{"id":33626,"date":"2016-10-26T00:30:14","date_gmt":"2016-10-26T07:30:14","guid":{"rendered":""},"modified":"2025-12-08T06:23:11","modified_gmt":"2025-12-08T14:23:11","slug":"securing-the-internet-of-things-introducing-the-security-program-for-azure-iot","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/10\/26\/securing-the-internet-of-things-introducing-the-security-program-for-azure-iot\/","title":{"rendered":"Securing the Internet of Things: Introducing the Security Program for Azure IoT"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\"><em>This post is authored by Sam George, Partner Director Program Management, Azure IoT<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">As the Internet of Things (IoT) continues to gain traction in the enterprise, questions of security and privacy are top of mind for business decision makers, executives and IT alike. In our work with customers, we find many businesses are struggling to determine how secure their end-to-end IoT infrastructure is, or even delaying IoT implementations until security best practices and standards can be established and confirmed.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Our goal at Microsoft to keep our customer\u2019s IoT solutions secure.&nbsp; We already do this on multiple levels, ranging from the cloud and beyond \u2013 including Azure\u2019s enterprise-grade security, working with standards bodies on IoT security, and providing comprehensive security recommendations and guidance \u2013 to individual assets that only support secure protocols when connecting to devices and the Windows 10 IoT Core secure IoT operating system.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">While these are all important aspects of IoT security, we have heard from enterprises that they want additional security assurances to make sure they have assembled their IoT solutions in a secure way from devices, to connectivity, to cloud.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Today, I\u2019m thrilled to announce the Security Program for Azure IoT.&nbsp; This new program brings together a curated set of best-in-class security auditors customers can choose from to perform a security audit on their IoT solutions, find issues and provide recommendations.&nbsp; The Security Program for Azure IoT will work from the ground up, examining everything from a businesses\u2019 devices and assets to gateways and even communication to the cloud.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Our initial best-in-class security auditors include <a href=\"https:\/\/casaba.com\/\">Casaba Security LLC<\/a>, <a href=\"http:\/\/cyberx-labs.com\/en\/home\/\">CyberX<\/a>, <a href=\"https:\/\/www.praetorian.com\/\">Praetorian<\/a>, and <a href=\"http:\/\/www.techmahindra.com\/pages\/default.aspx\">Tech Mahindra<\/a> and will expand as the program grows. Microsoft will also be working with these security auditing partners and standards organizations, such as the Industrial Internet Consortium (IIC), to establish industry protocols and best practices for security auditing. This is part of our commitment to establish a vibrant and safe IoT ecosystem.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In all our security efforts, Microsoft works with security partners to help protect businesses \u2013 and ultimately help us raise the bar across the industry. Select Azure IoT customers will be the first to take advantage of this program to evaluate their end-to-end IoT infrastructure and manage their security risk. In the coming months, we\u2019ll continue to provide updates on the Security Program for Azure IoT, our global auditing partners, and auditing standards.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In the meantime, we invite you to learn more from our <a href=\"https:\/\/azure.microsoft.com\/en-us\/documentation\/articles\/iot-suite-security-deployment\/\">Securing Your IoT Deployment<\/a> and <a href=\"http:\/\/blogs.microsoft.com\/iot\/2016\/03\/07\/how-enterprises-can-enable-iot-security\/\">Securing Your Internet of Things from the Ground Up<\/a> whitepapers. You can also read more about our <a href=\"http:\/\/blogs.microsoft.com\/iot\/2016\/06\/17\/microsoft-weighs-in-on-how-the-us-government-can-help-to-promote-iot\/\">public recommendations for cybersecurity and IoT standards<\/a>&nbsp;or attend our upcoming talk at IoT Solutions World Congress on <a href=\"http:\/\/www.iotsworldcongress.com\/activities\/activity-profile\/?activity=63\">Trustworthy Internet of Things Infrastructure<\/a>. For more information about the security auditing program, please visit our partner page on <a href=\"http:\/\/www.internetofyourthings.com\/\">www.InternetofYourThings.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This post is authored by Sam George, Partner Director Program Management, Azure IoT As the Internet of Things (IoT) continues to gain traction in the enterprise, questions of security and privacy are top of mind for business decision makers, executives and IT alike.<\/p>\n","protected":false},"author":61,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[],"footnotes":""},"post_tag":[3742],"threat-intelligence":[],"content-type":[3662],"job-role":[],"product":[3690,3691,3699],"topic":[3676],"coauthors":[1957],"class_list":["post-33626","post","type-post","status-publish","format-standard","hentry","tag-azure","content-type-news","product-microsoft-defender","product-microsoft-defender-for-cloud","product-microsoft-defender-for-iot","topic-iot-security","review-flag-inter-1694638272-721","review-flag-iot-1694638272-473","review-flag-new-1694638263-340","review-flag-partn-1694638263-177"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Securing the Internet of Things: Introducing the Security Program for Azure IoT | Microsoft Security Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/10\/26\/securing-the-internet-of-things-introducing-the-security-program-for-azure-iot\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing the Internet of Things: Introducing the Security Program for Azure IoT | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"This post is authored by Sam George, Partner Director Program Management, Azure IoT As the Internet of Things (IoT) continues to gain traction in the enterprise, questions of security and privacy are top of mind for business decision makers, executives and IT alike.