{"id":4792,"date":"2021-11-02T08:32:38","date_gmt":"2021-11-02T13:32:38","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=4792"},"modified":"2021-11-02T08:32:38","modified_gmt":"2021-11-02T13:32:38","slug":"what-is-cloud-security-posture-management","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-cloud-security-posture-management\/","title":{"rendered":"What the Heck Is CSPM, Anyway?"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignleft size-medium wp-image-4793\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/11\/cloud-security-stratosphere-300x200.jpg\" alt=\"A hand with a cloud hovering over it containing a glowing security shield. \" width=\"300\" height=\"200\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/11\/cloud-security-stratosphere-300x200.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/11\/cloud-security-stratosphere-1024x683.jpg 1024w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/11\/cloud-security-stratosphere-768x512.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/11\/cloud-security-stratosphere-1536x1024.jpg 1536w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/11\/cloud-security-stratosphere-2048x1365.jpg 2048w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/11\/cloud-security-stratosphere-200x133.jpg 200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>I was chatting with a fellow CISO recently, and we were talking about what we saw as the greatest concern for our organizations. Without hesitation, his answer was &#8220;Cloud security!&#8221; \u2013 and I can&#8217;t say that I disagree. Our conversation then turned to the methods and strategies for what has commonly become known as cloud security posture management (CSPM). So is CSPM just a buzzword for cloud security? Well, kind of. Cloud security posture management refers to tools and processes that remediate cloud vulnerabilities created by misconfiguration, mismanagement, and other kinds of errors, according to\u00a0<a class=\"external-link external external_icon\" href=\"https:\/\/www.gartner.com\/en\/documents\/3899373\/innovation-insight-for-cloud-security-posture-management\" target=\"_blank\" rel=\"nofollow noopener\">Gartner Research<\/a>. So it&#8217;s really a more holistic approach to cloud security, GRC, configuration standards, and other key domains of an organization&#8217;s cloud footprint to ensure a cohesive approach to all facets of monitoring, configuration, and management.<\/p>\n<p>At a time when businesses rely on\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/cloud-consulting-services.html\" target=\"_blank\" rel=\"nofollow noopener\">cloud solutions<\/a>\u00a0more than ever to facilitate\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/why-your-business-needs-a-secure-remote-work-strategy-to-survive\/\" target=\"_blank\" rel=\"nofollow noopener\">remote<\/a>\u00a0and\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/why-zero-trust-has-become-the-go-to-framework-in-todays-world-of-hybrid-work\/\" target=\"_blank\" rel=\"nofollow noopener\">hybrid work<\/a>, it&#8217;s no surprise that security professionals find themselves grappling with related challenges. When asked about public cloud security, 96 percent of cybersecurity professionals describe themselves as at least moderately concerned, according to the\u00a0<a class=\"external-link external external_icon\" href=\"https:\/\/www.isc2.org\/Landing\/cloud-security-report\" target=\"_blank\" rel=\"nofollow noopener\">2021 Cloud Security Report<\/a>\u00a0from (ISC)\u00b2. About half (52 percent) of those surveyed are only moderately confident in their company&#8217;s cloud security posture, while 20 percent are either slightly or not at all confident. The report lists data loss, accidental credential exposure and data confidentiality issues as security pros&#8217; top cloud security worries.<\/p>\n<p>If you similarly doubt your ability to maintain optimal cloud security, you might want to consider working with a managed security service provider (MSSP) on posture management, especially if you have a multi-cloud strategy and plan to increase your reliance on cloud solutions in the future.<\/p>\n<h2>Why Businesses Need to Focus on Cloud Security Posture Management<\/h2>\n<p>Even before the crisis-driven shift to remote work in 2020, many companies already relied heavily on cloud computing. The\u00a0<a class=\"external-link external external_icon\" href=\"https:\/\/resources.flexera.com\/web\/media\/documents\/rightscale-2019-state-of-the-cloud-report-from-flexera.pdf\" target=\"_blank\" rel=\"nofollow noopener\">2019 RightScale State of the Cloud Survey<\/a>\u00a0from Flexera found that 84 percent of enterprises had a multi-cloud strategy, and 94 percent of respondents utilized cloud solutions in general. By 2021, 92 percent of enterprises reported employing a multi-cloud approach, with 43 percent using a mix of various public and private options,\u00a0<a class=\"external-link external external_icon\" href=\"https:\/\/www.flexera.com\/blog\/cloud\/cloud-computing-trends-2021-state-of-the-cloud-report\/\" target=\"_blank\" rel=\"nofollow noopener\">Flexera found<\/a>.<\/p>\n<p>While migrating to the cloud comes with advantages such as greater accessibility, it also complicates cybersecurity. The majority (81 percent) of security professionals attempting to safeguard cloud environments have found that traditional network security solutions are only partially effective or completely useless, according to\u00a0(ISC)\u00b2.