{"id":1,"name":"threatsviewresource","url":"http:\/\/www.threatsview.com\/blog","description":"","link":"https:\/\/www.threatsview.com\/blog\/author\/threatsviewresource\/","slug":"threatsviewresource","avatar_urls":{"24":"https:\/\/secure.gravatar.com\/avatar\/054a1f44f6b4cbea436ebb29402a3b0ab786ea552d357cda6e2ffad1646970e0?s=24&d=mm&r=g","48":"https:\/\/secure.gravatar.com\/avatar\/054a1f44f6b4cbea436ebb29402a3b0ab786ea552d357cda6e2ffad1646970e0?s=48&d=mm&r=g","96":"https:\/\/secure.gravatar.com\/avatar\/054a1f44f6b4cbea436ebb29402a3b0ab786ea552d357cda6e2ffad1646970e0?s=96&d=mm&r=g"},"meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>threatsviewresource, Author at ThreatsView : Penetration Testing Tools and Integration<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatsview.com\/blog\/author\/threatsviewresource\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"profile\" \/>\n<meta property=\"og:title\" content=\"threatsviewresource, Author at ThreatsView : Penetration Testing Tools and Integration\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatsview.com\/blog\/author\/threatsviewresource\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsView : Penetration Testing Tools and Integration\" \/>\n<meta property=\"og:image\" content=\"https:\/\/secure.gravatar.com\/avatar\/714d3e57d26d5243e6008ea418dc2e51?s=500&d=mm&r=g\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"ProfilePage\",\"@id\":\"https:\/\/www.threatsview.com\/blog\/author\/threatsviewresource\/\",\"url\":\"https:\/\/www.threatsview.com\/blog\/author\/threatsviewresource\/\",\"name\":\"threatsviewresource, Author at ThreatsView : Penetration Testing Tools and Integration\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatsview.com\/blog\/#website\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.threatsview.com\/blog\/author\/threatsviewresource\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatsview.com\/blog\/author\/threatsviewresource\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatsview.com\/blog\/author\/threatsviewresource\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatsview.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Archives for threatsviewresource\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatsview.com\/blog\/#website\",\"url\":\"https:\/\/www.threatsview.com\/blog\/\",\"name\":\"ThreatsView : Penetration Testing Tools and Integration\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.threatsview.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatsview.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatsview.com\/blog\/#organization\",\"name\":\"ThreatsView : Penetration Testing Tools and Integration\",\"url\":\"https:\/\/www.threatsview.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatsview.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatsview.com\/blog\/wp-content\/uploads\/2024\/08\/cropped-logo-black.png\",\"contentUrl\":\"https:\/\/www.threatsview.com\/blog\/wp-content\/uploads\/2024\/08\/cropped-logo-black.png\",\"width\":271,\"height\":55,\"caption\":\"ThreatsView : Penetration Testing Tools and Integration\"},\"image\":{\"@id\":\"https:\/\/www.threatsview.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatsview.com\/blog\/#\/schema\/person\/02b81f935fd88de34437fb274996c3d7\",\"name\":\"threatsviewresource\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatsview.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/054a1f44f6b4cbea436ebb29402a3b0ab786ea552d357cda6e2ffad1646970e0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/054a1f44f6b4cbea436ebb29402a3b0ab786ea552d357cda6e2ffad1646970e0?s=96&d=mm&r=g\",\"caption\":\"threatsviewresource\"},\"sameAs\":[\"http:\/\/www.threatsview.com\/blog\"],\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatsview.com\/blog\/author\/threatsviewresource\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"threatsviewresource, Author at ThreatsView : Penetration Testing Tools and Integration","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatsview.com\/blog\/author\/threatsviewresource\/","og_locale":"en_US","og_type":"profile","og_title":"threatsviewresource, Author at ThreatsView : Penetration Testing Tools and Integration","og_url":"https:\/\/www.threatsview.com\/blog\/author\/threatsviewresource\/","og_site_name":"ThreatsView : Penetration Testing Tools and Integration","og_image":[{"url":"https:\/\/secure.gravatar.com\/avatar\/714d3e57d26d5243e6008ea418dc2e51?s=500&d=mm&r=g"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"ProfilePage","@id":"https:\/\/www.threatsview.com\/blog\/author\/threatsviewresource\/","url":"https:\/\/www.threatsview.com\/blog\/author\/threatsviewresource\/","name":"threatsviewresource, Author at ThreatsView : Penetration Testing Tools and Integration","isPartOf":{"@id":"https:\/\/www.threatsview.com\/blog\/#website"},"breadcrumb":{"@id":"https:\/\/www.threatsview.com\/blog\/author\/threatsviewresource\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatsview.com\/blog\/author\/threatsviewresource\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatsview.com\/blog\/author\/threatsviewresource\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatsview.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Archives for threatsviewresource"}]},{"@type":"WebSite","@id":"https:\/\/www.threatsview.com\/blog\/#website","url":"https:\/\/www.threatsview.com\/blog\/","name":"ThreatsView : Penetration Testing Tools and Integration","description":"","publisher":{"@id":"https:\/\/www.threatsview.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatsview.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatsview.com\/blog\/#organization","name":"ThreatsView : Penetration Testing Tools and Integration","url":"https:\/\/www.threatsview.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatsview.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatsview.com\/blog\/wp-content\/uploads\/2024\/08\/cropped-logo-black.png","contentUrl":"https:\/\/www.threatsview.com\/blog\/wp-content\/uploads\/2024\/08\/cropped-logo-black.png","width":271,"height":55,"caption":"ThreatsView : Penetration Testing Tools and Integration"},"image":{"@id":"https:\/\/www.threatsview.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.threatsview.com\/blog\/#\/schema\/person\/02b81f935fd88de34437fb274996c3d7","name":"threatsviewresource","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatsview.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/054a1f44f6b4cbea436ebb29402a3b0ab786ea552d357cda6e2ffad1646970e0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/054a1f44f6b4cbea436ebb29402a3b0ab786ea552d357cda6e2ffad1646970e0?s=96&d=mm&r=g","caption":"threatsviewresource"},"sameAs":["http:\/\/www.threatsview.com\/blog"],"mainEntityOfPage":{"@id":"https:\/\/www.threatsview.com\/blog\/author\/threatsviewresource\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatsview.com\/blog\/wp-json\/wp\/v2\/users\/1","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatsview.com\/blog\/wp-json\/wp\/v2\/users"}]}}