{"id":9246,"date":"2022-11-05T15:35:55","date_gmt":"2022-11-05T15:35:55","guid":{"rendered":"https:\/\/dailytalks.org\/?p=9246"},"modified":"2022-11-05T15:35:55","modified_gmt":"2022-11-05T15:35:55","slug":"threatquotient-publishes-2022-state-of-cybersecurity-automation-adoption-research-report","status":"publish","type":"post","link":"https:\/\/dailytalks.org\/?p=9246","title":{"rendered":"ThreatQuotient Publishes 2022 State of Cybersecurity Automation Adoption Research Report"},"content":{"rendered":"<p>Survey results highlight which automation use cases are working, which need more focus, and how senior cybersecurity professionals are approaching the challenge of securing the extended enterpriseLondon, UK \u2013 November 3rd, 2022 \u2013 ThreatQuotient&#x2122;, a leading security operations platform innovator, today released the State of Cybersecurity Automation Adoption in 2022&#8230;<br \/><a href=\"https:\/\/www.realwire.com\/releases\/ThreatQuotient-Publishes-State-of-Cybersecurity-Automation-Adoption-Report\" class=\"button purchase\" rel=\"nofollow noopener\" target=\"_blank\">Read More<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Survey results highlight which automation use cases are working, which need more focus, and how<\/p>\n","protected":false},"author":1,"featured_media":9247,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-9246","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lse-mrkt"],"featured_image_urls":{"full":["https:\/\/dailytalks.org\/wp-content\/uploads\/2022\/11\/9246-threatquotient-publishes-2022-state-of-cybersecurity-automation-adoption-research-report.jpg",500,123,false],"thumbnail":["https:\/\/dailytalks.org\/wp-content\/uploads\/2022\/11\/9246-threatquotient-publishes-2022-state-of-cybersecurity-automation-adoption-research-report-150x123.jpg",150,123,true],"medium":["https:\/\/dailytalks.org\/wp-content\/uploads\/2022\/11\/9246-threatquotient-publishes-2022-state-of-cybersecurity-automation-adoption-research-report-300x74.jpg",300,74,true],"medium_large":["https:\/\/dailytalks.org\/wp-content\/uploads\/2022\/11\/9246-threatquotient-publishes-2022-state-of-cybersecurity-automation-adoption-research-report.jpg",500,123,false],"large":["https:\/\/dailytalks.org\/wp-content\/uploads\/2022\/11\/9246-threatquotient-publishes-2022-state-of-cybersecurity-automation-adoption-research-report.jpg",500,123,false],"1536x1536":["https:\/\/dailytalks.org\/wp-content\/uploads\/2022\/11\/9246-threatquotient-publishes-2022-state-of-cybersecurity-automation-adoption-research-report.jpg",500,123,false],"2048x2048":["https:\/\/dailytalks.org\/wp-content\/uploads\/2022\/11\/9246-threatquotient-publishes-2022-state-of-cybersecurity-automation-adoption-research-report.jpg",500,123,false],"chromenews-featured":["https:\/\/dailytalks.org\/wp-content\/uploads\/2022\/11\/9246-threatquotient-publishes-2022-state-of-cybersecurity-automation-adoption-research-report.jpg",500,123,false],"chromenews-large":["https:\/\/dailytalks.org\/wp-content\/uploads\/2022\/11\/9246-threatquotient-publishes-2022-state-of-cybersecurity-automation-adoption-research-report.jpg",500,123,false],"chromenews-medium":["https:\/\/dailytalks.org\/wp-content\/uploads\/2022\/11\/9246-threatquotient-publishes-2022-state-of-cybersecurity-automation-adoption-research-report.jpg",500,123,false]},"author_info":{"display_name":"Jonathan Jeriah","author_link":"https:\/\/dailytalks.org\/?author=1"},"category_info":"<a href=\"https:\/\/dailytalks.org\/?cat=26\" rel=\"category\">London Market<\/a>","tag_info":"London Market","comment_count":"0","_links":{"self":[{"href":"https:\/\/dailytalks.org\/index.php?rest_route=\/wp\/v2\/posts\/9246","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dailytalks.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dailytalks.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dailytalks.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dailytalks.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=9246"}],"version-history":[{"count":0,"href":"https:\/\/dailytalks.org\/index.php?rest_route=\/wp\/v2\/posts\/9246\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dailytalks.org\/index.php?rest_route=\/wp\/v2\/media\/9247"}],"wp:attachment":[{"href":"https:\/\/dailytalks.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9246"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dailytalks.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=9246"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dailytalks.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=9246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}