<\/p>\n<p>Cloud misconfigurations\u00a0\u2013 which occur when cloud users select settings that don&#8217;t deliver the necessary level of data security\u00a0\u2013 have become a common issue that bad actors exploit to gain access to sensitive information, according to the Security Intelligence article &#8220;<a class=\"external-link external external_icon\" href=\"https:\/\/securityintelligence.com\/articles\/misconfigurations-hidden-threat-to-cloud-data\/\" target=\"_blank\" rel=\"nofollow noopener\">Misconfigurations: A Hidden but Preventable Threat to Cloud Data<\/a>.&#8221; In 2018 and 2019, data breaches that resulted from misconfigurations cost companies almost $5 trillion globally, the\u00a0<a class=\"external-link external external_icon\" href=\"https:\/\/divvycloud.com\/wp-content\/uploads\/2020\/02\/Cloud-Misconfiguration-Report-FINAL.pdf\" target=\"_blank\" rel=\"nofollow noopener\">2020 Cloud Misconfigurations Report<\/a>\u00a0from DivvyCloud states.<\/p>\n<p>Other serious threats to public cloud security include insecure APIs, exfiltration of private data, and unauthorized access, according to\u00a0(ISC)\u00b2. Overall, when it comes to protecting cloud environments, cybersecurity professionals have plenty to worry about.<\/p>\n<h2>The Advantages of Partnering with a Managed Security Service Provider for CSPM<\/h2>\n<p>If you&#8217;re concerned about your current cloud security posture management strategy and want to make work less stressful for your internal staff, working with\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/managed-security-service-provider.html\" target=\"_blank\" rel=\"nofollow noopener\">an MSSP<\/a>\u00a0like Stratosphere Networks can make a significant difference. We can deploy and oversee the operation of advanced CSPM tools that deliver the following advantages and capabilities:<\/p>\n<ul>\n<li>Visibility across multiple cloud solutions (including Azure, AWS,\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/google-cloud.html\" target=\"_blank\" rel=\"nofollow noopener\">Google Cloud<\/a>, and Kubernetes)<\/li>\n<li>Ongoing analysis and profiling of security risks<\/li>\n<li>Over-privileged access identification<\/li>\n<li>Automatic\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/managed-compliance-services.html\" target=\"_blank\" rel=\"nofollow noopener\">compliance<\/a>\u00a0assessments<\/li>\n<li>Integration with SIEM and DevOps solutions<\/li>\n<li>Cost optimization features<\/li>\n<li>Network\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/managed-detection-and-response.html\" target=\"_blank\" rel=\"nofollow noopener\">managed detection and response (MDR)<\/a>\u00a0supported by\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/security-operations-center-as-a-service.html\" target=\"_blank\" rel=\"nofollow noopener\">Security Operations Center as a Service (SOCaaS)<\/a><\/li>\n<\/ul>\n<p>Cloud security posture management is bound to become a bigger issue for businesses in 2022 and beyond. Now is the time to invest if you aren&#8217;t confident in your current ability to prevent and respond to cloud-related breaches.<\/p>\n<p>If you have any questions, our security team can assist you. Just give us a call at\u00a0877-599-3999 or email\u00a0<a class=\"external-link\" href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"nofollow noopener\">sales@stratospherenetworks.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I was chatting with a fellow CISO recently, and we were talking about what we saw as the greatest concern for our organizations. Without hesitation, his answer was &#8220;Cloud security!&#8221; \u2013 and I can&#8217;t say that I disagree. Our conversation &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-cloud-security-posture-management\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":4793,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[263],"tags":[],"class_list":["post-4792","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-corner"],"yoast_head":"<title>How to Stay on Top of Cloud Security Posture Management<\/title>\n<meta name=\"description\" content=\"Cloud security posture management (CSPM) has become a pressing issue for many businesses as they rely increasingly on hosted solutions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-cloud-security-posture-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Stay on Top of Cloud Security Posture Management\" \/>\n<meta property=\"og:description\" content=\"Cloud security posture management (CSPM) has become a pressing issue for many businesses as they rely increasingly on hosted solutions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-cloud-security-posture-management\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-02T13:32:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/11\/cloud-security-stratosphere.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2121\" \/>\n\t<meta property=\"og:image:height\" content=\"1414\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kevin Rubin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kevin Rubin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-cloud-security-posture-management\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-cloud-security-posture-management\/\"},\"author\":{\"name\":\"Kevin Rubin\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"headline\":\"What the Heck Is CSPM, Anyway?