	{"id":10995,"date":"2013-02-28T10:58:11","date_gmt":"2013-02-28T18:58:11","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=10995"},"modified":"2015-03-26T13:42:13","modified_gmt":"2015-03-26T20:42:13","slug":"rsa-2013-recap-cyber-kill-chains-arent-just-useful-for-businesses","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/rsa-2013-recap-cyber-kill-chains-arent-just-useful-for-businesses\/","title":{"rendered":"RSA 2013 Recap: Cyber Kill Chains Aren&#8217;t Just Useful for Businesses"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-11003\" title=\"rsa-knowlede-blog-header\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rsa-knowlede-blog-header.jpg\" alt=\"\" width=\"600\" height=\"225\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rsa-knowlede-blog-header.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rsa-knowlede-blog-header-150x56.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rsa-knowlede-blog-header-300x112.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>This week marked the 22nd annual <a href=\"http:\/\/www.rsaconference.com\/\">RSA conference<\/a>, which is one of the biggest security conferences of the year. The theme for the event this year was \u201cSecurity in Knowledge: Mastering Data. Securing the World.\u201d There has definitely been a clear change of tone to one of securing data rather than just machines. With more data moving to the cloud and onto people\u2019s mobile devices, the whole idea of protecting your digital assets has really changed. Thieves aren\u2019t just going to a central home computer to get the mother lode of data, which means they don\u2019t care as much about what operating system you\u2019re on (if they ever really did).<\/p>\n<p>Another interesting change from years past is a much more battle-weary, realistic tone to presentations. After a year of press about \u201cAdvanced Persistent Threats\u201d that are able to get into and stay undetected on networks for years, security vendors aren\u2019t really promising bulletproof solutions anymore. They\u2019re promising improved visibility into your network, help with remediation, and better protection for your data, wherever it resides. I found this a rather refreshing change &#8212; it allows us to change the conversation from one of essentially blaming the victim (\u201cYou weren\u2019t updated\/using proper settings\/using enough layers\u201d) when breaches or infections happen to one of preparing for the possibility of a security event.<\/p>\n<p>One theme I\u2019ve been seeing mentioned more frequently in security circles is the concept of a \u201c<a href=\"http:\/\/www.jargondatabase.com\/Category\/Military\/Air-Force-Jargon\/Kill-Chain\">kill chain<\/a>,&#8221; which in this case refers to the security tactic of reversing the attack progression. Much like in the case of a \u201c<a href=\"http:\/\/www.urbandictionary.com\/define.php?term=Meat%20Space\">meat space<\/a>\u201d burglary, the thief will perform reconnaissance on a building before trying to infiltrate it, and then go through several more steps before actually making off with the loot. The object of using a kill chain is to stop the thief as soon in the attack progression as possible. This requires a good bit of intelligence and visibility into what\u2019s in your network so that when something is there that shouldn\u2019t be, you can sound the alarms and thwart the attack.<\/p>\n<p><a href=\"http:\/\/www.darkreading.com\/authentication\/167901072\/security\/attacks-breaches\/240148399\/how-lockheed-martin-s-kill-chain-stopped-securid-attack.html\">Lockheed Martin recently released details<\/a> of their own success using a kill chain tactic to stop someone who had intruded on their network. It\u2019s not just something that applies to government contractors or giant corporations, but also something that we can all apply to our own protection. And in the case of a home network, the intelligence can be considerably less complex.<\/p>\n<p>You don\u2019t have to be worried about new employees or unknown guests. You should have a pretty good idea who\u2019s a guest in your home network, and who is an unauthorized intruder. You can use tools that tell you what data is where on your computer, and what traffic is happening into and off of your machines. And then you can lock away your data and cherry-pick the valid traffic, stopping intruders from making off with your valuables.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This week marked the 22nd annual RSA conference, which is one of the biggest security conferences of the year. The theme for the event this year was \u201cSecurity in Knowledge: Mastering Data. Securing the World.\u201d There has definitely been a clear change of tone to one of securing data rather than just machines. With more [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":11005,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[2095,2098,1372],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"This week marked the 22nd annual RSA conference, which is one of the biggest security conferences of the year. The theme for the event this year was\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/rsa-2013-recap-cyber-kill-chains-arent-just-useful-for-businesses\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"RSA 2013 Recap: Cyber Kill Chains Aren&#039;t Just Useful for Businesses - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"This week marked the 22nd annual RSA conference, which is one of the biggest security conferences of the year. The theme for the event this year was\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/rsa-2013-recap-cyber-kill-chains-arent-just-useful-for-businesses\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-02-28T18:58:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-03-26T20:42:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rsa-conference-thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rsa-2013-recap-cyber-kill-chains-arent-just-useful-for-businesses\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rsa-conference-thumb.