{"id":78498,"date":"2024-05-25T15:32:05","date_gmt":"2024-05-25T07:32:05","guid":{"rendered":"https:\/\/version-2.com\/?p=78498"},"modified":"2024-05-20T15:39:17","modified_gmt":"2024-05-20T07:39:17","slug":"is-your-company-data-on-the-dark-web-key-webinar-takeaways","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2024\/05\/is-your-company-data-on-the-dark-web-key-webinar-takeaways\/","title":{"rendered":"Is your company data on the dark web? Key webinar takeaways"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"78498\" class=\"elementor elementor-78498\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cba6f33 elementor-widget elementor-widget-video\" data-id=\"cba6f33\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=Rj3l_Cp4uZE&amp;embeds_referring_euri=https%3A%2F%2Fnordsecurity.com%2F&amp;embeds_referring_origin=https%3A%2F%2Fnordsecurity.com&amp;source_ve_path=MjM4NTE&amp;feature=emb_title&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2493f1c elementor-widget elementor-widget-text-editor\" data-id=\"2493f1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"max-w-post-content\"><div class=\"block md:hidden\"><div class=\"hidden md:block TableOfContents_tocDesktop__9_aoA\"><p>93% of CISOs are concerned about dark web threats. What cybersecurity challenges are emerging from the online underworld, and how can we proactively address them? Nord Security\u2019s recent webinar, Is your business data on the dark web?, delved into the hidden depths of the Internet and its growing relevance to security leaders.<\/p><\/div><\/div><div class=\"style_postContent__uJLGT text-black break-words\" data-content-type-blog=\"true\"><div class=\"Article_wrapper__YyQ2_\"><p class=\"text-base leading-normal\">Cybersecurity experts Vladimir Krupnov, Threat Intelligence Lead at <a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/www.revolut.com\/\"><u>Revolut<\/u><\/a>, Andrew Rose, Chief Security Officer at <a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/sosafe-awareness.com\/\"><u>SoSafe<\/u><\/a>, and Matt Lee, Senior Director of Security and Compliance at <a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/www.pax8.com\/en-us\/\"><u>Pax8<\/u><\/a>, joined Gerald Kasulis, VP Sales at <a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/nordstellar.com\/\"><u>NordStellar<\/u><\/a>, to share their experiences and insights on dark web monitoring, and how they leverage threat intelligence to secure their organizations\u2019 data. Enjoy the recording above for its comprehensive discussion on the topic, or keep reading for key business takeaways.<\/p><h2 id=\"Understanding the dark web\" class=\"text-h2 leading-none text-left Heading_richTextH2__l81Mp\">Understanding the dark web<\/h2><p class=\"text-base leading-normal\">The dark web refers to parts of the internet that are not indexed by typical search engines and require specific browsers or tools to access. According to Matt, it is &#8220;where data has been traded&#8230; where a lot of criminal business has historically been transmitted.&#8221; To Vladimir,\u00a0 \u201cIt&#8217;s a cyberspace where criminals \u2013 or potential criminals \u2013 communicate and carry out malicious activity, which could be related to your company, government, or anything else.\u201d<\/p><p class=\"text-base leading-normal\">But as Andrew points out, it\u2019s not all doom and gloom. The dark web has proven time and again to be a beneficial technology, providing a vital platform for journalists and social movements across the world for free speech and anonymous communication.<\/p><p class=\"text-base leading-normal\">For security leaders, it\u2019s a vast, largely untapped wellspring of information and data that isn\u2019t attainable on the clear web. Fearing or ignoring it as a large business equates to simply wasting a good source of intelligence and\/or value.<\/p><div class=\"my-64 text-center\"><p><span style=\"box-sizing: border-box; display: inline-block; overflow: hidden; width: initial; height: initial; background: none; opacity: 1; border: 0px; margin: 0px; padding: 0px; position: relative; max-width: 100%;\"><span style=\"box-sizing: border-box; display: block; width: initial; height: initial; background: none; opacity: 1; border: 0px; margin: 0px; padding: 0px; max-width: 100%;\"><img style=\"display: block; max-width: 100%; width: initial; height: initial; background: none; opacity: 1; border: 0px; margin: 0px; padding: 0px;\" alt=\"\" aria-hidden=\"true\" \/><\/span><img decoding=\"async\" style=\"position: absolute; inset: 0px; box-sizing: border-box; padding: 0px; border: none; margin: auto; display: block; width: 0px; height: 0px; min-width: 100%; max-width: 100%; min-height: 100%; max-height: 100%; object-fit: contain;\" src=\"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_3840,q_auto\/v1\/nord-security-web\/blog\/categories\/cybersecurity\/2024\/05\/Webinar_blog_quate_1.png\" srcset=\"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_1200,q_auto\/v1\/nord-security-web\/blog\/categories\/cybersecurity\/2024\/05\/Webinar_blog_quate_1.png 1x, https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_3840,q_auto\/v1\/nord-security-web\/blog\/categories\/cybersecurity\/2024\/05\/Webinar_blog_quate_1.png 2x\" alt=\"Quote bubble: \u201cYou have to embrace the dark web as well as fear it, because it might be serving your business, your community or your social group, not just endangering your business.