{"id":1138,"date":"2024-10-07T08:00:00","date_gmt":"2024-10-07T15:00:00","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=1138"},"modified":"2024-09-25T10:27:46","modified_gmt":"2024-09-25T17:27:46","slug":"five-questions-your-easm-vendor-doesnt-want-you-to-ask","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/five-questions-your-easm-vendor-doesnt-want-you-to-ask\/","title":{"rendered":"Five Questions Your EASM Vendor Doesn\u2019t Want You to Ask"},"content":{"rendered":"\n<p>With EASM now a critical piece of security operations, it seems like every vendor is jumping into the EASM pool. But not all EASM products are created equal. Companies in adjacent markets, like threat intelligence, are creating attack surface scanning products that are well short of enterprise grade. The shortcomings of these basic EASM products can waste time, erode confidence in security teams, and give an inaccurate picture of organizational risk.<\/p>\n\n\n\n<p>To make sure you are getting your money\u2019s worth and not creating headaches for your team, ask your vendor these five questions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How does their product discover assets from IP ranges you don\u2019t provide?<\/h2>\n\n\n\n<p>Basic EASM products work by scanning the IP address ranges you provide to them. But what about assets that are not on those ranges? If you don\u2019t provide all the ranges &#8211; perhaps one belonging to another division or managed by someone who left the company &#8211; then these assets will not be found. And finding assets is the primary reason to purchase EASM.<\/p>\n\n\n\n<p>CyCognito finds all of your assets \u2013 web interfaces, domains, IPs, IP ranges, certificates, and more \u2013 based only on your organization\u2019s name. We don\u2019t require you to provide any IP ranges. Because this approach doesn\u2019t require any seed data to start searches or to ensure particular areas of the attack surface are covered, it\u2019s called \u2018seedless\u2019 discovery.This discovery technique allows us to find assets that your security teams may not even know about. We typically discover 80% more assets than other EASM products, which eliminates blind spots. Effective prioritization, using live testing and dark web information, means teams will only need to deal with the most important exposures.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Do they discover which organization owns the asset?<\/h2>\n\n\n\n<p>Basic EASM products have no knowledge of asset ownership. Knowing which organization \u2013 the parent company, a division, a joint venture, a brand, outsourced marketing agency \u2013 is critical for remediation. That means hours of days of work for someone to figure out ownership and track down the right contact to start the remediation process. Even if you own a CMDB or CAASM product, the external IP mapping won\u2019t be there, so neither will help.<\/p>\n\n\n\n<p>CyCognito, by the nature of a seedless discovery process, starts by mapping out the complete organizational structure first, and then mapping discovered assets to the appropriate organization. This is done using advanced AI to interpret business databases, news sources, and websites. (We often find organizations IT teams don\u2019t know about.). Once mapped, CyCognito can populate technical owners and assign to assets.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"794\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/unnamed-6-1280x794.webp\" alt=\"\" class=\"wp-image-1140\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/unnamed-6-1280x794.webp 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/unnamed-6-512x318.webp 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/unnamed-6-768x477.webp 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/unnamed-6-1536x953.webp 1536w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/unnamed-6.webp 1600w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n\n\n<p class=\"caption\">Figure 1. CyCognito Organizational Discovery Graph automatically attributes assets to organizations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Do they know their false positive rate? What is it?<\/h2>\n\n\n\n<p>Basic EASM products &#8211; especially those that rely on open source intelligence &#8211; has a false positive rate as high as 70%. Seven out of ten issues found are false alarms. That means more headaches and wasted time for IT and security teams, and a low success rate for an EASM project.<\/p>\n\n\n\n<p>CyCognito has a false positive rate of 5%. On top of that, CyCognito lists a confidence score, from 0 to 100, for each issue, so teams can judge for themselves. CyCognito determines confidence using a blend of proprietary techniques, including active security testing modules, risk validation modules, attacker chatter, heuristic models, and assessment of user behavior,, and more. The nature of the detection method can influence its accuracy, making our multi-method approach invaluable for accurate issue prioritization.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Do they scan for vulnerabilities or test vulnerabilities?<\/h2>\n\n\n\n<p>While many people use the terms scan and test interchangeably, in the context of information security, they are significantly different. Scanning, sometimes called passive scanning, compares software versions to a database of known vulnerabilities (CVEs), to know if there <em>might<\/em> be an issue. For example, CVE-2018-11776 &#8211; Apache Struts 2, versions before 2.3.34 and 2.5.16 permits SQL injection. This is where a lot of false positives come from. Without actually testing that particular instance of a server using Apache Struts 2, whether the vulnerability is real or theoretical isn\u2019t known.<\/p>\n\n\n\n<p>CyCognito actively tests assets and validates risk to see if they are exploitable. This is also called active testing or security validation. The CyCognito test engine uses the database of known vulnerabilities to configure tests that are likely to be successful, and then only reports a vulnerability if the test exploit is successful. Common exploits like SQL injection and credential stuffing are also performed regardless of the software version. The platform also annotates the vulnerability with evidence \u2013 the script, the result \u2013 that can be passed along to a security analyst or developer.