{"id":5247,"date":"2016-05-30T17:11:51","date_gmt":"2016-05-31T00:11:51","guid":{"rendered":"https:\/\/objectsecurity.com\/?page_id=5247"},"modified":"2024-08-07T15:08:11","modified_gmt":"2024-08-07T22:08:11","slug":"securemiddleware","status":"publish","type":"post","link":"https:\/\/objectsecurity.com\/securemiddleware\/","title":{"rendered":"ObjectSecurity maintains mature SecureMiddleware\u2122 legacy CORBA technologies"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-margin-top:60px;--awb-margin-bottom:10px;--awb-flex-wrap:nowrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1872px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-content-alignment:center;--awb-font-size:32px;--awb-line-height:1.8;--awb-letter-spacing:-0.012em;--awb-text-color:var(--awb-custom_color_1);--awb-text-font-family:&quot;Inter&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p style=\"text-align: center;\"><strong>SecureMiddleware<br \/>\n<\/strong><\/p>\n<\/div><div class=\"fusion-text fusion-text-2\" style=\"--awb-content-alignment:center;\"><h3 style=\"text-align: left;\">SecureMiddleware is\u00a0a sophisticated secure, model-driven open source CORBA based middleware platform with security extensions. SecureMiddleware works out of the box with <a href=\"https:\/\/www.objectsecurity.com\/about-openpmf\/\">OpenPMF<\/a>, our unique model-driven security policy automation technology. OpenPMF automates ABAC, RBAC &amp; more.<\/h3>\n<h3 style=\"text-align: left;\">Secure MICO CORBA<\/h3>\n<ul style=\"text-align: left;\">\n<li>Secure MICO CORBA is\u00a0a mature, very stable, fully-compliant open source CORBA ORB with security extensions.<\/li>\n<li>ObjectSecurity&#8217;s highly skilled &amp; experienced CORBA security specialists provide technical support, development and consulting<\/li>\n<li>ObjectSecurity is the official project maintainer since 2000<\/li>\n<li>GNU open source license<\/li>\n<li>&#8220;CORBA compliant&#8221; (Open Group)<\/li>\n<li>Many security features<\/li>\n<li><a href=\"https:\/\/www.objectsecurity.com\/supported-technologies\/\">OpenPMF integration<\/a><\/li>\n<li>Many success stories and testimonials<\/li>\n<\/ul>\n<p style=\"text-align: left;\"><a href=\"https:\/\/www.objectsecurity.com\/wp-content\/uploads\/2016\/05\/mico-A4.pdf\" target=\"_blank\" rel=\"noopener\">SecureMICO Flyer (PDF)<\/a><\/p>\n<p style=\"text-align: left;\"><a href=\"http:\/\/www.mico.org\" target=\"_blank\" rel=\"noopener\">Official MICO site<\/a><\/p>\n<\/div><div class=\"fusion-text fusion-text-3\" style=\"--awb-content-alignment:center;--awb-font-size:32px;--awb-line-height:1.8;--awb-letter-spacing:-0.012em;--awb-text-color:var(--awb-custom_color_1);--awb-text-font-family:&quot;Inter&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p style=\"text-align: center;\"><strong>ObjectWall<br \/>\n<\/strong><\/p>\n<\/div><div class=\"fusion-text fusion-text-4\" style=\"--awb-content-alignment:center;\"><p style=\"text-align: left;\"><strong>ObjectWall is a proxy firewall developed specifically for the IIOP prototcol.<\/strong><\/p>\n<ul style=\"text-align: left;\">\n<li>Allows full IIOP network traffic across the boundary without exposing IT systems and applications to security risk, whilst also ensuring application protection<\/li>\n<li>IIOP prototcol proxy firewall for EJB and IIOP-SOA environment, e.g. s EJB, CORBA, J2EE, CCM and .NET.<\/li>\n<li>Supports the complete IIOP protocol functionality<\/li>\n<li>Optimal request filtering, e.g. expose only subsets of interfaces to partners.<\/li>\n<li>Usable as a bridge between secure IIOP and unencrypted IIOP, or to protect security unaware applications.<\/li>\n<li>Blocks malformed IIOP traffic, full message rewriting<\/li>\n<li>Extremely robust implementation<\/li>\n<li><a href=\"https:\/\/www.objectsecurity.com\/supported-technologies\/\">OpenPMF policy management integration<\/a> (or stand-alone admin)<\/li>\n<\/ul>\n<p style=\"text-align: left;\"><a href=\"https:\/\/www.objectsecurity.com\/wp-content\/uploads\/2016\/05\/owall-A4.pdf\" target=\"_blank\" rel=\"noopener\">ObjectWall brochure (PDF)<\/a><\/p>\n<\/div><div class=\"fusion-text fusion-text-5\" style=\"--awb-content-alignment:center;--awb-font-size:32px;--awb-line-height:1.8;--awb-letter-spacing:-0.012em;--awb-text-color:var(--awb-custom_color_1);--awb-text-font-family:&quot;Inter&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p style=\"text-align: center;\"><strong>SimulateWorld<br \/>\n<\/strong><\/p>\n<\/div><div class=\"fusion-text fusion-text-6\" style=\"--awb-content-alignment:center;\"><p style=\"text-align: left;\"><strong><span class=\"title_center\">SimulateWorld\u2122 is a 4D model driven synthetic rapid prototyping, testing, and simulation environment<\/span><\/strong><\/p>\n<p style=\"text-align: left;\">SimulateWorld\u2122 is a 4D (3D + time) virtual reality simulation and rapid prototyping synthetic environment for secure information sharing. It is \u201cmodel-driven\u201d, i.e. both system configurations and security policies can be automatically generated using model-driven engineering and OpenPMF model-driven security. It can be flexibly deployed on most runtime COTS &amp; open source infrastructure, including SecureMiddleware, Web services, JMS, DDS, and HLA.