{"id":18579,"date":"2021-09-13T08:44:41","date_gmt":"2021-09-13T08:44:41","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=18579"},"modified":"2023-04-28T08:58:25","modified_gmt":"2023-04-28T08:58:25","slug":"splunk-state-of-security-report-review","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/splunk-state-of-security-report-review\/","title":{"rendered":"Splunk State of Security Report Review"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Splunk is the world\u2019s first Data-to-Everything\u2122 Platform designed to remove the barriers between data and action, so that everyone thrives in the Data Age. They help IT, DevOps and security teams to transform their organizations with data from any source and on any timescale.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Splunk has released its inaugural <\/span><a href=\"https:\/\/www.splunk.com\/en_us\/form\/state-of-security.html\"><span style=\"font-weight: 400;\">State of Security Report<\/span><\/a><span style=\"font-weight: 400;\">, and its insights are promising. The report was based on a survey with 535 security leaders from across the globe to provide some interesting findings that may change how we think about our data protection strategies going forward.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Splunk report in Numbers<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">84% of organizations have suffered at least one significant incident in the past two years; email compromise is leading the way (42%), followed by phishing scams (33%).&nbsp; 78% are concerned about more SolarWinds-style attacks in the future &#8211; but only 23% have reassessed their current strategy for dealing with them!<\/span><\/p>\n<p><span style=\"font-weight: 400;\">88% of respondents are deploying or planning to deploy ML for security. 41% said that <a href=\"https:\/\/justtotaltech.com\/cloud-computing-security\/\">Cloud Security<\/a> would be their priority, with 12% saying they will focus on Identity Management and nothing mentioned about email protection.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">What can we learn from the Splunk Report<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Splunk shared some solid recommendations that we encourage you to review. These include:&nbsp;<\/span><\/p>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Modernize the Security Operations Center<\/b><span style=\"font-weight: 400;\">,&nbsp; including zero trust and security operations automation processes, modern SIEM systems and most importantly staff training and awareness.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Set your sights on a consolidated view of data<\/b><span style=\"font-weight: 400;\"> that creates a single source of true and trusted information for IT and security teams&nbsp;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Rethink your approach to supply chain threats<\/b><span style=\"font-weight: 400;\"> and improve your ability to see suspicious lateral movement within your networks. Implement a well-defined and closely monitored identity policy with strong enforcement and monitoring.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Press your collaborative advantage <span style=\"font-weight: 400;\">and&nbsp; advocate for the importance of integrated security thinking, at every stage of IT and the business.&nbsp;<\/span><\/b><\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Some additional suggestions from EasyDMARC are below:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Have a comprehensive email security strategy that includes:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Inbound protection&nbsp;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Outbound protection&nbsp;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Security Awareness Training<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Best Practices (ever-evolving)&nbsp;<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">One of the most important things to do when outsourcing your supply chain is to make sure that they are <a href=\"https:\/\/easydmarc.com\/blog\/what-is-a-dmarc-policy\/\">DMARC compliant<\/a>. As part of your vetting process, we recommend requiring them at minimum to have p=none in place.&nbsp; Over time, our recommendation would be for your vendors to deploy a more stringent policy.&nbsp; We are happy to provide a report with your supply chain\u2019s DMARC posture for you to review and encourage the right best practices to protect your organization and others.&nbsp;&nbsp;&nbsp;&nbsp;<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Conclusion<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">&nbsp;The latest Splunk State of Security report is a trove of information for anyone in charge of protecting their organization\u2019s data. With so much to glean, it can be challenging to know where to start. Fortunately, the folks at EasyDmarc have taken some time to highlight a few key takeaways from this year&#8217;s report and provide recommendations on how best to deal with each one. If any of this sounds overwhelming and you want help implementing email security practices that protect your business from cybercriminals, reach out today! <a href=\"https:\/\/easydmarc.com\/contact-us\">Our experts are ready to guide and support you 24\/7<\/a>.&nbsp;<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Splunk is the world\u2019s first Data-to-Everything\u2122 Platform designed &#8230;<\/p>\n","protected":false},"author":1,"featured_media":18581,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[204,201],"tags":[],"class_list":["post-18579","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-thought-leadership"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Splunk State of Security Report Review | EasyDMARC<\/title>\n<meta name=\"description\" content=\"EasyDMARC&#039;s review of Splunk State of Security Report Review of 2021. Interesting numbers, lessons learned, and advice for security best practices\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/splunk-state-of-security-report-review\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Splunk State of Security Report Review\" \/>\n<meta property=\"og:description\" content=\"EasyDMARC&#039;s review of Splunk State of Security Report Review of 2021. Interesting numbers, lessons learned, and advice for security best practices\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/splunk-state-of-security-report-review\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-13T08:44:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-28T08:58:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/Screen-Shot-2021-09-03-at-15.38.57.