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1034\" height=\"800\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/unnamed-1-3.webp\" alt=\"\" class=\"wp-image-1139\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/unnamed-1-3.webp 1034w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/unnamed-1-3-512x396.webp 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/unnamed-1-3-768x594.webp 768w\" sizes=\"auto, (max-width: 1034px) 100vw, 1034px\" \/><\/figure>\n\n\n\n<p class=\"caption\">Figure 2. Evidence for a software vulnerability in a Microsoft server, including CVE, description and external references.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Can you view your attack surface by organization, function, or importance?<\/h2>\n\n\n\n<p>Basic EASM vendors do not discover your organizational structure, as mentioned above. They do allow for manual or semi-automated tagging, but that means a human needs to understand which organization each asset belongs to (a midsize attack surface has 5,000 assets; 50,000 assets is typical of a large enterprise) and either add tags by hand or create rules that assign tags with minimal mistakes. There is also no grouping by function, like ecommerce servers or physical security devices like cameras. Most cannot automatically tell you about important assets, like applications that handle PII.<\/p>\n\n\n\n<p>CyCognito allows you to view your attack surface in three key ways. First, the attack surface can be viewed by organization, e.g., only the assets of a subsidiary. Second, it can be viewed by the type of asset. Perhaps you want to see only servers or cloud instances. Last, you can view the attack surface by business importance &#8211; ecommerce servers, systems that handle PII, corporate crown jewels. Gartner has coined the term \u2018scope\u2019 to describe this kind of asset organization. CyCognito allows for multiple scopes, each with role based access control.<\/p>\n\n\n\n<p>There are a lot of basic EASM products on the market. Many of them will cause headaches and heartburn, not to mention a false sense of security. So ask your EASM vendor these five questions. If they don\u2019t get back to you, that\u2019s telling you something.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With EASM becoming essential to security operations, many vendors are jumping on board, but not all solutions are enterprise-grade. Basic EASM products can waste time, undermine security teams, and offer a false sense of protection. To avoid these pitfalls, ask your vendor these five critical questions\u2014if they can\u2019t answer, it\u2019s a red flag.<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[19,185,17],"class_list":["post-1138","post","type-post","status-publish","format-standard","hentry","category-perspectives","tag-active-security-testing","tag-attack-surface-discovery","tag-external-attack-surface-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Five Questions Your EASM Vendor Doesn\u2019t Want You to Ask | CyCognito Blog<\/title>\n<meta name=\"description\" content=\"Basic EASM products can waste time, undermine security teams, and offer a false sense of protection. To avoid these pitfalls, ask your vendor these five critical questions\u2014if they can\u2019t answer, it\u2019s a red flag.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/five-questions-your-easm-vendor-doesnt-want-you-to-ask\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Five Questions Your EASM Vendor Doesn\u2019t Want You to Ask\" \/>\n<meta property=\"og:description\" content=\"Basic EASM products can waste time, undermine security teams, and offer a false sense of protection. To avoid these pitfalls, ask your vendor these five critical questions\u2014if they can\u2019t answer, it\u2019s a red flag.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/five-questions-your-easm-vendor-doesnt-want-you-to-ask\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-07T15:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/banner-blog-2024-10-14-2400x1256-email.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"1256\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Tim Matthews\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tim Matthews\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/five-questions-your-easm-vendor-doesnt-want-you-to-ask\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/five-questions-your-easm-vendor-doesnt-want-you-to-ask\/\"},\"author\":{\"name\":\"Tim Matthews\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/17004ccbc53269f484e688caf8533230\"},\"headline\":\"Five Questions Your EASM Vendor Doesn\u2019t Want You to Ask\",\"datePublished\":\"2024-10-07T15:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/five-questions-your-easm-vendor-doesnt-want-you-to-ask\/\"},\"wordCount\":1030,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/five-questions-your-easm-vendor-doesnt-want-you-to-ask\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/unnamed-6-1280x794.webp\",\"keywords\":[\"Active Security Testing\",\"Attack Surface Discovery\",\"External Attack Surface Management\"],\"articleSection\":[\"Perspectives\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/five-questions-your-easm-vendor-doesnt-want-you-to-ask\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/five-questions-your-easm-vendor-doesnt-want-you-to-ask\/\",\"name\":\"Five Questions Your EASM Vendor Doesn\u2019t Want You to Ask | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/five-questions-your-easm-vendor-doesnt-want-you-to-ask\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/five-questions-your-easm-vendor-doesnt-want-you-to-ask\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/unnamed-6-1280x794.webp\",\"datePublished\":\"2024-10-07T15:00:00+00:00\",\"description\":\"Basic EASM products can waste time, undermine security teams, and offer a false sense of protection. To avoid these pitfalls, ask your vendor these five critical questions\u2014if they can\u2019t answer, it\u2019s a red flag.