{"id":2681,"date":"2024-11-21T12:13:29","date_gmt":"2024-11-21T12:13:29","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/11\/21\/cyber-story-time-the-boy-who-cried-secure\/"},"modified":"2024-11-21T12:13:29","modified_gmt":"2024-11-21T12:13:29","slug":"cyber-story-time-the-boy-who-cried-secure","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/11\/21\/cyber-story-time-the-boy-who-cried-secure\/","title":{"rendered":"Cyber Story Time: The Boy Who Cried &#8220;Secure!&#8221;"},"content":{"rendered":"<p>\u200bAs a relatively new security category, many security operators and executives I\u2019ve met have asked us \u201cWhat are these Automated Security Validation (ASV) tools?\u201d We\u2019ve covered that pretty extensively in the past, so today, instead of covering the \u201cWhat is ASV?\u201d I wanted to address the \u201cWhy ASV?\u201d question. In this article, we\u2019ll cover some common use cases and misconceptions of how people misuse\u00a0As a relatively new security category, many security operators and executives I\u2019ve met have asked us \u201cWhat are these Automated Security Validation (ASV) tools?\u201d We\u2019ve covered that pretty extensively in the past, so today, instead of covering the \u201cWhat is ASV?\u201d I wanted to address the \u201cWhy ASV?\u201d question. In this article, we\u2019ll cover some common use cases and misconceptions of how people misuse\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bAs a relatively new security category, many security operators and executives I\u2019ve met have asked us \u201cWhat are these Automated Security Validation (ASV) tools?\u201d We\u2019ve covered that pretty extensively in the past, so today, instead of covering the \u201cWhat is ASV?\u201d I wanted to address the \u201cWhy ASV?\u201d question. In this article, we\u2019ll cover some&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/11\/21\/cyber-story-time-the-boy-who-cried-secure\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Cyber Story Time: The Boy Who Cried &#8220;Secure!&#8221;<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":2682,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/2681"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=2681"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/2681\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/2682"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=2681"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=2681"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=2681"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}