{"id":2,"date":"2013-03-30T01:59:00","date_gmt":"2013-03-30T01:59:00","guid":{"rendered":"http:\/\/smstock.com\/?page_id=2"},"modified":"2015-10-18T14:19:41","modified_gmt":"2015-10-18T19:19:41","slug":"sample-page","status":"publish","type":"page","link":"http:\/\/smstock.com\/","title":{"rendered":"Security Sites"},"content":{"rendered":"<article class=\"post-200 page type-page status-publish has-post-thumbnail entry\">\n<div class=\"entry-content\">\n<h3>#1\u00a0<a href=\"http:\/\/www.cio.com\/topic\/3089\/Security\" target=\"_blank\">CIO<\/a><\/h3>\n<p>Resources related to information security, including news and opinion and more on software and application flaws and fixes, data breaches, the inside threat the latest hacker attacks.<\/p>\n<h3>#2\u00a0<a title=\"TechRepublic - Security\" href=\"http:\/\/www.techrepublic.com\/topic\/security\/\" target=\"_blank\">TechRepublic \u2013 Security<\/a><\/h3>\n<p>TechRepublic helps IT decision-makers identify technologies and strategies to empower workers and streamline business processes. Their security section dives into the latest threats surrounding cyber security.<\/p>\n<h3>#3\u00a0<a href=\"http:\/\/www.us-cert.gov\/\" target=\"_blank\">US Cert<\/a><\/h3>\n<p>US-CERT\u2019s mission is to improve the nation\u2019s cybersecurity posture, coordinate cyber information sharing, and proactively manage cyber risks.<\/p>\n<h3>#4\u00a0<a href=\"http:\/\/www.wired.com\/threatlevel\/\" target=\"_blank\">Wired\u2019s Threat Level<\/a><\/h3>\n<p>Privacy, crime, and online security are the topics that carry the headlines here. You\u2019ll find everything from opinionated pieces, to the latest threat alerts.<\/p>\n<h3>#5\u00a0<a href=\"http:\/\/www.zdnet.com\/blog\/security\/\" target=\"_blank\">Zero Day from ZDNet<\/a><\/h3>\n<p>Staying on top of the latest in software\/hardware security research, vulnerabilities, threats and computer attacks. The Zero Day blog on ZDNet is a must for anyone keeping track of the industry.<\/p>\n<p>#6 <a href=\"http:\/\/www.csoonline.com\/\" target=\"_blank\">CSO Online<\/a><\/p>\n<p>Areas of focus include information security, physical security, business continuity, identity and access management, loss prevention and more.<\/p>\n<h3>#7 <a href=\"http:\/\/www.darkreading.com\/\" target=\"_blank\">Dark Reading<\/a><\/h3>\n<p>Dark Reading is a comprehensive news and information portal that focuses on IT security, helping information security professionals manage the balance between data protection and user access.<\/p>\n<h3>#8 <a href=\"http:\/\/googleonlinesecurity.blogspot.com\/\" target=\"_blank\">Google Online Security Blog<\/a><\/h3>\n<p>This is Google\u2019s own security blog, which focuses on all of the latest developments in the security world. Get the latest news and insights from Google\u00a0on security and safety on the Internet.<\/p>\n<p>#9 <a href=\"http:\/\/isc.sans.org\/\" target=\"_blank\">Internet Storm Center<\/a><\/p>\n<p>The Internet Storm Center gathers millions of intrusion detection log entries every day, from sensors covering over 500,000 IP addresses in over 50 countries.<\/p>\n<\/div>\n<\/article>\n","protected":false},"excerpt":{"rendered":"<p>#1\u00a0CIO Resources related to information security, including news and opinion and more on software and application flaws and fixes, data breaches, the inside threat the latest hacker attacks. #2\u00a0TechRepublic \u2013 Security TechRepublic helps IT&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-2","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"http:\/\/smstock.com\/index.php?rest_route=\/wp\/v2\/pages\/2","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/smstock.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/smstock.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/smstock.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/smstock.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2"}],"version-history":[{"count":2,"href":"http:\/\/smstock.com\/index.php?rest_route=\/wp\/v2\/pages\/2\/revisions"}],"predecessor-version":[{"id":12,"href":"http:\/\/smstock.com\/index.php?rest_route=\/wp\/v2\/pages\/2\/revisions\/12"}],"wp:attachment":[{"href":"http:\/\/smstock.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}