\",\"datePublished\":\"2021-11-02T13:32:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-cloud-security-posture-management\/\"},\"wordCount\":680,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-cloud-security-posture-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/11\/cloud-security-stratosphere.jpg\",\"articleSection\":[\"Cyber Corner\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-cloud-security-posture-management\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-cloud-security-posture-management\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-cloud-security-posture-management\/\",\"name\":\"How to Stay on Top of Cloud Security Posture Management\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-cloud-security-posture-management\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-cloud-security-posture-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/11\/cloud-security-stratosphere.jpg\",\"datePublished\":\"2021-11-02T13:32:38+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"description\":\"Cloud security posture management (CSPM) has become a pressing issue for many businesses as they rely increasingly on hosted solutions.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-cloud-security-posture-management\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-cloud-security-posture-management\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-cloud-security-posture-management\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/11\/cloud-security-stratosphere.jpg\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/11\/cloud-security-stratosphere.jpg\",\"width\":2121,\"height\":1414,\"caption\":\"A hand with a cloud hovering over it containing a glowing security shield.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-cloud-security-posture-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What the Heck Is CSPM, Anyway?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\",\"name\":\"Kevin Rubin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"caption\":\"Kevin Rubin\"},\"sameAs\":[\"http:\/\/stratospherenetworks.com\/\"],\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/\"}]}<\/script>","yoast_head_json":{"title":"How to Stay on Top of Cloud Security Posture Management","description":"Cloud security posture management (CSPM) has become a pressing issue for many businesses as they rely increasingly on hosted solutions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-cloud-security-posture-management\/","og_locale":"en_US","og_type":"article","og_title":"How to Stay on Top of Cloud Security Posture Management","og_description":"Cloud security posture management (CSPM) has become a pressing issue for many businesses as they rely increasingly on hosted solutions.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-cloud-security-posture-management\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2021-11-02T13:32:38+00:00","og_image":[{"width":2121,"height":1414,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/11\/cloud-security-stratosphere.jpg","type":"image\/jpeg"}],"author":"Kevin Rubin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kevin Rubin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-cloud-security-posture-management\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-cloud-security-posture-management\/"},"author":{"name":"Kevin Rubin","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"headline":"What the Heck Is CSPM, Anyway?","datePublished":"2021-11-02T13:32:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-cloud-security-posture-management\/"},"wordCount":680,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-cloud-security-posture-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/11\/cloud-security-stratosphere.jpg","articleSection":["Cyber Corner"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/what-is-cloud-security-posture-management\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-cloud-security-posture-management\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-cloud-security-posture-management\/","name":"How to Stay on Top of Cloud Security Posture Management","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-cloud-security-posture-management\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-cloud-security-posture-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/11\/cloud-security-stratosphere.jpg","datePublished":"2021-11-02T13:32:38+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"description":"Cloud security posture management (CSPM) has become a pressing issue for many businesses as they rely increasingly on hosted solutions.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-cloud-security-posture-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/what-is-cloud-security-posture-management\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-cloud-security-posture-management\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/11\/cloud-security-stratosphere.jpg","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/11\/cloud-security-stratosphere.jpg","width":2121,"height":1414,"caption":"A hand with a cloud hovering over it containing a glowing security shield."},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-cloud-security-posture-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What the Heck Is CSPM, Anyway?"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5","name":"Kevin Rubin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","caption":"Kevin Rubin"},"sameAs":["http:\/\/stratospherenetworks.com\/"],"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4792","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=4792"}],"version-history":[{"count":2,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4792\/revisions"}],"predecessor-version":[{"id":4795,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4792\/revisions\/4795"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/4793"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=4792"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=4792"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=4792"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}