{"id":990016,"date":"2024-10-09T16:02:26","date_gmt":"2024-10-09T09:02:26","guid":{"rendered":"https:\/\/dbiz.vn\/?p=990016"},"modified":"2025-06-20T00:04:52","modified_gmt":"2025-06-19T17:04:52","slug":"understanding-exploitation-likelihood-a-smarter-approach-to-cybersecurity","status":"publish","type":"post","link":"https:\/\/dibiz.vn\/en\/understanding-exploitation-likelihood-a-smarter-approach-to-cybersecurity\/","title":{"rendered":"Understanding Exploitation Likelihood: A Smarter Approach to Cybersecurity"},"content":{"rendered":"<div class=\"vgblk-rw-wrapper limit-wrapper\"><strong>Introduction<\/strong><\/p>\n<p>In the world of cybersecurity, prioritizing which vulnerabilities to tackle can feel like trying to hit a moving target. Severity scores have their place, but they don\u2019t always tell the full story. Enter\u00a0<strong>Exploitation Likelihood<\/strong>\u2014a new metric that zeroes in on what really matters: the actual chance that a vulnerability will be exploited. This isn\u2019t just another number on a dashboard; it\u2019s a game-changer for how you approach security.<\/p>\n<h3><strong>Strategic Benefits<\/strong><\/h3>\n<h4><strong>1. Get Smart About Where You Focus Your Efforts<\/strong><\/h4>\n<p>You\u2019ve got limited resources and a mountain of potential vulnerabilities to address. Not all threats are created equal, so why treat them like they are?\u00a0<strong>Exploitation Likelihood<\/strong>\u00a0changes the game by helping you focus on the vulnerabilities that are most likely to be attacked. It\u2019s about working smarter, not harder.<\/p>\n<ul role=\"list\">\n<li><strong>Sharp Decision-Making<\/strong>: With this metric, you\u2019re making decisions based on what\u2019s actually likely to happen, not just on what looks scary on paper.<\/li>\n<li><strong>Efficient Use of Resources<\/strong>: By homing in on the most probable threats, you\u2019re ensuring your team\u2019s time and energy are spent where they\u2019ll have the most impact.<\/li>\n<\/ul>\n<h4><strong>2. Stay Ahead of the Curve with Better Intelligence<\/strong><\/h4>\n<p>The threats you face today aren\u2019t the same as they were yesterday, and they won\u2019t be the same tomorrow.\u00a0<strong>Exploitation Likelihood<\/strong>\u00a0taps into the latest intelligence, blending the predictive power of First\u2019s EPSS (Exploit Prediction Scoring System) with real-world OSINT (Open Source Intelligence) data. The result? You get a clear picture of where the real risks lie.<\/p>\n<ul role=\"list\">\n<li><strong>Predictive Insights<\/strong>: Think of this as your crystal ball\u2014an informed look into which vulnerabilities are most likely to be exploited next.<\/li>\n<li><strong>Real-World Relevance<\/strong>: By pulling in data from the wild, you\u2019re not just guessing; you\u2019re making decisions based on what\u2019s actually happening out there.<\/li>\n<\/ul>\n<h4><strong>3. Shift from Defense to Offense<\/strong><\/h4>\n<p>Let\u2019s face it: the days of purely reactive cybersecurity are over. If you\u2019re not thinking ahead, you\u2019re falling behind.\u00a0<strong>Exploitation Likelihood<\/strong>\u00a0puts you in the driver\u2019s seat, letting you anticipate and neutralize threats before they become full-blown problems.<\/p>\n<ul role=\"list\">\n<li><strong>Proactive Protection<\/strong>: This isn\u2019t about waiting for something to go wrong. With Exploitation Likelihood, you\u2019re taking steps to prevent incidents before they occur.<\/li>\n<li><strong>Focused Response<\/strong>: When something does go wrong, this metric guides you straight to the heart of the issue, so you can respond swiftly and effectively.<\/li>\n<\/ul>\n<h3><strong>Why Exploitation Likelihood Matters<\/strong><\/h3>\n<h4><strong>1. Take the Guesswork Out of Risk Management<\/strong><\/h4>\n<p>Let\u2019s be real\u2014managing risk can feel like spinning plates.