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2070\" \/>\n\t<meta property=\"og:image:height\" content=\"1600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EasyDMARC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EasyDMARC\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/splunk-state-of-security-report-review\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/splunk-state-of-security-report-review\\\/\"},\"author\":{\"name\":\"EasyDMARC\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\"},\"headline\":\"Splunk State of Security Report Review\",\"datePublished\":\"2021-09-13T08:44:41+00:00\",\"dateModified\":\"2023-04-28T08:58:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/splunk-state-of-security-report-review\\\/\"},\"wordCount\":527,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/splunk-state-of-security-report-review\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/Screen-Shot-2021-09-03-at-15.38.57.jpg\",\"articleSection\":[\"Blog\",\"Thought Leadership\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/splunk-state-of-security-report-review\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/splunk-state-of-security-report-review\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/splunk-state-of-security-report-review\\\/\",\"name\":\"Splunk State of Security Report Review | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/splunk-state-of-security-report-review\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/splunk-state-of-security-report-review\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/Screen-Shot-2021-09-03-at-15.38.57.jpg\",\"datePublished\":\"2021-09-13T08:44:41+00:00\",\"dateModified\":\"2023-04-28T08:58:25+00:00\",\"description\":\"EasyDMARC's review of Splunk State of Security Report Review of 2021. Interesting numbers, lessons learned, and advice for security best practices\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/splunk-state-of-security-report-review\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/splunk-state-of-security-report-review\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/splunk-state-of-security-report-review\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/Screen-Shot-2021-09-03-at-15.38.57.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/Screen-Shot-2021-09-03-at-15.38.57.jpg\",\"width\":2070,\"height\":1600,\"caption\":\"Screen Shot 2021 09 03 at 15.38.57\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/splunk-state-of-security-report-review\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Thought Leadership\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/thought-leadership\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Splunk State of Security Report Review\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\",\"name\":\"EasyDMARC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"caption\":\"EasyDMARC\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/easydmarc\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Splunk State of Security Report Review | EasyDMARC","description":"EasyDMARC's review of Splunk State of Security Report Review of 2021. Interesting numbers, lessons learned, and advice for security best practices","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/splunk-state-of-security-report-review\/","og_locale":"en_US","og_type":"article","og_title":"Splunk State of Security Report Review","og_description":"EasyDMARC's review of Splunk State of Security Report Review of 2021. Interesting numbers, lessons learned, and advice for security best practices","og_url":"https:\/\/easydmarc.com\/blog\/splunk-state-of-security-report-review\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2021-09-13T08:44:41+00:00","article_modified_time":"2023-04-28T08:58:25+00:00","og_image":[{"width":2070,"height":1600,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/Screen-Shot-2021-09-03-at-15.38.57.jpg","type":"image\/jpeg"}],"author":"EasyDMARC","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"EasyDMARC","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/splunk-state-of-security-report-review\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/splunk-state-of-security-report-review\/"},"author":{"name":"EasyDMARC","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97"},"headline":"Splunk State of Security Report Review","datePublished":"2021-09-13T08:44:41+00:00","dateModified":"2023-04-28T08:58:25+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/splunk-state-of-security-report-review\/"},"wordCount":527,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/splunk-state-of-security-report-review\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/Screen-Shot-2021-09-03-at-15.38.57.jpg","articleSection":["Blog","Thought Leadership"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/splunk-state-of-security-report-review\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/splunk-state-of-security-report-review\/","url":"https:\/\/easydmarc.com\/blog\/splunk-state-of-security-report-review\/","name":"Splunk State of Security Report Review | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/splunk-state-of-security-report-review\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/splunk-state-of-security-report-review\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/Screen-Shot-2021-09-03-at-15.38.57.jpg","datePublished":"2021-09-13T08:44:41+00:00","dateModified":"2023-04-28T08:58:25+00:00","description":"EasyDMARC's review of Splunk State of Security Report Review of 2021. Interesting numbers, lessons learned, and advice for security best practices","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/splunk-state-of-security-report-review\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/splunk-state-of-security-report-review\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/splunk-state-of-security-report-review\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/Screen-Shot-2021-09-03-at-15.38.57.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/Screen-Shot-2021-09-03-at-15.38.57.jpg","width":2070,"height":1600,"caption":"Screen Shot 2021 09 03 at 15.38.57"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/splunk-state-of-security-report-review\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Thought Leadership","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/thought-leadership\/"},{"@type":"ListItem","position":4,"name":"Splunk State of Security Report Review"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97","name":"EasyDMARC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","caption":"EasyDMARC"},"url":"https:\/\/easydmarc.com\/blog\/author\/easydmarc\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/Screen-Shot-2021-09-03-at-15.38.57.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/18579","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=18579"}],"version-history":[{"count":0,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/18579\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/18581"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=18579"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=18579"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=18579"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}