{"id":3730,"date":"2016-10-11T17:04:15","date_gmt":"2016-10-11T17:04:15","guid":{"rendered":"http:\/\/staging.nsfocusglobal.com\/?p=3730"},"modified":"2016-10-11T17:04:15","modified_gmt":"2016-10-11T17:04:15","slug":"threat-intelligence-cant-complete-picture-dont-missing-piece","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/threat-intelligence-cant-complete-picture-dont-missing-piece\/","title":{"rendered":"Threat Intelligence &#8211; You can\u2019t complete the picture, if you don\u2019t have the missing piece."},"content":{"rendered":"<p><em><strong>Author: Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS<\/strong><\/em><\/p>\n<p>Over the last year, the cybersecurity industry has been abuzz about this new thing called \u201cthreat intelligence\u201d.  However, threat intelligence (intel) as a whole is not really that new.   Threat intel was probably used in every military-like campaign going back to the rise of the great civilizations over 6000 years ago \u2013 and likely even before that. Its use is even documented in some of the world\u2019s oldest writings.   It makes complete sense to gain as much insight about your adversary, \u201cbefore\u201d the battle begins. So what\u2019s so interesting about threat intelligence concerning cybersecurity?<\/p>\n<p>That\u2019s actually a simple question to answer.  Today there are nearly 4.3 billion IP addresses in the world of IPv4. With the use of Network Address Translation (NAT), the number of devices connected to the Internet are even greater. IPv6 has 7.9 x 10<sup>28<\/sup> times more address space than IPv4; meaning, more-and-more devices will soon be on the Internet than ever before.  Today, there are close to 300 million domain names registered world-wide across all top-level domains.  There are likely billions of unique URLs, and it\u2019s estimated that over 18 million samples of known malware exist.  Do you know anything about the devices connected to the Internet with respect to all of the numbers just mentioned? Most likely, the answer is \u201cNO\u201d. <\/p>\n<p>Threat intelligence, by its very nature, is designed to provide insight into the IP addresses, domains, URLs, and malware mentioned above. Threat intel can consist of lists of malicious IP addresses, questionable domains and URLs, IP addresses of command &#038; control infrastructures, and even include malware hashes and signatures.  Threat intel can also include dashboards, analyst reports, advisories, alerts, common vulnerabilities and weaknesses databases, situational awareness technologies, correlation engines, and even automated policy creation on defensive technologies.  Finding a universal definition of threat intel can be pretty elusive. <\/p>\n<p>Regardless of the one\u2019s own definition, the whole point is to use the insight gained from threat intel to your advantage; putting it into action to better protect your network, applications, and users from cyber-attacks. However, there is one very important part of threat intel that must be addressed.  Do you have a complete picture of the current threat landscape your organization faces daily with your current threat intel approach?  Is there a missing piece?<\/p>\n<p>The problem most organizations face with subscriptions to commercial and open-source threat intel feeds is that unfortunately, they are missing threat intelligence from a considerable portion of the world.  Many studies indicate that up to 40 percent of the world(\u2019s) cyber-attacks originate from China.   When considering how comprehensive a threat intel feed is, many of them do not include much data from China; since the organizations providing the feeds have little visibility into the attacks that begin within the borders of China.<\/p>\n<p>If your organization consumes threat intelligence and puts intelligence into action, having data from China is the missing piece that will help complete the picture for you. Without that missing piece, how can you say you have global coverage with your current threat intel strategy; when you have no visibility into a considerable amount of the world\u2019s cyber-attacks. When evaluating what feeds to implement into your cyber-threat intel strategy, consider organizations that can provide visibility into a part of the world where a significant amount of the attacks originates.  Having a complete picture of the threat landscape your organization faces daily is the whole point of having threat intel in the first place.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2016\/03\/SBB5039.jpg\" rel=\"attachment wp-att-2189\"><img decoding=\"async\" class=\"alignleft wp-image-2189\" src=\"http:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2016\/03\/SBB5039-240x300.jpg\" alt=\"Stephen Gates\" width=\"150\" height=\"188\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/03\/SBB5039-240x300.jpg 240w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/03\/SBB5039-819x1024.jpg 819w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/03\/SBB5039-768x960.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/03\/SBB5039.jpg 1200w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p><em><strong>Steve <\/strong><\/em>is a key research intelligence analyst with NSFOCUS IBD. He has been instrumental in solving the DDoS problem for service providers, hosting providers, and enterprises in North America and abroad. Steve has more than 25 years of computer networking and security experience with an extensive background in the deployment and implementation of next-generation security solutions. In his last role, Steve served as the Chief Security Evangelist for Corero Network Security before joining the NSFOCUS team. Steve is a recognized Subject Matter Expert on DDoS attack tools and methodologies, including next-generation defense approaches. You can usually find Steve providing insight, editorial, industry thought leadership, and presentations covering the latest security topics at RSA, SecureWorld, SANs, Black Hat, IANS, ISSA, InfraGard, ISACA, etc.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Author: Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS Over the last year, the cybersecurity industry has been abuzz about this new thing called \u201cthreat intelligence\u201d. However, threat intelligence (intel) as a whole is not really that new. Threat intel was probably used in every military-like campaign going back to the rise of the great civilizations [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":35830,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3],"tags":[],"class_list":["post-3730","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Threat Intelligence - You can\u2019t complete the picture, if you don\u2019t have the missing piece. - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Threat Intelligence - You can\u2019t complete the picture, if you don\u2019t have the missing piece. - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Author: Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS Over the last year, the cybersecurity industry has been abuzz about this new thing\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/threat-intelligence-cant-complete-picture-dont-missing-piece\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-11T17:04:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/10\/SBB5039-240x300-1.