\u00a0<strong>Exploitation Likelihood<\/strong>\u00a0helps you keep those plates in the air by giving you a clear, data-driven understanding of where the real dangers are. It\u2019s not just about severity; it\u2019s about likelihood, too.<\/p>\n<ul role=\"list\">\n<li><strong>Contextualized Understanding<\/strong>: When you know how likely a vulnerability is to be exploited, you\u2019re not just managing risk\u2014you\u2019re mastering it.<\/li>\n<li><strong>Strategic Planning<\/strong>: With this insight, your security strategy isn\u2019t just reactive; it\u2019s precise and targeted.<\/li>\n<\/ul>\n<h4><strong>2. Align with What the Industry Experts Are Saying<\/strong><\/h4>\n<p>If you\u2019re following Gartner and other industry leaders, you know that risk-based vulnerability management is the way to go.\u00a0<strong>Exploitation Likelihood<\/strong>\u00a0fits perfectly into this framework, offering a quantifiable way to measure and manage your risk.<\/p>\n<ul role=\"list\">\n<li><strong>Stay Compliant<\/strong>: By integrating this metric, you\u2019re not just protecting your systems; you\u2019re aligning with industry best practices and regulatory expectations.<\/li>\n<li><strong>Measure What Matters<\/strong>: Finally, a metric that gives you a real benchmark for the effectiveness of your security efforts.<\/li>\n<\/ul>\n<h3><strong>Conclusion<\/strong><\/h3>\n<p><strong>Exploitation Likelihood<\/strong>\u00a0isn\u2019t just a new buzzword; it\u2019s a smarter, more strategic way to manage cybersecurity. By focusing on what\u2019s likely to happen rather than what\u2019s merely possible, you\u2019re not just staying ahead of the curve\u2014you\u2019re redefining it. For those who want to do more than just keep up with the ever-evolving threat landscape, this is your opportunity to lead. Ready to take your security strategy to the next level? Let\u2019s talk.<\/div>\n<p><!-- .vgblk-rw-wrapper --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction In the world of cybersecurity, prioritizing which vulnerabilities to tackle can feel like trying to hit a moving target. Severity scores have their place, but they don\u2019t always tell the full story. Enter\u00a0Exploitation Likelihood\u2014a new metric that zeroes in on what really matters: the actual chance that a vulnerability will be exploited. This isn\u2019t&#8230;<\/p>\n","protected":false},"author":2,"featured_media":989986,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[],"tags":[],"topic":[],"class_list":["post-990016","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Understanding Exploitation Likelihood: A Smarter Approach to Cybersecurity - Deliver Intelligence - Dibiz JSC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dibiz.vn\/en\/understanding-exploitation-likelihood-a-smarter-approach-to-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding Exploitation Likelihood: A Smarter Approach to Cybersecurity - Deliver Intelligence - Dibiz JSC\" \/>\n<meta property=\"og:description\" content=\"Introduction In the world of cybersecurity, prioritizing which vulnerabilities to tackle can feel like trying to hit a moving target. Severity scores have their place, but they don\u2019t always tell the full story. Enter\u00a0Exploitation Likelihood\u2014a new metric that zeroes in on what really matters: the actual chance that a vulnerability will be exploited. This isn\u2019t...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dibiz.vn\/en\/understanding-exploitation-likelihood-a-smarter-approach-to-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Deliver Intelligence - Dibiz JSC\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-09T09:02:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-19T17:04:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dibiz.vn\/wp-content\/uploads\/2024\/10\/66bddc5c93c26af062ac897c_Exploitation-likelihood-prioritizion-p-500.