{"id":211,"date":"2022-05-20T00:47:00","date_gmt":"2022-05-20T00:47:00","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=211"},"modified":"2024-01-22T08:32:26","modified_gmt":"2024-01-22T16:32:26","slug":"cycognito-operationalizes-cisa-known-exploited-vulnerabilities-catalog","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/cycognito-operationalizes-cisa-known-exploited-vulnerabilities-catalog\/","title":{"rendered":"CyCognito Operationalizes CISA Known Exploited Vulnerabilities Catalog"},"content":{"rendered":"\n<p>\u201cBad news, early\u201d is a common business mindset designed to communicate urgency behind the need to identify small problems before they become big problems.&nbsp;<\/p>\n\n\n\n<p>In IT security, this mindset is a way of life. Visibility into risk is never too soon, and with the number of internet-facing assets growing at an astronomical rate &#8211; for example,&nbsp;<a href=\"https:\/\/www.helpnetsecurity.com\/2020\/12\/04\/containerization-to-define-2021\/\">IDC reports<\/a>&nbsp;that by 2023 over 500 million digital apps and services will be developed and deployed using cloud-native approaches &#8211; even a well-staffed IT security team will be kept busy trying to keep up.<\/p>\n\n\n\n<p>To understand risk amidst constant change, IT security teams are turning to\u00a0<a href=\"\/external-attack-surface-management\/\">external attack surface management<\/a>\u00a0(EASM) tooling for early visibility and a path to lower risk.<\/p>\n\n\n\n<p>Good EASM technologies make asset discovery, attribution\/classification, testing and prioritization simple for its users. Behind the scenes, however, extensive automations, complex decision trees, global infrastructure, and integration with high-value data feeds are necessary in order to maintain pace with threats and assets. The CISA Known Exploited Vulnerabilities Catalog is a valuable tool in this regard.<\/p>\n\n\n\n<p><em>[New to EASM? We recommend reading the blog series&nbsp;<\/em><a href=\"\/blog\/principles-of-attack-surface-protection-part-one-discover-everything\/\">Principles of Attack Surface Protection<\/a><em>, written by Rob Gurzeev, CEO and Co-founder of CyCognito.]<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The CISA Known Exploited Vulnerabilities Catalog<\/h2>\n\n\n\n<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA), a United States federal agency under the U.S. Department of Homeland Security, continuously updates a database of exploited vulnerabilities which it&nbsp;<a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\">makes available online<\/a>.&nbsp;<\/p>\n\n\n\n<p>This living list, curated by the CISA, contains only those CVEs with evidence of active exploitation. While this list is mandatory only for Federal Civilian Executive Branch (FCEB) agencies, organizations are strongly encouraged to download this catalog and use it to compare against their own as a means of reducing risk:<\/p>\n\n\n\n<p><em>\u201cThe CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice.\u201d<\/em><\/p>\n\n\n\n<p>The catalog was first introduced November 3, 2021 with 287 entries and has grown to 624 entries as of April 11, 2022.&nbsp; The catalog is updated at a cadence based on threat activity, often multiple times per month.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"684\" height=\"279\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Number-of-Vulnerabilities-added-to-CISA-over-Time-2.png\" alt=\"\" class=\"wp-image-216\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Number-of-Vulnerabilities-added-to-CISA-over-Time-2.png 684w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Number-of-Vulnerabilities-added-to-CISA-over-Time-2-512x209.png 512w\" sizes=\"auto, (max-width: 684px) 100vw, 684px\" \/><\/figure><\/div>\n\n\n<p>For example, on March 3rd, ninety-five entries were added and on March 24th, sixty-six more were introduced, bringing the total count added in 2022 so far to 313, more than doubling the size of this valuable source of threat intelligence. It will continue to grow.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">CyCognito adds the CISA known exploited vulnerabilities catalog to its platform<\/h2>\n\n\n\n<p>We are pleased to announce that the CyCognito platform operationalizes the CISA known exploited vulnerability catalog within its platform. Data from the catalog is used during assessment and prioritization phases to understand asset risk and assign urgency to issues.&nbsp;<\/p>\n\n\n\n<p>CISA known exploited vulnerabilities can be accessed through the advisories dashboard in the CyCognito console. In the figure below, the CyCognito platform lists assets potentially affected by CISA Alert (AA22-011A) \u201cUnderstanding and Mitigating Russian State-Sponsored Cyber Threats to U.S. Critical Infrastructure.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"836\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-36.png\" alt=\"\" class=\"wp-image-214\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-36.png 1600w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-36-512x268.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-36-1280x669.png 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-36-768x401.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-36-1536x803.png 1536w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><\/figure><\/div>\n\n\n<p>Operationally, insight from this new feed enables your incident response teams early opportunity to tactically disrupt and block instead of recover. Consumers of the CyCognito platform automatically benefit from this new integration \u2013 there isn\u2019t a feature to configure and ongoing administrative maintenance isn\u2019t required.