\u201d\" data-nimg=\"intrinsic\" \/><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_1200,q_auto\/v1\/nord-security-web\/blog\/categories\/cybersecurity\/2024\/05\/Webinar_blog_quate_1.png\" width=\"1200\" height=\"548\" \/><noscript><\/noscript><\/span><\/p><\/div><p class=\"text-base leading-normal\">So why do cybercriminals flock to the dark web? According to Matt, it offers threat actors a way to &#8220;control the discoverability&#8221; of illegal activities, leveraging end-to-end encrypted technologies for anonymity. Vladimir points out the ease with which individuals can now become cybercriminals, thanks to platforms like Telegram that host thousands of illicit groups: \u201cthis is a massive problem because it lowers the barrier for the typical person to become a cybercriminal. It just takes 2 clicks nowadays.\u201d<\/p><p class=\"text-base leading-normal\">What are they after?<\/p><div class=\"my-64 text-center\"><p><span style=\"box-sizing: border-box; display: inline-block; overflow: hidden; width: initial; height: initial; background: none; opacity: 1; border: 0px; margin: 0px; padding: 0px; position: relative; max-width: 100%;\"><span style=\"box-sizing: border-box; display: block; width: initial; height: initial; background: none; opacity: 1; border: 0px; margin: 0px; padding: 0px; max-width: 100%;\"><img style=\"display: block; max-width: 100%; width: initial; height: initial; background: none; opacity: 1; border: 0px; margin: 0px; padding: 0px;\" alt=\"\" aria-hidden=\"true\" \/><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_1200,q_auto\/v1\/nord-security-web\/blog\/categories\/cybersecurity\/2024\/05\/Webinar_blog_quate_2.png\" width=\"1200\" height=\"548\" \/><\/span><noscript><\/noscript><\/span><\/p><\/div><p class=\"text-base leading-normal\">Vladimir states that the point is not to be fully invisible, but to have an easy escape and lower traceability (compared to the \u201cclear\u201d web): &#8220;You can always find anyone&#8230; It all comes down to time and effort. If someone sells credentials belonging to your company and the existing damage is less than a few million, it&#8217;s unlikely to be picked up by law enforcement unless it&#8217;s a part of a broader campaign.\u201d<\/p><p class=\"text-base leading-normal\">Disposable fake profiles are a key tool in a threat actor\u2019s arsenal. \u201cThey just burn the profile,\u201d says Matt. \u201cHe would just say, they\u2019re getting too close to me, time to burn my PGP key. Next I&#8217;ll just build a new profile. They&#8217;re living in plain sight. That said, they hate burning a persona. It sucks. But yes, they do it when they need to.\u201d<\/p><p class=\"text-base leading-normal\">Hacker gangs operate better than most think, he continues. \u201cTheir tradecraft and OPSEC (operations security) is better than most people give credit for, and I would also say is probably better than most companies\u2019&#8230; it is the risk\/reward of what they&#8217;re doing \u2013 since the risk is extremely high, they respond with better offset and better methodologies.\u201d<\/p><h2 id=\"Assessing and addressing business exposure\" class=\"text-h2 leading-none text-left Heading_richTextH2__l81Mp\">Assessing and addressing business exposure<\/h2><p class=\"text-base leading-normal\">Matt Lee advises businesses to adopt a mindset of \u201clive compromised,\u201d focusing on limiting damage and improving incident response: \u201cHow do I limit the blast radius? How do I find it faster?\u201d<\/p><p class=\"text-base leading-normal\">This proactive stance can be supported by using threat intelligence services, as Andrew\u2019s experience shows: \u201cA threat intel firm brought me information about one of our staff members&#8217; identities being sold online&#8230; We reached out immediately to that staff member and helped them close down all of those loops. We knew that although it was a personal issue for them, that could very easily turn into an insider threat, blackmail, or risk for us.\u201d<\/p><p class=\"text-base leading-normal\">Andrew explains that his team effectively scans for anything to do with their brand or company. In this case, it was a lucky find: \u201cIt just so happened that part of the details that were being sold said that this person is working for this organization in this role. So that was our trigger, that was our hook.