{"id":25248,"date":"2019-05-15T09:15:54","date_gmt":"2019-05-15T09:15:54","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=25248"},"modified":"2023-06-05T07:23:22","modified_gmt":"2023-06-05T07:23:22","slug":"can-machine-keep-your-code-safe","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/can-machine-keep-your-code-safe\/","title":{"rendered":"Can machine keep your code safe?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"25248\" class=\"elementor elementor-25248\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2d47e050 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2d47e050\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-442b0ffc\" data-id=\"442b0ffc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2a2f31f elementor-widget elementor-widget-text-editor\" data-id=\"2a2f31f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Anna-Bacher.jpeg\" alt=\"Anna Bacher\" width=\"200\"><\/p>\n<p><strong>Speaker<\/strong> Anna Bacher,<br>\n<strong>Designation:<\/strong> Ethical Hacker (19 years) \/ CTO at cybersecurity company Jaroona GmbH<br>\n<strong>Topic:<\/strong> Can machine keep your code safe?<br>\n<strong>Date of Webinar:<\/strong> 20<sup>th<\/sup> May, 2020<br>\n<strong>Time and Location:<\/strong> 03:00 pm CEST\/ 06:30 pm IST\/ 02:00 pm GMT<br>\n<a class=\"watch_now_btn elementor-button\" href=\"#watch\" target=\"_self\">Watch Now<\/a><br>\n<strong><br><\/strong><\/p><p><strong style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\">Speaker Bio:<\/strong><br><\/p><p>\nAnna Bacher is co-founder and CTO of Jaroona GmbH, the world\u2019s most advanced machine-learning-based enterprise application security platform. She is an Ethical Hacker, CTO, and developer with nineteen years of experience in developing and penetrating complex systems for the top 100 international banks, telecom companies, and payment processors. Anna is a co-author of an important patent for peer-to-peer network security. Throughout her career as a security architect, she has been an innovator in the fields of network security, end-point protection, security analytics, machine learning, and threat defense portfolios.<\/p>\n<p>In her current position at Jaroona, she manages a team of highly skilled professionals in cybersecurity, ethical hacking, and deep learning, focusing on creating developers\u2019 tools for source code protection. They have built an AI-based vulnerability detection and repair tool that alerts developers to critical vulnerabilities in their code while they are writing it and provides automated fix suggestions.<\/p>\n<p><strong>Topic Abstract: <\/strong><br>\nAttackers weaponize AI.<\/p>\n<p>Since the early 1990s, every major machine learning open-source release has been closely followed by new attacker toolkits that add obfuscation and anti-decoding to avoid detection, polymorphism to evade antivirus tools, and deliver extremely volatile and dynamic payloads to avoid detection by network intrusion systems. Some attacker toolkits can detect a user\u2018s environment and deliver specific and targeted exploits. We live in an era of weaponized AI.<\/p>\n<p>It\u2019s time for developers to catch up with attackers and utilize AI to protect their applications. The best protection starts by writing secure code without vulnerabilities that can be exploited later.<\/p>\n<p>Easier said than done.<\/p>\n<p>Responsible programmers fail to implement secure coding practices for a variety of reasons. Not all programmers have the necessary knowledge of secure coding standards. And many of the existing code analysis tools are unwieldy and ineffective, with poor performance and major usability issues.<\/p>\n<p>Developers need help.<\/p>\n<p>This webinar demonstrates how my research team, leveraging the latest advances in NLP (Natural Language Processing), has trained a machine to write fixes and security patches for potential vulnerabilities in source code with high precision and confidence.<\/p>\n<p>The system mines a codebase of over 15 million Java and C\/C++ files, creating a knowledge base that provides fixes for more than 170 categories of vulnerabilities.<\/p>\n<p>Traditionally, NLP research has focused on language translation, text generation, sentence completion, grammar correction, and question responses. The first applications of NLP research to programming languages focused on code auto-completion occurred in 2019. My team is among the first to utilize NLP research and architectures in the field of automatic security patch generation.<\/p>\n<p>As part of this webinar, I will share my view as an ethical hacker on whether we can trust a machine\u2019s auto-generated security patches to be legitimate. How can we be sure that the machine is not planting a vulnerability in our code? Just as an AI or ML can be programmed to assist with cybersecurity, one could also be programmed to perform cyberattacks and never get caught.<\/p>\n<p>At the end of this session, I will address the concerns voiced by many prominent high-tech entrepreneurs and researchers regarding the dangers to human society posed by AI. \u201cAs AI gets much smarter than humans, the relative intelligence ratio is probably similar to that between a person and a cat, maybe bigger,\u201d Elon Musk told technology journalist Kara Swisher. \u201cI do think we need to be very careful about the advancement of AI.\u201d<\/p>\n<p>As AI is applied to cybersecurity, at some point, we will build and train machines that are so much more competent than we are that the slightest divergence between their goals and our own could convert them into black hat hackers.<\/p>\n<p>As we contemplate creating AI that can make changes to itself, it seems that we will only have one chance to get the initial conditions right. And that time is now.