&nbsp;<\/p>\n\n\n\n<p>The CISA known exploitable vulnerability catalog is the latest of many intelligence sources used by CyCognito to develop asset risk scores, including those from NSA, MITRE, FBI and CISA. For example, MITRE ATT&amp;CK Tactics and Techniques are often displayed as part of CyCognito Exploit Intelligence to assist in communicating how adversaries may use a particular exploitable vulnerability, in this case, initial access and lateral movement.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft\"><img loading=\"lazy\" decoding=\"async\" width=\"1058\" height=\"226\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-35.png\" alt=\"\" class=\"wp-image-212\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-35.png 1058w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-35-512x109.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-35-768x164.png 768w\" sizes=\"auto, (max-width: 1058px) 100vw, 1058px\" \/><\/figure><\/div>\n\n\n<p><em>[For more information on the use of CyCognito Exploit Intelligence, see our blog&nbsp;<\/em><a href=\"\/blog\/exploit-intelligence-its-not-just-for-offensive-security-pros-anymore\/\"><em>here<\/em><\/a><em>]<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Lower your risk with CyCognito<\/h2>\n\n\n\n<p>Cybercriminals continuously adjust their approach to achieve their goal. Having a tool that operationalizes CISA exploited vulnerability recommendations &#8211; as they apply to your environment &#8211; is an important way to maintain pace with threats.<\/p>\n\n\n\n<p>CyCognito\u2019s automated asset discovery, attribution, and testing, coupled to advisories such as those from CISA, greatly improves overall awareness and significantly reduces the opportunity for an attack to be successful. This reduces manual, error prone workflows and helps your staff focus on the job at hand.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>CyCognito allows customers to discover exposure, address security gaps timely, and operate efficiently. To learn more about CyCognito\u2019s approach to attack surface management please&nbsp;<a href=\"\/resources\/videos\/demo\/\">watch our demo video.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cBad news, early\u201d is a common business mindset designed to communicate urgency behind the need to identify small problems before they become big problems.\u00a0<\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[8,18],"class_list":["post-211","post","type-post","status-publish","format-standard","hentry","category-product","tag-cisa","tag-easm"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CyCognito Operationalizes CISA Known Exploited Vulnerabilities Catalog | CyCognito Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/cycognito-operationalizes-cisa-known-exploited-vulnerabilities-catalog\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CyCognito Operationalizes CISA Known Exploited Vulnerabilities Catalog | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"\u201cBad news, early\u201d is a common business mindset designed to communicate urgency behind the need to identify small problems before they become big problems.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/cycognito-operationalizes-cisa-known-exploited-vulnerabilities-catalog\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-20T00:47:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-22T16:32:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Number-of-Vulnerabilities-added-to-CISA-over-Time-2.png\" \/>\n<meta name=\"author\" content=\"Jason Pappalexis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jason Pappalexis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/cycognito-operationalizes-cisa-known-exploited-vulnerabilities-catalog\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/cycognito-operationalizes-cisa-known-exploited-vulnerabilities-catalog\/\"},\"author\":{\"name\":\"Jason Pappalexis\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/d24c88adb69cc9e8748425394054a55b\"},\"headline\":\"CyCognito Operationalizes CISA Known Exploited Vulnerabilities Catalog\",\"datePublished\":\"2022-05-20T00:47:00+00:00\",\"dateModified\":\"2024-01-22T16:32:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/cycognito-operationalizes-cisa-known-exploited-vulnerabilities-catalog\/\"},\"wordCount\":742,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/cycognito-operationalizes-cisa-known-exploited-vulnerabilities-catalog\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Number-of-Vulnerabilities-added-to-CISA-over-Time-2.png\",\"keywords\":[\"CISA\",\"EASM\"],\"articleSection\":[\"Product\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/cycognito-operationalizes-cisa-known-exploited-vulnerabilities-catalog\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/cycognito-operationalizes-cisa-known-exploited-vulnerabilities-catalog\/\",\"name\":\"CyCognito Operationalizes CISA Known Exploited Vulnerabilities Catalog | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/cycognito-operationalizes-cisa-known-exploited-vulnerabilities-catalog\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/cycognito-operationalizes-cisa-known-exploited-vulnerabilities-catalog\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Number-of-Vulnerabilities-added-to-CISA-over-Time-2.png\",\"datePublished\":\"2022-05-20T00:47:00+00:00\",\"dateModified\":\"2024-01-22T16:32:26+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/cycognito-operationalizes-cisa-known-exploited-vulnerabilities-catalog\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/cycognito-operationalizes-cisa-known-exploited-vulnerabilities-catalog\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/cycognito-operationalizes-cisa-known-exploited-vulnerabilities-catalog\/#primaryimage\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Number-of-Vulnerabilities-added-to-CISA-over-Time-2.