\u201d<\/p><p class=\"text-base leading-normal\">He points out ethical concerns for business leaders when dealing with dark web resources. \u201cYou look at things like the Ashley Madison data dump\u2026 and we\u2019re wondering what we do with this? Do we download this data and look at it to see whether any of our staff have been compromised and therefore potentially being blackmailed? Because that&#8217;s us downloading illegally stolen data. Or do we step away from it?\u201d<\/p><h2 id=\"Proactive measures and best practices for security leaders\" class=\"text-h2 leading-none text-left Heading_richTextH2__l81Mp\">Proactive measures and best practices for security leaders<\/h2><p class=\"text-base leading-normal\">Each expert supports ramping up education efforts and budget quotas for cybersecurity.<\/p><div class=\"my-64 text-center\"><p><span style=\"box-sizing: border-box; display: inline-block; overflow: hidden; width: initial; height: initial; background: none; opacity: 1; border: 0px; margin: 0px; padding: 0px; position: relative; max-width: 100%;\"><span style=\"box-sizing: border-box; display: block; width: initial; height: initial; background: none; opacity: 1; border: 0px; margin: 0px; padding: 0px; max-width: 100%;\"><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_1200,q_auto\/v1\/nord-security-web\/blog\/categories\/cybersecurity\/2024\/05\/Webinar_blog_quate_3.png\" width=\"1200\" height=\"548\" \/><\/span><noscript><\/noscript><\/span><\/p><p class=\"text-nano leading-normal text-left text-center text-gray-600 my-8\">\u00a0<\/p><\/div><p class=\"text-base leading-normal\">Business leaders, particularly newly hired executives, are singled out by threat actors with targeted phishing and vishing attempts, according to Vladimir, underscoring the need for comprehensive security protocols from day one.<\/p><p class=\"text-base leading-normal\">What about \u201cselling\u201d to stakeholders and business leadership? As always, it comes down to communication. Andrew stated: \u201cYou have to take stories to your exec. Take my previous examples of finding at-risk employees online and being able to protect them, thus protecting the company. Or receiving a phone call from a threat intel provider, letting me know that there were discussions about attacking my sector.<b>\u00a0<\/b><\/p><div class=\"my-64 text-center\"><p class=\"text-nano leading-normal text-left text-center text-gray-600 my-8\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_1200,q_auto\/v1\/nord-security-web\/blog\/categories\/cybersecurity\/2024\/05\/Webinar_blog_quate_4.png\" width=\"1200\" height=\"548\" \/><\/p><\/div><p class=\"text-base leading-normal\">Should smaller companies be concerned about the dark web threats? There\u2019s a common misconception that small companies are not a target for cybercriminals, with media exposure focusing on large scale data breaches of well-known brands. Matt Lee thinks so: \u201cIf I land on your credentials, your data, it doesn&#8217;t have to be valuable to me, it doesn&#8217;t have to be valuable to the world. It only has to matter to you to get you to pay.\u201d Vladimir reminds us to watch out for fourth party risk \u2013 any risk posed to your organization from a business relationship a third party has with its vendor.<\/p><h2 id=\"Insights and recommendations for threat exposure management\" class=\"text-h2 leading-none text-left Heading_richTextH2__l81Mp\">Insights and recommendations for threat exposure management<\/h2><p class=\"text-base leading-normal\">Matt recommends using canaries (attractive decoy targets for threat actors) as warning beacons on your security perimeter. \u201cIt enables you to take action, and makes that credential no longer valuable. Remove the credential, remove the persistence, whatever it may be.\u201d A common question crops up: How can security leaders measure the effectiveness of dark web monitoring solutions? The panelists agree on measuring intelligence quality by how much of it their security teams can act upon.<\/p><div class=\"my-64 text-center\"><p><span style=\"box-sizing: border-box; display: inline-block; overflow: hidden; width: initial; height: initial; background: none; opacity: 1; border: 0px; margin: 0px; padding: 0px; position: relative; max-width: 100%;\"><span style=\"box-sizing: border-box; display: block; width: initial; height: initial; background: none; opacity: 1; border: 0px; margin: 0px; padding: 0px; max-width: 100%;\"><img style=\"display: block; max-width: 100%; width: initial; height: initial; background: none; opacity: 1; border: 0px; margin: 0px; padding: 0px;\" alt=\"\" aria-hidden=\"true\" \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_1200,q_auto\/v1\/nord-security-web\/blog\/categories\/cybersecurity\/2024\/05\/Webinar_blog_quate_5.png\" width=\"1200\" height=\"548\" \/><\/span><noscript><\/noscript><\/span><\/p><\/div><p class=\"text-base leading-normal\">Andrew looks at how current the data his solution is providing is, acknowledging that there are barren periods, but \u201cit was never a service you could do without. Because you always knew that next month might be when suddenly they&#8217;d find something which could make the whole contract worthwhile.