{"id":6925,"date":"2025-02-28T10:10:10","date_gmt":"2025-02-28T18:10:10","guid":{"rendered":"https:\/\/objectsecurity.com\/?p=6925"},"modified":"2025-02-28T11:58:05","modified_gmt":"2025-02-28T19:58:05","slug":"p3id-case-study","status":"publish","type":"post","link":"https:\/\/objectsecurity.com\/p3id-case-study\/","title":{"rendered":"Case Study: Enhancing IoT Security Compliance with ObjectSecurity BinLens"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1872px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_3_4 3_4 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:75%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.56%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.56%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p><strong>Company:<\/strong> P3iD Technologies<br \/>\n<strong>Industry:<\/strong> Digital Transformation &amp; Security Solutions<br \/>\n<strong>Use Case:<\/strong> Automated Binary Vulnerability Analysis for IoT Security Compliance<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_4 1_4 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:25%;--awb-margin-top-large:0px;--awb-spacing-right-large:7.68%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:7.68%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"500\" height=\"268\" title=\"P3iD Logo (500 \u00d7 500 px)\" src=\"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/P3iD-Logo-500-%C3%97-500-px-e1740690350101.png?resize=500%2C268&#038;ssl=1\" alt class=\"img-responsive wp-image-6912\" srcset=\"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/P3iD-Logo-500-%C3%97-500-px-e1740690350101.png?resize=66%2C35&amp;ssl=1 66w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/P3iD-Logo-500-%C3%97-500-px-e1740690350101.png?resize=177%2C95&amp;ssl=1 177w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/P3iD-Logo-500-%C3%97-500-px-e1740690350101.png?resize=200%2C107&amp;ssl=1 200w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/P3iD-Logo-500-%C3%97-500-px-e1740690350101.png?resize=300%2C161&amp;ssl=1 300w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/P3iD-Logo-500-%C3%97-500-px-e1740690350101.png?resize=320%2C172&amp;ssl=1 320w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/P3iD-Logo-500-%C3%97-500-px-e1740690350101.png?resize=400%2C214&amp;ssl=1 400w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/P3iD-Logo-500-%C3%97-500-px-e1740690350101.png?resize=460%2C247&amp;ssl=1 460w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/P3iD-Logo-500-%C3%97-500-px-e1740690350101.png?fit=500%2C268&amp;ssl=1 500w\" sizes=\"(max-width: 1075px) 100vw, (max-width: 640px) 100vw, 400px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-2\"><p><strong>Background<\/strong><\/p>\n<p>P3iD Technologies specializes in secure digital transformation solutions, focusing on identity verification, security, and workflow automation. With the rapid adoption of network-attached document scanning devices and other IoT solutions, ensuring cybersecurity compliance has become a critical priority. In response to evolving regulations such as the U.S. Cyber Trust Mark, P3iD Technologies sought an advanced solution to enhance vulnerability analysis and regulatory preparation.<\/p>\n<p><strong>Challenge<\/strong><\/p>\n<p>IoT devices, including network-attached document scanners, often contain embedded firmware with potential security vulnerabilities. Identifying and mitigating these vulnerabilities manually is time-consuming and inefficient. P3iD Technologies needed a comprehensive, automated security analysis solution to streamline compliance efforts and proactively secure their devices against emerging cyber threats.<\/p>\n<p><strong>Solution<\/strong><\/p>\n<p>P3iD Technologies partnered with ObjectSecurity to leverage its BinLens Automated Binary Vulnerability Analysis solution. BinLens analyzes software in binary form for vulnerabilities, detecting security flaws without requiring source code access. What sets BinLens apart from other tools is that it is able to detect unpublished (potential zero-day) vulnerabilities, even in potentially unpublished code. Unlike other approaches like SAST or SBOM, BinLens\u2019s powerful \u201csymbolic execution\u201d based analysis approach produces minimal false positives by providing repeatable proofs of detected vulnerabilities. This enabled P3iD Technologies to efficiently identify vulnerabilities, prioritize risks, and implement necessary security enhancements.<\/p>\n<p><strong>Implementation<\/strong><\/p>\n<ul>\n<li>Integrated BinLens into the P3iD security evaluation framework.