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/five-questions-your-easm-vendor-doesnt-want-you-to-ask\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/five-questions-your-easm-vendor-doesnt-want-you-to-ask\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/five-questions-your-easm-vendor-doesnt-want-you-to-ask\/#primaryimage\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/unnamed-6.webp\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/unnamed-6.webp\",\"width\":1600,\"height\":993},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/five-questions-your-easm-vendor-doesnt-want-you-to-ask\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Five Questions Your EASM Vendor Doesn\u2019t Want You to Ask\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/17004ccbc53269f484e688caf8533230\",\"name\":\"Tim Matthews\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d7b50f723af945532afa09969dd8aa1e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d7b50f723af945532afa09969dd8aa1e?s=96&d=mm&r=g\",\"caption\":\"Tim Matthews\"},\"description\":\"Was Chief Marketing Officer\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/tim-matthews\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Five Questions Your EASM Vendor Doesn\u2019t Want You to Ask | CyCognito Blog","description":"Basic EASM products can waste time, undermine security teams, and offer a false sense of protection. To avoid these pitfalls, ask your vendor these five critical questions\u2014if they can\u2019t answer, it\u2019s a red flag.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/five-questions-your-easm-vendor-doesnt-want-you-to-ask\/","og_locale":"en_US","og_type":"article","og_title":"Five Questions Your EASM Vendor Doesn\u2019t Want You to Ask","og_description":"Basic EASM products can waste time, undermine security teams, and offer a false sense of protection. To avoid these pitfalls, ask your vendor these five critical questions\u2014if they can\u2019t answer, it\u2019s a red flag.","og_url":"https:\/\/www.cycognito.com\/blog\/five-questions-your-easm-vendor-doesnt-want-you-to-ask\/","og_site_name":"CyCognito Blog","article_published_time":"2024-10-07T15:00:00+00:00","og_image":[{"width":2400,"height":1256,"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/banner-blog-2024-10-14-2400x1256-email.png","type":"image\/png"}],"author":"Tim Matthews","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tim Matthews","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/five-questions-your-easm-vendor-doesnt-want-you-to-ask\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/five-questions-your-easm-vendor-doesnt-want-you-to-ask\/"},"author":{"name":"Tim Matthews","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/17004ccbc53269f484e688caf8533230"},"headline":"Five Questions Your EASM Vendor Doesn\u2019t Want You to Ask","datePublished":"2024-10-07T15:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/five-questions-your-easm-vendor-doesnt-want-you-to-ask\/"},"wordCount":1030,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/five-questions-your-easm-vendor-doesnt-want-you-to-ask\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/unnamed-6-1280x794.webp","keywords":["Active Security Testing","Attack Surface Discovery","External Attack Surface Management"],"articleSection":["Perspectives"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/five-questions-your-easm-vendor-doesnt-want-you-to-ask\/","url":"https:\/\/www.cycognito.com\/blog\/five-questions-your-easm-vendor-doesnt-want-you-to-ask\/","name":"Five Questions Your EASM Vendor Doesn\u2019t Want You to Ask | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/five-questions-your-easm-vendor-doesnt-want-you-to-ask\/#primaryimage"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/five-questions-your-easm-vendor-doesnt-want-you-to-ask\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/unnamed-6-1280x794.webp","datePublished":"2024-10-07T15:00:00+00:00","description":"Basic EASM products can waste time, undermine security teams, and offer a false sense of protection. To avoid these pitfalls, ask your vendor these five critical questions\u2014if they can\u2019t answer, it\u2019s a red flag.","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/five-questions-your-easm-vendor-doesnt-want-you-to-ask\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/five-questions-your-easm-vendor-doesnt-want-you-to-ask\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/five-questions-your-easm-vendor-doesnt-want-you-to-ask\/#primaryimage","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/unnamed-6.webp","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/unnamed-6.webp","width":1600,"height":993},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/five-questions-your-easm-vendor-doesnt-want-you-to-ask\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Five Questions Your EASM Vendor Doesn\u2019t Want You to Ask"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/17004ccbc53269f484e688caf8533230","name":"Tim Matthews","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d7b50f723af945532afa09969dd8aa1e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d7b50f723af945532afa09969dd8aa1e?s=96&d=mm&r=g","caption":"Tim Matthews"},"description":"Was Chief Marketing Officer","url":"https:\/\/www.cycognito.com\/blog\/author\/tim-matthews\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/1138","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=1138"}],"version-history":[{"count":2,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/1138\/revisions"}],"predecessor-version":[{"id":1143,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/1138\/revisions\/1143"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=1138"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=1138"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=1138"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}