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/10\/26\/securing-the-internet-of-things-introducing-the-security-program-for-azure-iot\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-26T07:30:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-08T14:23:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-microsoft_logo_element.png\" \/>\n\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Microsoft Secure Blog Staff\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microsoft Secure Blog Staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/10\/26\/securing-the-internet-of-things-introducing-the-security-program-for-azure-iot\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/10\/26\/securing-the-internet-of-things-introducing-the-security-program-for-azure-iot\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/trustedcloudteam\/\",\"@type\":\"Person\",\"@name\":\"Microsoft Secure Blog Staff\"}],\"headline\":\"Securing the Internet of Things: Introducing the Security Program for Azure IoT\",\"datePublished\":\"2016-10-26T07:30:14+00:00\",\"dateModified\":\"2025-12-08T14:23:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/10\/26\/securing-the-internet-of-things-introducing-the-security-program-for-azure-iot\/\"},\"wordCount\":480,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"keywords\":[\"Azure\"],\"articleSection\":[\"Cybersecurity\",\"IoT\",\"Microsoft Defender for Cloud\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/10\/26\/securing-the-internet-of-things-introducing-the-security-program-for-azure-iot\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/10\/26\/securing-the-internet-of-things-introducing-the-security-program-for-azure-iot\/\",\"name\":\"Securing the Internet of Things: Introducing the Security Program for Azure IoT | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"datePublished\":\"2016-10-26T07:30:14+00:00\",\"dateModified\":\"2025-12-08T14:23:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/10\/26\/securing-the-internet-of-things-introducing-the-security-program-for-azure-iot\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/10\/26\/securing-the-internet-of-things-introducing-the-security-program-for-azure-iot\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/10\/26\/securing-the-internet-of-things-introducing-the-security-program-for-azure-iot\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing the Internet of Things: Introducing the Security Program for Azure IoT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/a385e64377ec1eb81d3bd7f9839f060b\",\"name\":\"Microsoft Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/0242738c3da64c97e705834683728e774a3f4e29c071681ed74a68e3a671d270?s=96&d=microsoft&r=gea2dea4ce5dbbbe4077dc25334909eb7\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0242738c3da64c97e705834683728e774a3f4e29c071681ed74a68e3a671d270?s=96&d=microsoft&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0242738c3da64c97e705834683728e774a3f4e29c071681ed74a68e3a671d270?s=96&d=microsoft&r=g\",\"caption\":\"Microsoft Security\"},\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/mssecurity\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securing the Internet of Things: Introducing the Security Program for Azure IoT | Microsoft Security Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/10\/26\/securing-the-internet-of-things-introducing-the-security-program-for-azure-iot\/","og_locale":"en_US","og_type":"article","og_title":"Securing the Internet of Things: Introducing the Security Program for Azure IoT | Microsoft Security Blog","og_description":"This post is authored by Sam George, Partner Director Program Management, Azure IoT As the Internet of Things (IoT) continues to gain traction in the enterprise, questions of security and privacy are top of mind for business decision makers, executives and IT alike.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/10\/26\/securing-the-internet-of-things-introducing-the-security-program-for-azure-iot\/","og_site_name":"Microsoft Security Blog","article_published_time":"2016-10-26T07:30:14+00:00","article_modified_time":"2025-12-08T14:23:11+00:00","og_image":[{"width":512,"height":512,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-microsoft_logo_element.png","type":"image\/png"}],"author":"Microsoft Secure Blog Staff","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Microsoft Secure Blog Staff","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/10\/26\/securing-the-internet-of-things-introducing-the-security-program-for-azure-iot\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/10\/26\/securing-the-internet-of-things-introducing-the-security-program-for-azure-iot\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/trustedcloudteam\/","@type":"Person","@name":"Microsoft Secure Blog Staff"}],"headline":"Securing the Internet of Things: Introducing the Security Program for Azure IoT","datePublished":"2016-10-26T07:30:14+00:00","dateModified":"2025-12-08T14:23:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/10\/26\/securing-the-internet-of-things-introducing-the-security-program-for-azure-iot\/"},"wordCount":480,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"keywords":["Azure"],"articleSection":["Cybersecurity","IoT","Microsoft Defender for Cloud"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/10\/26\/securing-the-internet-of-things-introducing-the-security-program-for-azure-iot\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/10\/26\/securing-the-internet-of-things-introducing-the-security-program-for-azure-iot\/","name":"Securing the Internet of Things: Introducing the Security Program for Azure IoT | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"datePublished":"2016-10-26T07:30:14+00:00","dateModified":"2025-12-08T14:23:11+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/10\/26\/securing-the-internet-of-things-introducing-the-security-program-for-azure-iot\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/10\/26\/securing-the-internet-of-things-introducing-the-security-program-for-azure-iot\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/10\/26\/securing-the-internet-of-things-introducing-the-security-program-for-azure-iot\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Securing the Internet of Things: Introducing the Security Program for Azure IoT"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/a385e64377ec1eb81d3bd7f9839f060b","name":"Microsoft Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0242738c3da64c97e705834683728e774a3f4e29c071681ed74a68e3a671d270?s=96&d=microsoft&r=gea2dea4ce5dbbbe4077dc25334909eb7","url":"https:\/\/secure.gravatar.com\/avatar\/0242738c3da64c97e705834683728e774a3f4e29c071681ed74a68e3a671d270?s=96&d=microsoft&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0242738c3da64c97e705834683728e774a3f4e29c071681ed74a68e3a671d270?s=96&d=microsoft&r=g","caption":"Microsoft Security"},"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/mssecurity\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/33626","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/61"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=33626"}],"version-history":[{"count":1,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/33626\/revisions"}],"predecessor-version":[{"id":144242,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/33626\/revisions\/144242"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=33626"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/post_tag?post=33626"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=33626"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=33626"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/job-role?post=33626"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/product?post=33626"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=33626"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=33626"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}