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rsa-conference-thumb.jpg\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rsa-2013-recap-cyber-kill-chains-arent-just-useful-for-businesses\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/rsa-2013-recap-cyber-kill-chains-arent-just-useful-for-businesses\/\",\"name\":\"RSA 2013 Recap: Cyber Kill Chains Aren't Just Useful for Businesses - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rsa-2013-recap-cyber-kill-chains-arent-just-useful-for-businesses\/#primaryimage\"},\"datePublished\":\"2013-02-28T18:58:11+00:00\",\"dateModified\":\"2015-03-26T20:42:13+00:00\",\"description\":\"This week marked the 22nd annual RSA conference, which is one of the biggest security conferences of the year. The theme for the event this year was\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rsa-2013-recap-cyber-kill-chains-arent-just-useful-for-businesses\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/rsa-2013-recap-cyber-kill-chains-arent-just-useful-for-businesses\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rsa-2013-recap-cyber-kill-chains-arent-just-useful-for-businesses\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"RSA 2013 Recap: Cyber Kill Chains Aren&#8217;t Just Useful for Businesses\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rsa-2013-recap-cyber-kill-chains-arent-just-useful-for-businesses\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rsa-2013-recap-cyber-kill-chains-arent-just-useful-for-businesses\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"RSA 2013 Recap: Cyber Kill Chains Aren&#8217;t Just Useful for Businesses\",\"datePublished\":\"2013-02-28T18:58:11+00:00\",\"dateModified\":\"2015-03-26T20:42:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rsa-2013-recap-cyber-kill-chains-arent-just-useful-for-businesses\/#webpage\"},\"wordCount\":505,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rsa-2013-recap-cyber-kill-chains-arent-just-useful-for-businesses\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rsa-conference-thumb.jpg\",\"keywords\":[\"cyber kill chains\",\"RSA\",\"Small Business\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/rsa-2013-recap-cyber-kill-chains-arent-just-useful-for-businesses\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"This week marked the 22nd annual RSA conference, which is one of the biggest security conferences of the year. The theme for the event this year was","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/rsa-2013-recap-cyber-kill-chains-arent-just-useful-for-businesses\/","og_locale":"en_US","og_type":"article","og_title":"RSA 2013 Recap: Cyber Kill Chains Aren't Just Useful for Businesses - The Mac Security Blog","og_description":"This week marked the 22nd annual RSA conference, which is one of the biggest security conferences of the year. The theme for the event this year was","og_url":"https:\/\/www.intego.com\/mac-security-blog\/rsa-2013-recap-cyber-kill-chains-arent-just-useful-for-businesses\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-02-28T18:58:11+00:00","article_modified_time":"2015-03-26T20:42:13+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rsa-conference-thumb.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/rsa-2013-recap-cyber-kill-chains-arent-just-useful-for-businesses\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rsa-conference-thumb.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rsa-conference-thumb.jpg","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/rsa-2013-recap-cyber-kill-chains-arent-just-useful-for-businesses\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/rsa-2013-recap-cyber-kill-chains-arent-just-useful-for-businesses\/","name":"RSA 2013 Recap: Cyber Kill Chains Aren't Just Useful for Businesses - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/rsa-2013-recap-cyber-kill-chains-arent-just-useful-for-businesses\/#primaryimage"},"datePublished":"2013-02-28T18:58:11+00:00","dateModified":"2015-03-26T20:42:13+00:00","description":"This week marked the 22nd annual RSA conference, which is one of the biggest security conferences of the year. The theme for the event this year was","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/rsa-2013-recap-cyber-kill-chains-arent-just-useful-for-businesses\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/rsa-2013-recap-cyber-kill-chains-arent-just-useful-for-businesses\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/rsa-2013-recap-cyber-kill-chains-arent-just-useful-for-businesses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"RSA 2013 Recap: Cyber Kill Chains Aren&#8217;t Just Useful for Businesses"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/rsa-2013-recap-cyber-kill-chains-arent-just-useful-for-businesses\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/rsa-2013-recap-cyber-kill-chains-arent-just-useful-for-businesses\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"RSA 2013 Recap: Cyber Kill Chains Aren&#8217;t Just Useful for Businesses","datePublished":"2013-02-28T18:58:11+00:00","dateModified":"2015-03-26T20:42:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/rsa-2013-recap-cyber-kill-chains-arent-just-useful-for-businesses\/#webpage"},"wordCount":505,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/rsa-2013-recap-cyber-kill-chains-arent-just-useful-for-businesses\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rsa-conference-thumb.jpg","keywords":["cyber kill chains","RSA","Small Business"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/rsa-2013-recap-cyber-kill-chains-arent-just-useful-for-businesses\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rsa-conference-thumb.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-2Rl","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/10995"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=10995"}],"version-history":[{"count":8,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/10995\/revisions"}],"predecessor-version":[{"id":11017,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/10995\/revisions\/11017"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/11005"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=10995"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=10995"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=10995"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}