\u201d<\/p><div class=\"my-64 text-center\"><p class=\"text-nano leading-normal text-left text-center text-gray-600 my-8\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_1200,q_auto\/v1\/nord-security-web\/blog\/categories\/cybersecurity\/2024\/05\/Webinar_blog_quate_6.png\" width=\"1200\" height=\"548\" \/><\/p><\/div><p class=\"text-base leading-normal\">Matt agreed, saying it\u2019s simply good strategy, relevant to sports, life, and cybersecurity: \u201cYou go scout the other team!\u201d<\/p><p class=\"text-base leading-normal\">Any final words? Incident response plan. If you don\u2019t have one, Matt says, sort it out. \u201cToo many companies lack this.\u201d This plan should be reviewed annually and adapted to evolving threat and business environments. Ultimately, this is all about setting a strategic baseline for cybersecurity best practices. \u201cEverything we&#8217;re talking about here is part of basic data hygiene and governance. Live as close to the <a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/www.cisecurity.org\/controls\"><u>CIS framework<\/u><\/a> as you can.\u201d<\/p><p class=\"text-base leading-normal\">With actionable data, timely insights, and increased visibility into the online underworld, staying one step ahead of threat actors becomes possible. For CISOs protecting their organization&#8217;s data and security, this means having the ability to not just react to threats, but to anticipate them.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63561\" class=\"elementor elementor-63561\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b6aa2c4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1b6aa2c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b283ee5\" data-id=\"1b283ee5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e466f1a elementor-widget elementor-widget-text-editor\" data-id=\"4e466f1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordLayer<br \/><\/strong>NordLayer is an adaptive network access security solution for modern businesses \u2013 from the world\u2019s most trusted cybersecurity brand, Nord Security.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-51a2bcf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"51a2bcf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c73a037\" data-id=\"c73a037\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-821bef5 elementor-widget elementor-widget-spacer\" data-id=\"821bef5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>In cybersecurity, the principle of least privilege (PoL [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[973,1129,1273,61],"tags":[974,1131,1272],"class_list":["post-78498","post","type-post","status-publish","format-standard","hentry","category-nord-security","category-nordpass","category-1273","category-press-release","tag-nord-security","tag-nordpass","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Is your company data on the dark web? Key webinar takeaways - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordsecurity.com\/blog\/dark-web-webinar-takeaways\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is your company data on the dark web? Key webinar takeaways - Version 2\" \/>\n<meta property=\"og:description\" content=\"In cybersecurity, the principle of least privilege (PoL [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordsecurity.com\/blog\/dark-web-webinar-takeaways\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-25T07:32:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/a16d08b9cf\/least-privilege.png\/m\/1080x0\/filters:quality(75)\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordsecurity.com\\\/blog\\\/dark-web-webinar-takeaways#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/05\\\/is-your-company-data-on-the-dark-web-key-webinar-takeaways\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Is your company data on the dark web? Key webinar takeaways\",\"datePublished\":\"2024-05-25T07:32:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/05\\\/is-your-company-data-on-the-dark-web-key-webinar-takeaways\\\/\"},\"wordCount\":1535,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordsecurity.com\\\/blog\\\/dark-web-webinar-takeaways#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/a16d08b9cf\\\/least-privilege.png\\\/m\\\/1080x0\\\/filters:quality(75)\",\"keywords\":[\"Nord Security\",\"NordPass\",\"2024\"],\"articleSection\":[\"Nord Security\",\"NordPass\",\"2024\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/05\\\/is-your-company-data-on-the-dark-web-key-webinar-takeaways\\\/\",\"url\":\"https:\\\/\\\/nordsecurity.com\\\/blog\\\/dark-web-webinar-takeaways\",\"name\":\"Is