<\/p>\n<p style=\"text-align: left;\"><strong>Integrates technologies in the same way the real world is integrated<\/strong><\/p>\n<p style=\"text-align: left;\">Various virtual sensor types are available, such as radars and vehicle positions, and other sensor types can be flexibly added as plug-ins. Furthermore, objects in the virtual world can be remote-controlled via the same middleware to allow the simulation of human behaviour (e.g. aircraft pilots) and events. SimulateWorld can run across the internet for larger collaborations or on the intranet for local simulations. One of the intended uses of SimulateWorld is the demonstration of secure information integration prototypes before they get deployed in the real world.<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/www.objectsecurity.com\/wp-content\/uploads\/2016\/05\/simulateworld-A4.pdf\" target=\"_blank\" rel=\"noopener\">SimulateWorld brochure (PDF)<\/a><\/p>\n<\/div><\/div><\/div><\/div><\/div><div id=\"openpmf-buttons\" class=\"fusion-container-anchor\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:30px;--awb-padding-bottom:30px;--awb-background-color:#ffffff;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1872px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-7\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_4 1_4 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:25%;--awb-margin-top-large:0px;--awb-spacing-right-large:7.68%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:7.68%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-xlarge button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"https:\/\/objectsecurity.com\/contact-us\/?reference=I%27m%20interested%20in%20SecureMiddleware%20and%20MICO%20and%20ObjectWall\"><span class=\"fusion-button-text\">Contact Us for More<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_4 1_4 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:25%;--awb-margin-top-large:0px;--awb-spacing-right-large:7.68%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:7.68%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-xlarge button-default fusion-button-default button-2 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"http:\/\/www.mico.org\/\"><span class=\"fusion-button-text\">MICO CORBA<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-8\"><\/div><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":9,"featured_media":4672,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-5247","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ObjectSecurity maintains mature SecureMiddleware\u2122 legacy CORBA technologies - ObjectSecurity<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/securemiddleware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/securemiddleware\\\/\"},\"author\":{\"name\":\"Ulrich Lang\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/3468948fd539bb291b676a906cf17335\"},\"headline\":\"ObjectSecurity maintains mature SecureMiddleware\u2122 legacy CORBA technologies\",\"datePublished\":\"2016-05-31T00:11:51+00:00\",\"dateModified\":\"2024-08-07T22:08:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/securemiddleware\\\/\"},\"wordCount\":4382,\"image\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/securemiddleware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/castle-538722_1920-600x337-1.png?fit=600%2C337&ssl=1\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/securemiddleware\\\/\",\"url\":\"https:\\\/\\\/objectsecurity.com\\\/securemiddleware\\\/\",\"name\":\"ObjectSecurity maintains mature SecureMiddleware\u2122 legacy CORBA technologies - ObjectSecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/securemiddleware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/securemiddleware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/castle-538722_1920-600x337-1.png?fit=600%2C337&ssl=1\",\"datePublished\":\"2016-05-31T00:11:51+00:00\",\"dateModified\":\"2024-08-07T22:08:11+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/3468948fd539bb291b676a906cf17335\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/securemiddleware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/objectsecurity.com\\\/securemiddleware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/securemiddleware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/castle-538722_1920-600x337-1.png?fit=600%2C337&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/castle-538722_1920-600x337-1.png?fit=600%2C337&ssl=1\",\"width\":600,\"height\":337},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/securemiddleware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/objectsecurity.