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Threat Intelligence - You can\u2019t complete the picture, if you don\u2019t have the missing piece. - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Author: Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS Over the last year, the cybersecurity industry has been abuzz about this new thing\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/10\/SBB5039-240x300-1.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/threat-intelligence-cant-complete-picture-dont-missing-piece\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/threat-intelligence-cant-complete-picture-dont-missing-piece\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Threat Intelligence &#8211; You can\u2019t complete the picture, if you don\u2019t have the missing piece.\",\"datePublished\":\"2016-10-11T17:04:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/threat-intelligence-cant-complete-picture-dont-missing-piece\\\/\"},\"wordCount\":719,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/threat-intelligence-cant-complete-picture-dont-missing-piece\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/SBB5039-240x300-1.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/threat-intelligence-cant-complete-picture-dont-missing-piece\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/threat-intelligence-cant-complete-picture-dont-missing-piece\\\/\",\"name\":\"Threat Intelligence - You can\u2019t complete the picture, if you don\u2019t have the missing piece. - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/threat-intelligence-cant-complete-picture-dont-missing-piece\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/threat-intelligence-cant-complete-picture-dont-missing-piece\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/SBB5039-240x300-1.jpg\",\"datePublished\":\"2016-10-11T17:04:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/threat-intelligence-cant-complete-picture-dont-missing-piece\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/threat-intelligence-cant-complete-picture-dont-missing-piece\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/threat-intelligence-cant-complete-picture-dont-missing-piece\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/SBB5039-240x300-1.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/SBB5039-240x300-1.jpg\",\"width\":240,\"height\":300,\"caption\":\"Smiling man in suit with blue tie.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/threat-intelligence-cant-complete-picture-dont-missing-piece\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Threat Intelligence &#8211; You can\u2019t complete the picture, if you don\u2019t have the missing piece.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Threat Intelligence - You can\u2019t complete the picture, if you don\u2019t have the missing piece. - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Threat Intelligence - You can\u2019t complete the picture, if you don\u2019t have the missing piece. - NSFOCUS","og_description":"Author: Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS Over the last year, the cybersecurity industry has been abuzz about this new thing","og_url":"https:\/\/nsfocusglobal.com\/threat-intelligence-cant-complete-picture-dont-missing-piece\/","og_site_name":"NSFOCUS","article_published_time":"2016-10-11T17:04:15+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/10\/SBB5039-240x300-1.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Threat Intelligence - You can\u2019t complete the picture, if you don\u2019t have the missing piece. - NSFOCUS","twitter_description":"Author: Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS Over the last year, the cybersecurity industry has been abuzz about this new thing","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/10\/SBB5039-240x300-1.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/threat-intelligence-cant-complete-picture-dont-missing-piece\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/threat-intelligence-cant-complete-picture-dont-missing-piece\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Threat Intelligence &#8211; You can\u2019t complete the picture, if you don\u2019t have the missing piece.","datePublished":"2016-10-11T17:04:15+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/threat-intelligence-cant-complete-picture-dont-missing-piece\/"},"wordCount":719,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/threat-intelligence-cant-complete-picture-dont-missing-piece\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/10\/SBB5039-240x300-1.jpg","articleSection":["Blog"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/threat-intelligence-cant-complete-picture-dont-missing-piece\/","url":"https:\/\/nsfocusglobal.com\/threat-intelligence-cant-complete-picture-dont-missing-piece\/","name":"Threat Intelligence - You can\u2019t complete the picture, if you don\u2019t have the missing piece. - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/threat-intelligence-cant-complete-picture-dont-missing-piece\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/threat-intelligence-cant-complete-picture-dont-missing-piece\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/10\/SBB5039-240x300-1.jpg","datePublished":"2016-10-11T17:04:15+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/threat-intelligence-cant-complete-picture-dont-missing-piece\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/threat-intelligence-cant-complete-picture-dont-missing-piece\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/threat-intelligence-cant-complete-picture-dont-missing-piece\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/10\/SBB5039-240x300-1.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/10\/SBB5039-240x300-1.jpg","width":240,"height":300,"caption":"Smiling man in suit with blue tie."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/threat-intelligence-cant-complete-picture-dont-missing-piece\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Threat Intelligence &#8211; You can\u2019t complete the picture, if you don\u2019t have the missing piece."}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/3730","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=3730"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/3730\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/35830"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=3730"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=3730"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=3730"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}