{"id":8761,"date":"2019-06-04T03:54:09","date_gmt":"2019-06-04T03:54:09","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=8761"},"modified":"2026-04-17T18:07:53","modified_gmt":"2026-04-17T18:07:53","slug":"issues-related-to-the-application-of-machine-learning-in-security-threat-scenarios","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/issues-related-to-the-application-of-machine-learning-in-security-threat-scenarios\/","title":{"rendered":"Issues Related to the Application of Machine Learning in Security Threat Scenarios"},"content":{"rendered":"<p><!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\"><br \/>\n<html><body><\/p>\n<p>At RSA 2019, as indicated by Bugra Karabey, the senior risk manager from Microsoft, artificial intelligence (AI) and machine learning (ML) technologies have found a ubiquitous application in the cybersecurity field. Currently, ML is the most popular AI technology which is extensively used. Meanwhile, people begin to think about drawbacks and even security risks of ML.<\/p>\n<p><!--more--><\/p>\n<p>Speaking at the RSA conference, Anthony J. Ferrante, an executive director of FTI Cybersecurity pointed out that currently, AI has taken such a great amount of our personal information that it can easily obtain our privacy, conduct product placement, gain our confidential access, and even seek to influence public opinion such as changing the way people cast a ballot.<\/p>\n<p>Tienne Greeff and Wicus Ross from Secure Data pointed out that AI &amp; ML is more suited to offensive than defensive applications. For example, attackers could use deep learning to bypass AI-based phishing detection, fool the image recognition system, and use reinforcement learning to launch web application attacks.<\/p>\n<p>At RSA Conference 2019, Tao Zhou, a senior staff algorithm engineer from Alibaba Security, Alibaba Group, started his presentation on application of statistical learning to intrusion detection in the context of massive big data with an account of challenges facing Internet giants in security data analysis, and then shared his constructive ideas on this topic.<\/p>\n<p>For starters, Tao Zhou pointed out that in security defense and attack, the largest advantage defenders have lies in massive data.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0531-1.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-8762\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0531-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"555\" height=\"283\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0531-1.jpg 555w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0531-1-300x153.jpg 300w\" sizes=\"(max-width: 555px) 100vw, 555px\" \/><\/a><\/p>\n<p>However, data is a double-edged sword. How to put massive data into good use is a common question baffling defenders in the era of big data.<\/p>\n<p>Massive data is far beyond the human capacity to process. Therefore, it is high time for computers to step in, relieving people of the burden of complex computation with various algorithm models, as represented by machine learning and statistical modeling.<\/p>\n<p>Machine learning, when applied as the only approach to intrusion detection, would encounter a lot of problems because machine learning is good at detecting &#8220;normal patterns&#8221;, but intrusion is abnormal behavior. Moreover, for supervised learning, machine learning algorithms need large amounts of labeled data, which are hard to obtain. For unsupervised learning, currently the accuracy and recall rate of almost all related algorithms cannot support security operations. Finally, the biggest problem of machine learning is that the classification model built on data training is usually too complex to interpret. The only answer of &#8220;Yes&#8221; or &#8220;No&#8221; is insufficient for security analysis.<\/p>\n<p>Therefore, when applying machine learning to intrusion detection, we usually need to specify certain scenarios, typically those where labeled data is easy to obtain, like spam detection, DGA domain detection, and web crawler detection.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0531-2.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-8764\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0531-2.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"555\" height=\"255\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0531-2.jpg 555w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0531-2-300x138.jpg 300w\" sizes=\"(max-width: 555px) 100vw, 555px\" \/><\/a><\/p>\n<p>During attack modeling, a model should be built on preprocessed data to reflect a specific type of attack. The same type of attacks tends to have common features, which can be obtained from data of abnormal behavior. In this step, precision is the most important indicator, reflecting an emphasis on the accuracy of determination of attack patterns.<\/p>\n<p>The kill chain-based model is a good option for modeling in this step.<\/p>\n<p><strong>Sum-up<\/strong><\/p>\n<p>In intrusion data analysis, it is a must to interpret analysis results. Traditional machine learning algorithms built upon training data, however, are usually &#8220;black boxes&#8221; that deny interpretation.<\/p>\n<p>For this reason, many scholars begin to study the explainable AI (XAI), with a purpose of delivering interpretable analysis results, whether using the statistical modeling (for example, topic modeling frequently mentioned at this year&#8217;s RSA conference) or the knowledge atlas (semantic network) technology (such as Watson from IBM).<\/p>\n<p><\/body><\/html><\/p>\n","protected":false},"excerpt":{"rendered":"<p>At RSA 2019, as indicated by Bugra Karabey, the senior risk manager from Microsoft, artificial intelligence (AI) and machine learning (ML) technologies have found a ubiquitous application in the cybersecurity field. Currently, ML is the most popular AI technology which is extensively used. Meanwhile, people begin to think about drawbacks and even security risks of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":8765,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[20],"tags":[620],"class_list":["post-8761","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-rsa-2019"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Issues Related to the Application of Machine Learning in Security Threat Scenarios - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/issues-related-to-the-application-of-machine-learning-in-security-threat-scenarios\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Issues Related to the Application of Machine Learning in Security Threat Scenarios - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"At RSA 2019, as indicated by Bugra Karabey, the senior risk manager from Microsoft, artificial intelligence (AI) and machine learning (ML) technologies\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/issues-related-to-the-application-of-machine-learning-in-security-threat-scenarios\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-04T03:54:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/1108-1.jpg\" \/>\n<meta name=\"author\" content=\"NSFOCUS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Issues Related to the Application of Machine Learning in Security Threat Scenarios - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"At RSA 2019, as indicated by Bugra Karabey, the senior risk manager from Microsoft, artificial intelligence (AI) and machine learning (ML) technologies\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/1108-1.