your company data on the dark web? Key webinar takeaways - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordsecurity.com\\\/blog\\\/dark-web-webinar-takeaways#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordsecurity.com\\\/blog\\\/dark-web-webinar-takeaways#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/a16d08b9cf\\\/least-privilege.png\\\/m\\\/1080x0\\\/filters:quality(75)\",\"datePublished\":\"2024-05-25T07:32:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordsecurity.com\\\/blog\\\/dark-web-webinar-takeaways#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordsecurity.com\\\/blog\\\/dark-web-webinar-takeaways\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/nordsecurity.com\\\/blog\\\/dark-web-webinar-takeaways#primaryimage\",\"url\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/a16d08b9cf\\\/least-privilege.png\\\/m\\\/1080x0\\\/filters:quality(75)\",\"contentUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/a16d08b9cf\\\/least-privilege.png\\\/m\\\/1080x0\\\/filters:quality(75)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordsecurity.com\\\/blog\\\/dark-web-webinar-takeaways#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Is your company data on the dark web? Key webinar takeaways\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Is your company data on the dark web? Key webinar takeaways - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordsecurity.com\/blog\/dark-web-webinar-takeaways","og_locale":"zh_HK","og_type":"article","og_title":"Is your company data on the dark web? Key webinar takeaways - Version 2","og_description":"In cybersecurity, the principle of least privilege (PoL [&hellip;]","og_url":"https:\/\/nordsecurity.com\/blog\/dark-web-webinar-takeaways","og_site_name":"Version 2","article_published_time":"2024-05-25T07:32:05+00:00","og_image":[{"url":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/a16d08b9cf\/least-privilege.png\/m\/1080x0\/filters:quality(75)","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"9 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordsecurity.com\/blog\/dark-web-webinar-takeaways#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/05\/is-your-company-data-on-the-dark-web-key-webinar-takeaways\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Is your company data on the dark web? Key webinar takeaways","datePublished":"2024-05-25T07:32:05+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/05\/is-your-company-data-on-the-dark-web-key-webinar-takeaways\/"},"wordCount":1535,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordsecurity.com\/blog\/dark-web-webinar-takeaways#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/a16d08b9cf\/least-privilege.png\/m\/1080x0\/filters:quality(75)","keywords":["Nord Security","NordPass","2024"],"articleSection":["Nord Security","NordPass","2024","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/05\/is-your-company-data-on-the-dark-web-key-webinar-takeaways\/","url":"https:\/\/nordsecurity.com\/blog\/dark-web-webinar-takeaways","name":"Is your company data on the dark web? Key webinar takeaways - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordsecurity.com\/blog\/dark-web-webinar-takeaways#primaryimage"},"image":{"@id":"https:\/\/nordsecurity.com\/blog\/dark-web-webinar-takeaways#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/a16d08b9cf\/least-privilege.png\/m\/1080x0\/filters:quality(75)","datePublished":"2024-05-25T07:32:05+00:00","breadcrumb":{"@id":"https:\/\/nordsecurity.com\/blog\/dark-web-webinar-takeaways#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordsecurity.com\/blog\/dark-web-webinar-takeaways"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/nordsecurity.com\/blog\/dark-web-webinar-takeaways#primaryimage","url":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/a16d08b9cf\/least-privilege.png\/m\/1080x0\/filters:quality(75)","contentUrl":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/a16d08b9cf\/least-privilege.png\/m\/1080x0\/filters:quality(75)"},{"@type":"BreadcrumbList","@id":"https:\/\/nordsecurity.com\/blog\/dark-web-webinar-takeaways#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"Is your company data on the dark web? Key webinar takeaways"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-kq6","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/78498","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=78498"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/78498\/revisions"}],"predecessor-version":[{"id":78502,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/78498\/revisions\/78502"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=78498"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=78498"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=78498"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}