<\/li>\n<li>Conducted extensive vulnerability analysis on network-attached document scanning devices and other IoT hardware.<\/li>\n<li>Assessed compliance readiness for regulations such as the U.S. Cyber Trust Mark.<\/li>\n<li>Developed an automated workflow to continuously monitor and improve device security.<\/li>\n<\/ul>\n<p><strong>Results<\/strong><\/p>\n<ul>\n<li>Increased Efficiency: Automated analysis reduced vulnerability detection time by 95%.<\/li>\n<li>Improved Security Posture: Identified and mitigated high-risk, unpublished vulnerabilities before device deployment.<\/li>\n<li>Regulatory Readiness: Streamlined compliance preparation for the U.S. Cyber Trust Mark and other regulations.<\/li>\n<li>Cost Savings: Reduced the need for extensive manual security testing, optimizing resource allocation.<\/li>\n<\/ul>\n<p><strong>Conclusion<\/strong><\/p>\n<p>By adopting ObjectSecurity\u2019s BinLens technology, P3iD Technologies has significantly enhanced the security and compliance of its IoT devices. This proactive approach ensures that network-attached document scanners and other IoT solutions meet stringent cybersecurity regulations while maintaining operational efficiency. The partnership underscores the critical role of automated vulnerability analysis in safeguarding digital transformation initiatives.<\/p>\n<p>For more information, visit <a href=\"https:\/\/p3idtech.com\">https:\/\/p3idtech.com<\/a> and <a href=\"https:\/\/objectsecurity.com\">https:\/\/objectsecurity.com<\/a>.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div ><a class=\"fusion-button button-flat button-large button-default fusion-button-default button-1 fusion-button-span-yes fusion-button-default-type\" target=\"_self\" href=\"https:\/\/objectsecurity.com\"><span class=\"fusion-button-text\">BinLens &#8211; Binary Analysis<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div ><a class=\"fusion-button button-flat button-large button-default fusion-button-default button-2 fusion-button-span-yes fusion-button-default-type\" target=\"_self\" href=\"https:\/\/p3idtech.com\"><span class=\"fusion-button-text\">P3iD Technologies<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div ><a class=\"fusion-button button-flat button-large button-default fusion-button-default button-3 fusion-button-span-yes fusion-button-default-type\" target=\"_self\" href=\"https:\/\/objectsecurity.com\/contact-us\/\"><span class=\"fusion-button-text\">Contact Us<\/span><\/a><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":7,"featured_media":6928,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[63,99,87],"tags":[],"class_list":["post-6925","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-binlens","category-case-study","category-tech"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Case Study: Enhancing IoT Security Compliance with ObjectSecurity BinLens - ObjectSecurity<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/p3id-case-study\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/p3id-case-study\\\/\"},\"author\":{\"name\":\"Dan Mathews\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/14b868388b1a079ff39642a078cea62d\"},\"headline\":\"Case Study: Enhancing IoT Security Compliance with ObjectSecurity BinLens\",\"datePublished\":\"2025-02-28T18:10:10+00:00\",\"dateModified\":\"2025-02-28T19:58:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/p3id-case-study\\\/\"},\"wordCount\":4625,\"image\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/p3id-case-study\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/P3iDcs.png?fit=600%2C337&ssl=1\",\"articleSection\":[\"BinLens\",\"Case Study\",\"Technical\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/p3id-case-study\\\/\",\"url\":\"https:\\\/\\\/objectsecurity.com\\\/p3id-case-study\\\/\",\"name\":\"Case Study: Enhancing IoT Security Compliance with ObjectSecurity BinLens - ObjectSecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/p3id-case-study\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/p3id-case-study\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/P3iDcs.png?fit=600%2C337&ssl=1\",\"datePublished\":\"2025-02-28T18:10:10+00:00\",\"dateModified\":\"2025-02-28T19:58:05+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/14b868388b1a079ff39642a078cea62d\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/p3id-case-study\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/objectsecurity.com\\\/p3id-case-study\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/p3id-case-study\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/P3iDcs.png?fit=600%2C337&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/P3iDcs.png?fit=600%2C337&ssl=1\",\"width\":600,\"height\":337},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/p3id-case-study\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/objectsecurity.