<\/p>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"watch\"><\/a><br>\n<iframe src=\"https:\/\/www.youtube.com\/embed\/S9VAoQuv8u0\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Speaker Anna Bacher, Designation: Ethical Hacker (19 years) \/ CTO at cybersecurity company Jaroona GmbH Topic: Can machine keep your code safe? Date of Webinar: 20th May, 2020 Time and Location: 03:00 pm CEST\/ 06:30 pm IST\/ 02:00 pm GMT Watch Now Speaker Bio: Anna Bacher is co-founder and CTO of Jaroona GmbH, the world\u2019s&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79432,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-25248","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Explore the Latest Advances in NLP to Keep Your Code Safe<\/title>\n<meta name=\"description\" content=\"Explore the Latest Advances in NLP to Keep Your Code Safe explained by the Anna Bacher through EC-Council University.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/can-machine-keep-your-code-safe\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Can machine keep your code safe?\" \/>\n<meta property=\"og:description\" content=\"Explore the Latest Advances in NLP to Keep Your Code Safe explained by the Anna Bacher through EC-Council University.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/can-machine-keep-your-code-safe\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-15T09:15:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T07:23:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Anna-Bacher.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/can-machine-keep-your-code-safe\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/can-machine-keep-your-code-safe\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Can machine keep your code safe?\",\"datePublished\":\"2019-05-15T09:15:54+00:00\",\"dateModified\":\"2023-06-05T07:23:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/can-machine-keep-your-code-safe\\\/\"},\"wordCount\":696,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/can-machine-keep-your-code-safe\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Anna-Bacher.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/can-machine-keep-your-code-safe\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/can-machine-keep-your-code-safe\\\/\",\"name\":\"Explore the Latest Advances in NLP to Keep Your Code Safe\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/can-machine-keep-your-code-safe\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/can-machine-keep-your-code-safe\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Anna-Bacher.jpg\",\"datePublished\":\"2019-05-15T09:15:54+00:00\",\"dateModified\":\"2023-06-05T07:23:22+00:00\",\"description\":\"Explore the Latest Advances in NLP to Keep Your Code Safe explained by the Anna Bacher through EC-Council University.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/can-machine-keep-your-code-safe\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/can-machine-keep-your-code-safe\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/can-machine-keep-your-code-safe\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Anna-Bacher.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Anna-Bacher.jpg\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/can-machine-keep-your-code-safe\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Can machine keep your code safe?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Explore the Latest Advances in NLP to Keep Your Code Safe","description":"Explore the Latest Advances in NLP to Keep Your Code Safe explained by the Anna Bacher through EC-Council University.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/can-machine-keep-your-code-safe\/","og_locale":"en_US","og_type":"article","og_title":"Can machine keep your code safe?","og_description":"Explore the Latest Advances in NLP to Keep Your Code Safe explained by the Anna Bacher through EC-Council University.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/can-machine-keep-your-code-safe\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2019-05-15T09:15:54+00:00","article_modified_time":"2023-06-05T07:23:22+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Anna-Bacher.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/can-machine-keep-your-code-safe\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/can-machine-keep-your-code-safe\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Can machine keep your code safe?","datePublished":"2019-05-15T09:15:54+00:00","dateModified":"2023-06-05T07:23:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/can-machine-keep-your-code-safe\/"},"wordCount":696,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/can-machine-keep-your-code-safe\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Anna-Bacher.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/can-machine-keep-your-code-safe\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/can-machine-keep-your-code-safe\/","name":"Explore the Latest Advances in NLP to Keep Your Code Safe","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/can-machine-keep-your-code-safe\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/can-machine-keep-your-code-safe\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Anna-Bacher.jpg","datePublished":"2019-05-15T09:15:54+00:00","dateModified":"2023-06-05T07:23:22+00:00","description":"Explore the Latest Advances in NLP to Keep Your Code Safe explained by the Anna Bacher through EC-Council University.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/can-machine-keep-your-code-safe\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/can-machine-keep-your-code-safe\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/can-machine-keep-your-code-safe\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Anna-Bacher.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Anna-Bacher.jpg","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/can-machine-keep-your-code-safe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Can machine keep your code safe?"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/25248","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=25248"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/25248\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79432"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=25248"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=25248"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=25248"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}