{"id":4689,"date":"2021-01-22T06:11:54","date_gmt":"2021-01-22T06:11:54","guid":{"rendered":"https:\/\/techclot.com\/index.php\/2021\/01\/22\/how-network-operators-can-plug-broadband-vulnerabilities\/"},"modified":"2021-01-22T06:11:54","modified_gmt":"2021-01-22T06:11:54","slug":"how-network-operators-can-plug-broadband-vulnerabilities","status":"publish","type":"post","link":"https:\/\/techclot.com\/index.php\/2021\/01\/22\/how-network-operators-can-plug-broadband-vulnerabilities\/","title":{"rendered":"How network operators can plug broadband vulnerabilities"},"content":{"rendered":"<p><a href=\"https:\/\/www.youtube.com\/watch?v=t_a2gK8kdbU\">How network operators can plug broadband vulnerabilities<\/a><br \/>\n\t\t\t\t\t\t\t\t<iframe width=\"480\" height=\"320\" data-src=\"https:\/\/www.youtube.com\/embed\/t_a2gK8kdbU?rel=0\" frameborder=\"0\" allowfullscreen src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" data-load-mode=\"1\"><\/iframe>\t\t\t\t\t<\/p>\n<p><img data-recalc-dims=\"1\" decoding=\"async\" style=\"float:left;margin:0 5px 5px 0;\" data-src=\"https:\/\/i0.wp.com\/techclot.com\/wp-content\/uploads\/2021\/01\/MTScCS.jpg?w=640&#038;ssl=1\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" \/>Your work and home networks are routinely attacked. Marcio Avillez, SVP Networks at CUJO explains how network admins can deflect attacks and decrease threat vectors.<\/p>\n<p>Watch more Tech Stories, a running series of short documentaries from the award-winning reporters at TechRepublic: https:\/\/www.youtube.com\/playlist?list=PLlkW2NIMmzSa4voiYHQSDqTQMPFf2zQV-<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How network operators can plug broadband vulnerabilities Your work and home networks are routinely attacked&#8230;.<\/p>\n","protected":false},"author":8,"featured_media":4688,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4551],"tags":[],"class_list":["post-4689","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-video-highlights"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/techclot.com\/wp-content\/uploads\/2021\/01\/MTScCS.jpg?fit=320%2C180&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p3orZX-1dD","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/posts\/4689","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/comments?post=4689"}],"version-history":[{"count":0,"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/posts\/4689\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/media\/4688"}],"wp:attachment":[{"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/media?parent=4689"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/categories?post=4689"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/tags?post=4689"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}