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"281\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hi\u1ec1n Nguy\u1ec5n \u0110\u1ee9c\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hi\u1ec1n Nguy\u1ec5n \u0110\u1ee9c\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dibiz.vn\/en\/understanding-exploitation-likelihood-a-smarter-approach-to-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/dibiz.vn\/en\/understanding-exploitation-likelihood-a-smarter-approach-to-cybersecurity\/\"},\"author\":{\"name\":\"Hi\u1ec1n Nguy\u1ec5n \u0110\u1ee9c\",\"@id\":\"https:\/\/dibiz.vn\/en\/#\/schema\/person\/0600f539506bef59e33dbd3b9864e715\"},\"headline\":\"Understanding Exploitation Likelihood: A Smarter Approach to Cybersecurity\",\"datePublished\":\"2024-10-09T09:02:26+00:00\",\"dateModified\":\"2025-06-19T17:04:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dibiz.vn\/en\/understanding-exploitation-likelihood-a-smarter-approach-to-cybersecurity\/\"},\"wordCount\":676,\"publisher\":{\"@id\":\"https:\/\/dibiz.vn\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/dibiz.vn\/en\/understanding-exploitation-likelihood-a-smarter-approach-to-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dibiz.vn\/wp-content\/uploads\/2024\/10\/66bddc5c93c26af062ac897c_Exploitation-likelihood-prioritizion-p-500.jpeg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dibiz.vn\/en\/understanding-exploitation-likelihood-a-smarter-approach-to-cybersecurity\/\",\"url\":\"https:\/\/dibiz.vn\/en\/understanding-exploitation-likelihood-a-smarter-approach-to-cybersecurity\/\",\"name\":\"Understanding Exploitation Likelihood: A Smarter Approach to Cybersecurity - Deliver Intelligence - Dibiz JSC\",\"isPartOf\":{\"@id\":\"https:\/\/dibiz.vn\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dibiz.vn\/en\/understanding-exploitation-likelihood-a-smarter-approach-to-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dibiz.vn\/en\/understanding-exploitation-likelihood-a-smarter-approach-to-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dibiz.vn\/wp-content\/uploads\/2024\/10\/66bddc5c93c26af062ac897c_Exploitation-likelihood-prioritizion-p-500.jpeg\",\"datePublished\":\"2024-10-09T09:02:26+00:00\",\"dateModified\":\"2025-06-19T17:04:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/dibiz.vn\/en\/understanding-exploitation-likelihood-a-smarter-approach-to-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dibiz.vn\/en\/understanding-exploitation-likelihood-a-smarter-approach-to-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dibiz.vn\/en\/understanding-exploitation-likelihood-a-smarter-approach-to-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/dibiz.vn\/wp-content\/uploads\/2024\/10\/66bddc5c93c26af062ac897c_Exploitation-likelihood-prioritizion-p-500.jpeg\",\"contentUrl\":\"https:\/\/dibiz.vn\/wp-content\/uploads\/2024\/10\/66bddc5c93c26af062ac897c_Exploitation-likelihood-prioritizion-p-500.jpeg\",\"width\":500,\"height\":281},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dibiz.vn\/en\/understanding-exploitation-likelihood-a-smarter-approach-to-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dibiz.vn\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ultrared\",\"item\":\"https:\/\/dibiz.vn\/en\/category\/ultrared-en\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Understanding Exploitation Likelihood: A Smarter Approach to Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dibiz.vn\/en\/#website\",\"url\":\"https:\/\/dibiz.vn\/en\/\",\"name\":\"Deliver Intelligence - Dibiz JSC\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/dibiz.vn\/en\/#organization\"},\"alternateName\":\"Dibiz JSC\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dibiz.vn\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dibiz.vn\/en\/#organization\",\"name\":\"Deliver Intelligence - Dibiz