurity","Data Protection","disinformation","National Security","Safety and Security","Security Plan"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/hexagoncenter.org\/spotlight\/building-another-layer-of-national-security-infrastructure\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/hexagoncenter.org\/spotlight\/building-another-layer-of-national-security-infrastructure\/","url":"https:\/\/hexagoncenter.org\/spotlight\/building-another-layer-of-national-security-infrastructure\/","name":"Building (another layer of) national security infrastructure - HX Spotlight Files","isPartOf":{"@id":"https:\/\/hexagoncenter.org\/spotlight\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hexagoncenter.org\/spotlight\/building-another-layer-of-national-security-infrastructure\/#primaryimage"},"image":{"@id":"https:\/\/hexagoncenter.org\/spotlight\/building-another-layer-of-national-security-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/hexagoncenter.org\/spotlight\/wp-content\/uploads\/2025\/01\/security-protection-anti-virus-software-60504.jpeg","datePublished":"2025-01-21T00:37:00+00:00","dateModified":"2025-02-21T00:42:21+00:00","breadcrumb":{"@id":"https:\/\/hexagoncenter.org\/spotlight\/building-another-layer-of-national-security-infrastructure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hexagoncenter.org\/spotlight\/building-another-layer-of-national-security-infrastructure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hexagoncenter.org\/spotlight\/building-another-layer-of-national-security-infrastructure\/#primaryimage","url":"https:\/\/hexagoncenter.org\/spotlight\/wp-content\/uploads\/2025\/01\/security-protection-anti-virus-software-60504.jpeg","contentUrl":"https:\/\/hexagoncenter.org\/spotlight\/wp-content\/uploads\/2025\/01\/security-protection-anti-virus-software-60504.jpeg","width":1880,"height":1253,"caption":"Photo by Pixabay on Pexels.com"},{"@type":"BreadcrumbList","@id":"https:\/\/hexagoncenter.org\/spotlight\/building-another-layer-of-national-security-infrastructure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/hexagoncenter.org\/spotlight\/"},{"@type":"ListItem","position":2,"name":"Building (another layer of) national security infrastructure"}]},{"@type":"WebSite","@id":"https:\/\/hexagoncenter.org\/spotlight\/#website","url":"https:\/\/hexagoncenter.org\/spotlight\/","name":"HX Spotlight Files","description":"","publisher":{"@id":"https:\/\/hexagoncenter.org\/spotlight\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hexagoncenter.org\/spotlight\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/hexagoncenter.org\/spotlight\/#organization","name":"HX Spotlight Files","url":"https:\/\/hexagoncenter.org\/spotlight\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hexagoncenter.org\/spotlight\/#\/schema\/logo\/image\/","url":"https:\/\/hexagoncenter.org\/spotlight\/wp-content\/uploads\/2023\/04\/logo.webp","contentUrl":"https:\/\/hexagoncenter.org\/spotlight\/wp-content\/uploads\/2023\/04\/logo.webp","width":338,"height":72,"caption":"HX Spotlight Files"},"image":{"@id":"https:\/\/hexagoncenter.org\/spotlight\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/hexagoncenter.org\/spotlight\/#\/schema\/person\/2f8219c99512366965821b725b05cbb8","name":"Editorial","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9314bba5e6586f27b7eb074fdb0b5601ac3c14d10a8e559210e60bb9d69b4f4f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9314bba5e6586f27b7eb074fdb0b5601ac3c14d10a8e559210e60bb9d69b4f4f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9314bba5e6586f27b7eb074fdb0b5601ac3c14d10a8e559210e60bb9d69b4f4f?s=96&d=mm&r=g","caption":"Editorial"},"url":"https:\/\/hexagoncenter.org\/spotlight\/author\/ldsdaniel\/"}]}},"jetpack_featured_media_url":"https:\/\/hexagoncenter.org\/spotlight\/wp-content\/uploads\/2025\/01\/security-protection-anti-virus-software-60504.jpeg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/hexagoncenter.org\/spotlight\/wp-json\/wp\/v2\/posts\/225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hexagoncenter.org\/spotlight\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hexagoncenter.org\/spotlight\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hexagoncenter.org\/spotlight\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hexagoncenter.org\/spotlight\/wp-json\/wp\/v2\/comments?post=225"}],"version-history":[{"count":1,"href":"https:\/\/hexagoncenter.org\/spotlight\/wp-json\/wp\/v2\/posts\/225\/revisions"}],"predecessor-version":[{"id":228,"href":"https:\/\/hexagoncenter.org\/spotlight\/wp-json\/wp\/v2\/posts\/225\/revisions\/228"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hexagoncenter.org\/spotlight\/wp-json\/wp\/v2\/media\/227"}],"wp:attachment":[{"href":"https:\/\/hexagoncenter.org\/spotlight\/wp-json\/wp\/v2\/media?parent=225"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hexagoncenter.org\/spotlight\/wp-json\/wp\/v2\/categories?post=225"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hexagoncenter.org\/spotlight\/wp-json\/wp\/v2\/tags?post=225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}