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Case Study: Enhancing IoT Security Compliance with ObjectSecurity BinLens\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#website\",\"url\":\"https:\\\/\\\/objectsecurity.com\\\/\",\"name\":\"ObjectSecurity\",\"description\":\"OT\\\/ICS Asset Binary Vulnerability Analysis and Reporting\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/objectsecurity.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/14b868388b1a079ff39642a078cea62d\",\"name\":\"Dan Mathews\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g\",\"caption\":\"Dan Mathews\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Case Study: Enhancing IoT Security Compliance with ObjectSecurity BinLens - ObjectSecurity","robots":{"index":"noindex","follow":"follow"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/objectsecurity.com\/p3id-case-study\/#article","isPartOf":{"@id":"https:\/\/objectsecurity.com\/p3id-case-study\/"},"author":{"name":"Dan Mathews","@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/14b868388b1a079ff39642a078cea62d"},"headline":"Case Study: Enhancing IoT Security Compliance with ObjectSecurity BinLens","datePublished":"2025-02-28T18:10:10+00:00","dateModified":"2025-02-28T19:58:05+00:00","mainEntityOfPage":{"@id":"https:\/\/objectsecurity.com\/p3id-case-study\/"},"wordCount":4625,"image":{"@id":"https:\/\/objectsecurity.com\/p3id-case-study\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/P3iDcs.png?fit=600%2C337&ssl=1","articleSection":["BinLens","Case Study","Technical"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/objectsecurity.com\/p3id-case-study\/","url":"https:\/\/objectsecurity.com\/p3id-case-study\/","name":"Case Study: Enhancing IoT Security Compliance with ObjectSecurity BinLens - ObjectSecurity","isPartOf":{"@id":"https:\/\/objectsecurity.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/objectsecurity.com\/p3id-case-study\/#primaryimage"},"image":{"@id":"https:\/\/objectsecurity.com\/p3id-case-study\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/P3iDcs.png?fit=600%2C337&ssl=1","datePublished":"2025-02-28T18:10:10+00:00","dateModified":"2025-02-28T19:58:05+00:00","author":{"@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/14b868388b1a079ff39642a078cea62d"},"breadcrumb":{"@id":"https:\/\/objectsecurity.com\/p3id-case-study\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/objectsecurity.com\/p3id-case-study\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/objectsecurity.com\/p3id-case-study\/#primaryimage","url":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/P3iDcs.png?fit=600%2C337&ssl=1","contentUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/P3iDcs.png?fit=600%2C337&ssl=1","width":600,"height":337},{"@type":"BreadcrumbList","@id":"https:\/\/objectsecurity.com\/p3id-case-study\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/objectsecurity.com\/"},{"@type":"ListItem","position":2,"name":"Case Study: Enhancing IoT Security Compliance with ObjectSecurity BinLens"}]},{"@type":"WebSite","@id":"https:\/\/objectsecurity.com\/#website","url":"https:\/\/objectsecurity.com\/","name":"ObjectSecurity","description":"OT\/ICS Asset Binary Vulnerability Analysis and Reporting","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/objectsecurity.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/14b868388b1a079ff39642a078cea62d","name":"Dan Mathews","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g","caption":"Dan Mathews"}}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/P3iDcs.png?fit=600%2C337&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/6925","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/comments?post=6925"}],"version-history":[{"count":5,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/6925\/revisions"}],"predecessor-version":[{"id":6940,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/6925\/revisions\/6940"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/media\/6928"}],"wp:attachment":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/media?parent=6925"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/categories?post=6925"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/tags?post=6925"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}