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ObjectSecurity maintains mature SecureMiddleware\u2122 legacy CORBA technologies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#website\",\"url\":\"https:\\\/\\\/objectsecurity.com\\\/\",\"name\":\"ObjectSecurity\",\"description\":\"OT\\\/ICS Asset Binary Vulnerability Analysis and Reporting\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/objectsecurity.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/3468948fd539bb291b676a906cf17335\",\"name\":\"Ulrich Lang\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1becd5ccdeae7ade89a377820868a7789a2e3978f998ef8cb6d5b817c9a63a45?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1becd5ccdeae7ade89a377820868a7789a2e3978f998ef8cb6d5b817c9a63a45?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1becd5ccdeae7ade89a377820868a7789a2e3978f998ef8cb6d5b817c9a63a45?s=96&d=mm&r=g\",\"caption\":\"Ulrich Lang\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ObjectSecurity maintains mature SecureMiddleware\u2122 legacy CORBA technologies - ObjectSecurity","robots":{"index":"noindex","follow":"follow"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/objectsecurity.com\/securemiddleware\/#article","isPartOf":{"@id":"https:\/\/objectsecurity.com\/securemiddleware\/"},"author":{"name":"Ulrich Lang","@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/3468948fd539bb291b676a906cf17335"},"headline":"ObjectSecurity maintains mature SecureMiddleware\u2122 legacy CORBA technologies","datePublished":"2016-05-31T00:11:51+00:00","dateModified":"2024-08-07T22:08:11+00:00","mainEntityOfPage":{"@id":"https:\/\/objectsecurity.com\/securemiddleware\/"},"wordCount":4382,"image":{"@id":"https:\/\/objectsecurity.com\/securemiddleware\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/04\/castle-538722_1920-600x337-1.png?fit=600%2C337&ssl=1","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/objectsecurity.com\/securemiddleware\/","url":"https:\/\/objectsecurity.com\/securemiddleware\/","name":"ObjectSecurity maintains mature SecureMiddleware\u2122 legacy CORBA technologies - ObjectSecurity","isPartOf":{"@id":"https:\/\/objectsecurity.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/objectsecurity.com\/securemiddleware\/#primaryimage"},"image":{"@id":"https:\/\/objectsecurity.com\/securemiddleware\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/04\/castle-538722_1920-600x337-1.png?fit=600%2C337&ssl=1","datePublished":"2016-05-31T00:11:51+00:00","dateModified":"2024-08-07T22:08:11+00:00","author":{"@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/3468948fd539bb291b676a906cf17335"},"breadcrumb":{"@id":"https:\/\/objectsecurity.com\/securemiddleware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/objectsecurity.com\/securemiddleware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/objectsecurity.com\/securemiddleware\/#primaryimage","url":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/04\/castle-538722_1920-600x337-1.png?fit=600%2C337&ssl=1","contentUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/04\/castle-538722_1920-600x337-1.png?fit=600%2C337&ssl=1","width":600,"height":337},{"@type":"BreadcrumbList","@id":"https:\/\/objectsecurity.com\/securemiddleware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/objectsecurity.com\/"},{"@type":"ListItem","position":2,"name":"ObjectSecurity maintains mature SecureMiddleware\u2122 legacy CORBA technologies"}]},{"@type":"WebSite","@id":"https:\/\/objectsecurity.com\/#website","url":"https:\/\/objectsecurity.com\/","name":"ObjectSecurity","description":"OT\/ICS Asset Binary Vulnerability Analysis and Reporting","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/objectsecurity.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/3468948fd539bb291b676a906cf17335","name":"Ulrich Lang","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/1becd5ccdeae7ade89a377820868a7789a2e3978f998ef8cb6d5b817c9a63a45?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1becd5ccdeae7ade89a377820868a7789a2e3978f998ef8cb6d5b817c9a63a45?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1becd5ccdeae7ade89a377820868a7789a2e3978f998ef8cb6d5b817c9a63a45?s=96&d=mm&r=g","caption":"Ulrich Lang"}}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/04\/castle-538722_1920-600x337-1.png?fit=600%2C337&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/5247","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/comments?post=5247"}],"version-history":[{"count":11,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/5247\/revisions"}],"predecessor-version":[{"id":6118,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/5247\/revisions\/6118"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/media\/4672"}],"wp:attachment":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/media?parent=5247"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/categories?post=5247"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/tags?post=5247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}