JSC\",\"url\":\"https:\/\/dibiz.vn\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dibiz.vn\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/dibiz.vn\/wp-content\/uploads\/2023\/03\/3.png\",\"contentUrl\":\"https:\/\/dibiz.vn\/wp-content\/uploads\/2023\/03\/3.png\",\"width\":650,\"height\":300,\"caption\":\"Deliver Intelligence - Dibiz JSC\"},\"image\":{\"@id\":\"https:\/\/dibiz.vn\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/dibiz.vn\/en\/#\/schema\/person\/0600f539506bef59e33dbd3b9864e715\",\"name\":\"Hi\u1ec1n Nguy\u1ec5n \u0110\u1ee9c\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dibiz.vn\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7dc66b59857c9aadb1b19e83e357594316cc1bd27b18f3b0ac69d27c800502a8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7dc66b59857c9aadb1b19e83e357594316cc1bd27b18f3b0ac69d27c800502a8?s=96&d=mm&r=g\",\"caption\":\"Hi\u1ec1n Nguy\u1ec5n \u0110\u1ee9c\"},\"url\":\"https:\/\/dibiz.vn\/en\/author\/hiennd\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Understanding Exploitation Likelihood: A Smarter Approach to Cybersecurity - Deliver Intelligence - Dibiz JSC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dibiz.vn\/en\/understanding-exploitation-likelihood-a-smarter-approach-to-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Understanding Exploitation Likelihood: A Smarter Approach to Cybersecurity - Deliver Intelligence - Dibiz JSC","og_description":"Introduction In the world of cybersecurity, prioritizing which vulnerabilities to tackle can feel like trying to hit a moving target. Severity scores have their place, but they don\u2019t always tell the full story. Enter\u00a0Exploitation Likelihood\u2014a new metric that zeroes in on what really matters: the actual chance that a vulnerability will be exploited. This isn\u2019t...","og_url":"https:\/\/dibiz.vn\/en\/understanding-exploitation-likelihood-a-smarter-approach-to-cybersecurity\/","og_site_name":"Deliver Intelligence - Dibiz JSC","article_published_time":"2024-10-09T09:02:26+00:00","article_modified_time":"2025-06-19T17:04:52+00:00","og_image":[{"width":500,"height":281,"url":"https:\/\/dibiz.vn\/wp-content\/uploads\/2024\/10\/66bddc5c93c26af062ac897c_Exploitation-likelihood-prioritizion-p-500.jpeg","type":"image\/jpeg"}],"author":"Hi\u1ec1n Nguy\u1ec5n \u0110\u1ee9c","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Hi\u1ec1n Nguy\u1ec5n \u0110\u1ee9c","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dibiz.vn\/en\/understanding-exploitation-likelihood-a-smarter-approach-to-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/dibiz.vn\/en\/understanding-exploitation-likelihood-a-smarter-approach-to-cybersecurity\/"},"author":{"name":"Hi\u1ec1n Nguy\u1ec5n \u0110\u1ee9c","@id":"https:\/\/dibiz.vn\/en\/#\/schema\/person\/0600f539506bef59e33dbd3b9864e715"},"headline":"Understanding Exploitation Likelihood: A Smarter Approach to Cybersecurity","datePublished":"2024-10-09T09:02:26+00:00","dateModified":"2025-06-19T17:04:52+00:00","mainEntityOfPage":{"@id":"https:\/\/dibiz.vn\/en\/understanding-exploitation-likelihood-a-smarter-approach-to-cybersecurity\/"},"wordCount":676,"publisher":{"@id":"https:\/\/dibiz.vn\/en\/#organization"},"image":{"@id":"https:\/\/dibiz.vn\/en\/understanding-exploitation-likelihood-a-smarter-approach-to-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/dibiz.vn\/wp-content\/uploads\/2024\/10\/66bddc5c93c26af062ac897c_Exploitation-likelihood-prioritizion-p-500.jpeg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/dibiz.vn\/en\/understanding-exploitation-likelihood-a-smarter-approach-to-cybersecurity\/","url":"https:\/\/dibiz.vn\/en\/understanding-exploitation-likelihood-a-smarter-approach-to-cybersecurity\/","name":"Understanding Exploitation Likelihood: A Smarter Approach to Cybersecurity - Deliver Intelligence - Dibiz