{"id":6991,"date":"2025-04-11T12:32:21","date_gmt":"2025-04-11T19:32:21","guid":{"rendered":"https:\/\/objectsecurity.com\/?p=6991"},"modified":"2025-10-23T13:38:05","modified_gmt":"2025-10-23T20:38:05","slug":"rsac-2025","status":"publish","type":"post","link":"https:\/\/objectsecurity.com\/rsac-2025\/","title":{"rendered":"Fortifying the AI Supply Chain &#8211; RSAC 2025"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1872px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p><span>ObjectSecurity will be presenting at RSA Conference 2025 on Thursday, May 1, covering two critical topics at the intersection of AI security and binary analysis. Our main session, Fortifying the AI Supply Chain: Ensuring Trust from Data to Deployment,\u201d will explore vulnerabilities that arise throughout the AI development lifecycle &#8211; from data sourcing and model training to deployment. We\u2019ll demonstrate real-world threats such as data poisoning and model tampering, and share practical strategies for securing AI systems end-to-end to ensure trustworthiness at every stage. <\/span><\/p>\n<p><span>Later in the day, we\u2019ll lead a Birds of a Feather session titled \u201cExploring Symbolic Execution: Strengths, Limitations &amp; Future Directions.\u201d This discussion will focus on symbolic execution as a tool for vulnerability discovery, highlighting its capabilities and challenges, including state explosion, scalability, and path exploration. We\u2019ll also explore how advances in automation are expanding its role in modern binary analysis. <\/span><\/p>\n<p><span>Both sessions reflect ObjectSecurity\u2019s continued work on securing complex, mission-critical systems\u2014whether through robust AI supply chain security or advanced reverse engineering techniques. We look forward to engaging with the security community and contributing to important conversations shaping the future of cybersecurity.<\/span><\/p>\n<\/div><div class=\"fusion-image-element \" style=\"text-align:center;--awb-margin-bottom:50px;--awb-max-width:600px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"1024\" height=\"1024\" title=\"RSAC 2025 Speaker Icon 4\" src=\"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/04\/RSAC-2025-Speaker-Icon-4.jpg?resize=1024%2C1024&#038;ssl=1\" alt class=\"img-responsive wp-image-6992\" srcset=\"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/04\/RSAC-2025-Speaker-Icon-4.jpg?resize=66%2C66&amp;ssl=1 66w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/04\/RSAC-2025-Speaker-Icon-4.jpg?resize=100%2C100&amp;ssl=1 100w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/04\/RSAC-2025-Speaker-Icon-4.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/04\/RSAC-2025-Speaker-Icon-4.jpg?resize=177%2C177&amp;ssl=1 177w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/04\/RSAC-2025-Speaker-Icon-4.jpg?resize=200%2C200&amp;ssl=1 200w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/04\/RSAC-2025-Speaker-Icon-4.jpg?resize=300%2C300&amp;ssl=1 300w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/04\/RSAC-2025-Speaker-Icon-4.jpg?resize=320%2C320&amp;ssl=1 320w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/04\/RSAC-2025-Speaker-Icon-4.jpg?resize=400%2C400&amp;ssl=1 400w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/04\/RSAC-2025-Speaker-Icon-4.jpg?resize=460%2C460&amp;ssl=1 460w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/04\/RSAC-2025-Speaker-Icon-4.jpg?resize=500%2C500&amp;ssl=1 500w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/04\/RSAC-2025-Speaker-Icon-4.jpg?resize=540%2C540&amp;ssl=1 540w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/04\/RSAC-2025-Speaker-Icon-4.jpg?resize=600%2C600&amp;ssl=1 600w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/04\/RSAC-2025-Speaker-Icon-4.jpg?resize=669%2C669&amp;ssl=1 669w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/04\/RSAC-2025-Speaker-Icon-4.jpg?resize=700%2C700&amp;ssl=1 700w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/04\/RSAC-2025-Speaker-Icon-4.jpg?resize=768%2C768&amp;ssl=1 768w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/04\/RSAC-2025-Speaker-Icon-4.jpg?resize=800%2C800&amp;ssl=1 800w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/04\/RSAC-2025-Speaker-Icon-4.jpg?resize=940%2C940&amp;ssl=1 