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"NSFOCUS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/issues-related-to-the-application-of-machine-learning-in-security-threat-scenarios\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/issues-related-to-the-application-of-machine-learning-in-security-threat-scenarios\\\/\"},\"author\":{\"name\":\"NSFOCUS\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Issues Related to the Application of Machine Learning in Security Threat Scenarios\",\"datePublished\":\"2019-06-04T03:54:09+00:00\",\"dateModified\":\"2026-04-17T18:07:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/issues-related-to-the-application-of-machine-learning-in-security-threat-scenarios\\\/\"},\"wordCount\":598,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/issues-related-to-the-application-of-machine-learning-in-security-threat-scenarios\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/1108-1.jpg\",\"keywords\":[\"RSA 2019\"],\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/issues-related-to-the-application-of-machine-learning-in-security-threat-scenarios\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/issues-related-to-the-application-of-machine-learning-in-security-threat-scenarios\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/issues-related-to-the-application-of-machine-learning-in-security-threat-scenarios\\\/\",\"name\":\"Issues Related to the Application of Machine Learning in Security Threat Scenarios - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/issues-related-to-the-application-of-machine-learning-in-security-threat-scenarios\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/issues-related-to-the-application-of-machine-learning-in-security-threat-scenarios\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/1108-1.jpg\",\"datePublished\":\"2019-06-04T03:54:09+00:00\",\"dateModified\":\"2026-04-17T18:07:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/issues-related-to-the-application-of-machine-learning-in-security-threat-scenarios\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/issues-related-to-the-application-of-machine-learning-in-security-threat-scenarios\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/issues-related-to-the-application-of-machine-learning-in-security-threat-scenarios\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/1108-1.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/1108-1.jpg\",\"width\":595,\"height\":374,\"caption\":\"Hacker with digital dollar symbol overlay.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/issues-related-to-the-application-of-machine-learning-in-security-threat-scenarios\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Issues Related to the Application of Machine Learning in Security Threat Scenarios\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"NSFOCUS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"NSFOCUS\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Issues Related to the Application of Machine Learning in Security Threat Scenarios - NSFOCUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/issues-related-to-the-application-of-machine-learning-in-security-threat-scenarios\/","og_locale":"pt_BR","og_type":"article","og_title":"Issues Related to the Application of Machine Learning in Security Threat Scenarios - NSFOCUS","og_description":"At RSA 2019, as indicated by Bugra Karabey, the senior risk manager from Microsoft, artificial intelligence (AI) and machine learning (ML) technologies","og_url":"https:\/\/nsfocusglobal.com\/issues-related-to-the-application-of-machine-learning-in-security-threat-scenarios\/","og_site_name":"NSFOCUS","article_published_time":"2019-06-04T03:54:09+00:00","article_modified_time":"2026-04-17T18:07:53+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/1108-1.jpg","type":"","width":"","height":""}],"author":"NSFOCUS","twitter_card":"summary_large_image","twitter_title":"Issues Related to the Application of Machine Learning in Security Threat Scenarios - NSFOCUS","twitter_description":"At RSA 2019, as indicated by Bugra Karabey, the senior risk manager from Microsoft, artificial intelligence (AI) and machine learning (ML) technologies","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/1108-1.jpg","twitter_misc":{"Escrito por":"NSFOCUS","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/issues-related-to-the-application-of-machine-learning-in-security-threat-scenarios\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/issues-related-to-the-application-of-machine-learning-in-security-threat-scenarios\/"},"author":{"name":"NSFOCUS","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Issues Related to the Application of Machine Learning in Security Threat Scenarios","datePublished":"2019-06-04T03:54:09+00:00","dateModified":"2026-04-17T18:07:53+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/issues-related-to-the-application-of-machine-learning-in-security-threat-scenarios\/"},"wordCount":598,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/issues-related-to-the-application-of-machine-learning-in-security-threat-scenarios\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/1108-1.jpg","keywords":["RSA 2019"],"articleSection":["Uncategorized"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/issues-related-to-the-application-of-machine-learning-in-security-threat-scenarios\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/issues-related-to-the-application-of-machine-learning-in-security-threat-scenarios\/","url":"https:\/\/nsfocusglobal.com\/issues-related-to-the-application-of-machine-learning-in-security-threat-scenarios\/","name":"Issues Related to the Application of Machine Learning in Security Threat Scenarios - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/issues-related-to-the-application-of-machine-learning-in-security-threat-scenarios\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/issues-related-to-the-application-of-machine-learning-in-security-threat-scenarios\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/1108-1.jpg","datePublished":"2019-06-04T03:54:09+00:00","dateModified":"2026-04-17T18:07:53+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/issues-related-to-the-application-of-machine-learning-in-security-threat-scenarios\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/issues-related-to-the-application-of-machine-learning-in-security-threat-scenarios\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/issues-related-to-the-application-of-machine-learning-in-security-threat-scenarios\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/1108-1.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/1108-1.jpg","width":595,"height":374,"caption":"Hacker with digital dollar symbol overlay."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/issues-related-to-the-application-of-machine-learning-in-security-threat-scenarios\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Issues Related to the Application of Machine Learning in Security Threat Scenarios"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"NSFOCUS","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"NSFOCUS"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/8761","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=8761"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/8761\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/8765"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=8761"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=8761"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=8761"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}