JSC","isPartOf":{"@id":"https:\/\/dibiz.vn\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dibiz.vn\/en\/understanding-exploitation-likelihood-a-smarter-approach-to-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/dibiz.vn\/en\/understanding-exploitation-likelihood-a-smarter-approach-to-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/dibiz.vn\/wp-content\/uploads\/2024\/10\/66bddc5c93c26af062ac897c_Exploitation-likelihood-prioritizion-p-500.jpeg","datePublished":"2024-10-09T09:02:26+00:00","dateModified":"2025-06-19T17:04:52+00:00","breadcrumb":{"@id":"https:\/\/dibiz.vn\/en\/understanding-exploitation-likelihood-a-smarter-approach-to-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dibiz.vn\/en\/understanding-exploitation-likelihood-a-smarter-approach-to-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dibiz.vn\/en\/understanding-exploitation-likelihood-a-smarter-approach-to-cybersecurity\/#primaryimage","url":"https:\/\/dibiz.vn\/wp-content\/uploads\/2024\/10\/66bddc5c93c26af062ac897c_Exploitation-likelihood-prioritizion-p-500.jpeg","contentUrl":"https:\/\/dibiz.vn\/wp-content\/uploads\/2024\/10\/66bddc5c93c26af062ac897c_Exploitation-likelihood-prioritizion-p-500.jpeg","width":500,"height":281},{"@type":"BreadcrumbList","@id":"https:\/\/dibiz.vn\/en\/understanding-exploitation-likelihood-a-smarter-approach-to-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dibiz.vn\/en\/"},{"@type":"ListItem","position":2,"name":"Ultrared","item":"https:\/\/dibiz.vn\/en\/category\/ultrared-en\/"},{"@type":"ListItem","position":3,"name":"Understanding Exploitation Likelihood: A Smarter Approach to Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/dibiz.vn\/en\/#website","url":"https:\/\/dibiz.vn\/en\/","name":"Deliver Intelligence - Dibiz JSC","description":"","publisher":{"@id":"https:\/\/dibiz.vn\/en\/#organization"},"alternateName":"Dibiz JSC","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dibiz.vn\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/dibiz.vn\/en\/#organization","name":"Deliver Intelligence - Dibiz JSC","url":"https:\/\/dibiz.vn\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dibiz.vn\/en\/#\/schema\/logo\/image\/","url":"https:\/\/dibiz.vn\/wp-content\/uploads\/2023\/03\/3.png","contentUrl":"https:\/\/dibiz.vn\/wp-content\/uploads\/2023\/03\/3.png","width":650,"height":300,"caption":"Deliver Intelligence - Dibiz JSC"},"image":{"@id":"https:\/\/dibiz.vn\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/dibiz.vn\/en\/#\/schema\/person\/0600f539506bef59e33dbd3b9864e715","name":"Hi\u1ec1n Nguy\u1ec5n \u0110\u1ee9c","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dibiz.vn\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7dc66b59857c9aadb1b19e83e357594316cc1bd27b18f3b0ac69d27c800502a8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7dc66b59857c9aadb1b19e83e357594316cc1bd27b18f3b0ac69d27c800502a8?s=96&d=mm&r=g","caption":"Hi\u1ec1n Nguy\u1ec5n \u0110\u1ee9c"},"url":"https:\/\/dibiz.vn\/en\/author\/hiennd\/"}]}},"_links":{"self":[{"href":"https:\/\/dibiz.vn\/en\/wp-json\/wp\/v2\/posts\/990016","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dibiz.vn\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dibiz.vn\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dibiz.vn\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/dibiz.vn\/en\/wp-json\/wp\/v2\/comments?post=990016"}],"version-history":[{"count":1,"href":"https:\/\/dibiz.vn\/en\/wp-json\/wp\/v2\/posts\/990016\/revisions"}],"predecessor-version":[{"id":990017,"href":"https:\/\/dibiz.vn\/en\/wp-json\/wp\/v2\/posts\/990016\/revisions\/990017"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dibiz.vn\/en\/wp-json\/wp\/v2\/media\/989986"}],"wp:attachment":[{"href":"https:\/\/dibiz.vn\/en\/wp-json\/wp\/v2\/media?parent=990016"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dibiz.vn\/en\/wp-json\/wp\/v2\/categories?post=990016"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dibiz.vn\/en\/wp-json\/wp\/v2\/tags?post=990016"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/dibiz.vn\/en\/wp-json\/wp\/v2\/topic?post=990016"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}