940w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/04\/RSAC-2025-Speaker-Icon-4.jpg?resize=1024%2C1024&amp;ssl=1 1024w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/04\/RSAC-2025-Speaker-Icon-4.jpg?fit=1080%2C1080&amp;ssl=1 1080w\" sizes=\"(max-width: 1075px) 100vw, (max-width: 640px) 100vw, 1024px\" \/><\/span><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;width:100%;\"><div class=\"fusion-separator-border sep-double\" style=\"--awb-height:20px;--awb-amount:20px;border-color:var(--awb-color3);border-top-width:1px;border-bottom-width:1px;\"><\/div><\/div><div class=\"fusion-video fusion-youtube\" style=\"--awb-max-width:1050px;--awb-max-height:597px;--awb-align-self:center;--awb-width:100%;\"><div class=\"video-shortcode\"><lite-youtube videoid=\"o4PxKBWFsd0\" class=\"landscape\" params=\"wmode=transparent&autoplay=1&amp;rel=0&amp;showinfo=0&enablejsapi=1\" title=\"YouTube video player 1\" width=\"1050\" height=\"597\" data-thumbnail-size=\"auto\"><\/lite-youtube><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-xlarge button-default fusion-button-default button-1 fusion-button-span-yes fusion-button-default-type\" target=\"_self\" href=\"https:\/\/path.rsaconference.com\/flow\/rsac\/us25\/FullAgenda\/page\/catalog\/session\/1727288600458001ZQrA\"><span class=\"fusion-button-text\">Fortifying the AI supply Chain: Ensuring Trust from Data to Deployment<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-xlarge button-default fusion-button-default button-2 fusion-button-span-yes fusion-button-default-type\" target=\"_self\" href=\"https:\/\/path.rsaconference.com\/flow\/rsac\/us25\/FullAgenda\/page\/catalog\/session\/1740685924128001orsk\"><span class=\"fusion-button-text\">Exploring Symbolic Execution: Strengths, Limitations &amp; Future Directions<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_3 1_3 fusion-flex-column equal-height-buttons\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-xlarge button-default fusion-button-default button-3 fusion-button-span-yes fusion-button-default-type\" target=\"_self\" href=\"https:\/\/objectsecurity.com\/contact-us\/\"><span class=\"fusion-button-text\">Contact Us to Arrage a Meeting or Learn more About our Products<\/span><\/a><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":7,"featured_media":6993,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[60,63,69,70,89],"tags":[],"class_list":["post-6991","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-artificial-intelligence","category-binlens","category-company-news","category-general","category-landingpage"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Fortifying the AI Supply Chain - RSAC 2025 - ObjectSecurity<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/rsac-2025\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/rsac-2025\\\/\"},\"author\":{\"name\":\"Dan Mathews\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/14b868388b1a079ff39642a078cea62d\"},\"headline\":\"Fortifying the AI Supply Chain &#8211; RSAC 2025\",\"datePublished\":\"2025-04-11T19:32:21+00:00\",\"dateModified\":\"2025-10-23T20:38:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/rsac-2025\\\/\"},\"wordCount\":3633,\"image\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/rsac-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/RSAC-2025.png?fit=600%2C337&ssl=1\",\"articleSection\":[\"Artificial Intelligence\",\"BinLens\",\"Company News\",\"General\",\"Landing Page\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/rsac-2025\\\/\",\"url\":\"https:\\\/\\\/objectsecurity.com\\\/rsac-2025\\\/\",\"name\":\"Fortifying the AI Supply Chain - RSAC 2025 - ObjectSecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/rsac-2025\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/rsac-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/RSAC-2025.png?fit=600%2C337&ssl=1\",\"datePublished\":\"2025-04-11T19:32:21+00:00\",\"dateModified\":\"2025-10-23T20:38:05+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/14b868388b1a079ff39642a078cea62d\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/rsac-2025\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/objectsecurity.com\\\/rsac-2025\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/rsac-2025\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/RSAC-2025.png?fit=600%2C337&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/RSAC-2025.png?fit=600%2C337&ssl=1\",\"width\":600,\"height\":337},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/rsac-2025\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/objectsecurity.