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Number-of-Vulnerabilities-added-to-CISA-over-Time-2.png\",\"width\":684,\"height\":279},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/cycognito-operationalizes-cisa-known-exploited-vulnerabilities-catalog\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CyCognito Operationalizes CISA Known Exploited Vulnerabilities Catalog\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/d24c88adb69cc9e8748425394054a55b\",\"name\":\"Jason Pappalexis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a3e2da561c68bc740a2a280b72b231ff?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a3e2da561c68bc740a2a280b72b231ff?s=96&d=mm&r=g\",\"caption\":\"Jason Pappalexis\"},\"description\":\"Sr. Technical Marketing Manager\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/jason-pappalexis\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CyCognito Operationalizes CISA Known Exploited Vulnerabilities Catalog | CyCognito Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/cycognito-operationalizes-cisa-known-exploited-vulnerabilities-catalog\/","og_locale":"en_US","og_type":"article","og_title":"CyCognito Operationalizes CISA Known Exploited Vulnerabilities Catalog | CyCognito Blog","og_description":"\u201cBad news, early\u201d is a common business mindset designed to communicate urgency behind the need to identify small problems before they become big problems.\u00a0","og_url":"https:\/\/www.cycognito.com\/blog\/cycognito-operationalizes-cisa-known-exploited-vulnerabilities-catalog\/","og_site_name":"CyCognito Blog","article_published_time":"2022-05-20T00:47:00+00:00","article_modified_time":"2024-01-22T16:32:26+00:00","og_image":[{"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Number-of-Vulnerabilities-added-to-CISA-over-Time-2.png","type":"","width":"","height":""}],"author":"Jason Pappalexis","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jason Pappalexis","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/cycognito-operationalizes-cisa-known-exploited-vulnerabilities-catalog\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/cycognito-operationalizes-cisa-known-exploited-vulnerabilities-catalog\/"},"author":{"name":"Jason Pappalexis","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/d24c88adb69cc9e8748425394054a55b"},"headline":"CyCognito Operationalizes CISA Known Exploited Vulnerabilities Catalog","datePublished":"2022-05-20T00:47:00+00:00","dateModified":"2024-01-22T16:32:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/cycognito-operationalizes-cisa-known-exploited-vulnerabilities-catalog\/"},"wordCount":742,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/cycognito-operationalizes-cisa-known-exploited-vulnerabilities-catalog\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Number-of-Vulnerabilities-added-to-CISA-over-Time-2.png","keywords":["CISA","EASM"],"articleSection":["Product"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/cycognito-operationalizes-cisa-known-exploited-vulnerabilities-catalog\/","url":"https:\/\/www.cycognito.com\/blog\/cycognito-operationalizes-cisa-known-exploited-vulnerabilities-catalog\/","name":"CyCognito Operationalizes CISA Known Exploited Vulnerabilities Catalog | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/cycognito-operationalizes-cisa-known-exploited-vulnerabilities-catalog\/#primaryimage"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/cycognito-operationalizes-cisa-known-exploited-vulnerabilities-catalog\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Number-of-Vulnerabilities-added-to-CISA-over-Time-2.png","datePublished":"2022-05-20T00:47:00+00:00","dateModified":"2024-01-22T16:32:26+00:00","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/cycognito-operationalizes-cisa-known-exploited-vulnerabilities-catalog\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/cycognito-operationalizes-cisa-known-exploited-vulnerabilities-catalog\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/cycognito-operationalizes-cisa-known-exploited-vulnerabilities-catalog\/#primaryimage","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Number-of-Vulnerabilities-added-to-CISA-over-Time-2.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Number-of-Vulnerabilities-added-to-CISA-over-Time-2.png","width":684,"height":279},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/cycognito-operationalizes-cisa-known-exploited-vulnerabilities-catalog\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"CyCognito Operationalizes CISA Known Exploited Vulnerabilities Catalog"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/d24c88adb69cc9e8748425394054a55b","name":"Jason Pappalexis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a3e2da561c68bc740a2a280b72b231ff?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a3e2da561c68bc740a2a280b72b231ff?s=96&d=mm&r=g","caption":"Jason Pappalexis"},"description":"Sr. Technical Marketing Manager","url":"https:\/\/www.cycognito.com\/blog\/author\/jason-pappalexis\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/211","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=211"}],"version-history":[{"count":5,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/211\/revisions"}],"predecessor-version":[{"id":655,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/211\/revisions\/655"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=211"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=211"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=211"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}