{"id":105,"date":"2020-08-16T14:05:19","date_gmt":"2020-08-16T14:05:19","guid":{"rendered":"http:\/\/cybernetics.partners\/?p=105"},"modified":"2020-09-27T19:46:54","modified_gmt":"2020-09-27T19:46:54","slug":"bold-decisions","status":"publish","type":"post","link":"https:\/\/cybernetics.partners\/?p=105","title":{"rendered":"Bold Decisions"},"content":{"rendered":"\n<figure class=\"wp-block-video aligncenter\"><video height=\"720\" style=\"aspect-ratio: 1280 \/ 720;\" width=\"1280\" controls src=\"http:\/\/cybernetics.partners\/wp-content\/uploads\/2020\/08\/Bold-Decisions-Managed-Cloud-Security-Services.mp4\" playsinline><\/video><figcaption><em>Please share your reactions and comments at the <a rel=\"noreferrer noopener\" href=\"https:\/\/www.linkedin.com\/feed\/update\/urn:li:activity:6700667146566959104\" target=\"_blank\">Linkedin Cybernetics Partners Page Post<\/a><\/em><\/figcaption><\/figure>\n\n\n\n<p class=\"has-text-align-left\">The new norm has accelerated Digital Transformation, but&nbsp;<a href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=cybersecurity&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6700667146566959104\">#CyberSecurity<\/a>&nbsp;threats are moving on a faster lane. Building&nbsp;<a href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=cybersecurity&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6700667146566959104\">#CyberSecurity<\/a>&nbsp;defenses fast in the midst of budget pressure, scarcity of security skills, and complex operation is a mission all of us know how hard it is. In this 2 mins video we go over Managed Cloud Security services as just in time technologies to help face the challenge.<\/p>\n\n\n\n<ul class=\"wp-block-social-links alignright is-layout-flex wp-block-social-links-is-layout-flex\"><li class=\"wp-social-link wp-social-link-linkedin  wp-block-social-link\"><a href=\"https:\/\/www.linkedin.com\/company\/cybernetics-partners\/\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M19.7,3H4.3C3.582,3,3,3.582,3,4.3v15.4C3,20.418,3.582,21,4.3,21h15.4c0.718,0,1.3-0.582,1.3-1.3V4.3 C21,3.582,20.418,3,19.7,3z M8.339,18.338H5.667v-8.59h2.672V18.338z M7.004,8.574c-0.857,0-1.549-0.694-1.549-1.548 c0-0.855,0.691-1.548,1.549-1.548c0.854,0,1.547,0.694,1.547,1.548C8.551,7.881,7.858,8.574,7.004,8.574z M18.339,18.338h-2.669 v-4.177c0-0.996-0.017-2.278-1.387-2.278c-1.389,0-1.601,1.086-1.601,2.206v4.249h-2.667v-8.59h2.559v1.174h0.037 c0.356-0.675,1.227-1.387,2.526-1.387c2.703,0,3.203,1.779,3.203,4.092V18.338z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">LinkedIn<\/span><\/a><\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The new norm has accelerated Digital Transformation, but&nbsp;#CyberSecurity&nbsp;threats are moving on a faster lane. Building&nbsp;#CyberSecurity&nbsp;defenses fast in the midst of budget pressure, scarcity of security skills, and complex operation is a mission all of us know how hard it is. In this 2 mins video we go over Managed Cloud Security services as just in [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":136,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[14,15,13],"class_list":["post-105","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-video","tag-cloud","tag-cybersecurity","tag-sase"],"_links":{"self":[{"href":"https:\/\/cybernetics.partners\/index.php?rest_route=\/wp\/v2\/posts\/105","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybernetics.partners\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybernetics.partners\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybernetics.partners\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybernetics.partners\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=105"}],"version-history":[{"count":7,"href":"https:\/\/cybernetics.partners\/index.php?rest_route=\/wp\/v2\/posts\/105\/revisions"}],"predecessor-version":[{"id":220,"href":"https:\/\/cybernetics.partners\/index.php?rest_route=\/wp\/v2\/posts\/105\/revisions\/220"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybernetics.partners\/index.php?rest_route=\/wp\/v2\/media\/136"}],"wp:attachment":[{"href":"https:\/\/cybernetics.partners\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=105"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybernetics.partners\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=105"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybernetics.partners\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}