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fortifying the AI Supply Chain &#8211; RSAC 2025\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#website\",\"url\":\"https:\\\/\\\/objectsecurity.com\\\/\",\"name\":\"ObjectSecurity\",\"description\":\"OT\\\/ICS Asset Binary Vulnerability Analysis and Reporting\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/objectsecurity.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/14b868388b1a079ff39642a078cea62d\",\"name\":\"Dan Mathews\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g\",\"caption\":\"Dan Mathews\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fortifying the AI Supply Chain - RSAC 2025 - ObjectSecurity","robots":{"index":"noindex","follow":"follow"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/objectsecurity.com\/rsac-2025\/#article","isPartOf":{"@id":"https:\/\/objectsecurity.com\/rsac-2025\/"},"author":{"name":"Dan Mathews","@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/14b868388b1a079ff39642a078cea62d"},"headline":"Fortifying the AI Supply Chain &#8211; RSAC 2025","datePublished":"2025-04-11T19:32:21+00:00","dateModified":"2025-10-23T20:38:05+00:00","mainEntityOfPage":{"@id":"https:\/\/objectsecurity.com\/rsac-2025\/"},"wordCount":3633,"image":{"@id":"https:\/\/objectsecurity.com\/rsac-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/04\/RSAC-2025.png?fit=600%2C337&ssl=1","articleSection":["Artificial Intelligence","BinLens","Company News","General","Landing Page"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/objectsecurity.com\/rsac-2025\/","url":"https:\/\/objectsecurity.com\/rsac-2025\/","name":"Fortifying the AI Supply Chain - RSAC 2025 - ObjectSecurity","isPartOf":{"@id":"https:\/\/objectsecurity.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/objectsecurity.com\/rsac-2025\/#primaryimage"},"image":{"@id":"https:\/\/objectsecurity.com\/rsac-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/04\/RSAC-2025.png?fit=600%2C337&ssl=1","datePublished":"2025-04-11T19:32:21+00:00","dateModified":"2025-10-23T20:38:05+00:00","author":{"@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/14b868388b1a079ff39642a078cea62d"},"breadcrumb":{"@id":"https:\/\/objectsecurity.com\/rsac-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/objectsecurity.com\/rsac-2025\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/objectsecurity.com\/rsac-2025\/#primaryimage","url":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/04\/RSAC-2025.png?fit=600%2C337&ssl=1","contentUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/04\/RSAC-2025.png?fit=600%2C337&ssl=1","width":600,"height":337},{"@type":"BreadcrumbList","@id":"https:\/\/objectsecurity.com\/rsac-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/objectsecurity.com\/"},{"@type":"ListItem","position":2,"name":"Fortifying the AI Supply Chain &#8211; RSAC 2025"}]},{"@type":"WebSite","@id":"https:\/\/objectsecurity.com\/#website","url":"https:\/\/objectsecurity.com\/","name":"ObjectSecurity","description":"OT\/ICS Asset Binary Vulnerability Analysis and Reporting","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/objectsecurity.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/14b868388b1a079ff39642a078cea62d","name":"Dan Mathews","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g","caption":"Dan Mathews"}}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/04\/RSAC-2025.png?fit=600%2C337&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/6991","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/comments?post=6991"}],"version-history":[{"count":15,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/6991\/revisions"}],"predecessor-version":[{"id":7420,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/6991\/revisions\/7420"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/media\/6993"}],"wp:attachment":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/media?parent=6991"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/categories?post=6991"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/tags?post=6991"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}