{"id":3969,"date":"2012-10-05T15:05:30","date_gmt":"2012-10-05T15:05:30","guid":{"rendered":"http:\/\/cloudnewsdaily.com\/?p=12621"},"modified":"2012-10-05T15:05:30","modified_gmt":"2012-10-05T15:05:30","slug":"infographic-cybersecurity-act-of-2012-stalls","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/infographic-cybersecurity-act-of-2012-stalls\/","title":{"rendered":"Infographic: Cybersecurity Act of 2012 Stalls"},"content":{"rendered":"<\/p>\n<p><a href=\"http:\/\/www.coalfire.com\/The-Coalfire-Blog\/October-2012\/Cyber-Security-Legislation\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-12622\" title=\"infographic-cybersecurity-legislation\" src=\"http:\/\/d11be2feca2wef.cloudfront.net\/wp-content\/uploads\/2012\/10\/infographic-cybersecurity-legislation.jpg\" alt=\"Cybersecurity Act of 2012 Stalls\" width=\"600\" height=\"469\" \/><\/a><\/p>\n<p>[Source: <a href=\"http:\/\/www.coalfire.com\/The-Coalfire-Blog\/October-2012\/Cyber-Security-Legislation\">Coalfire<\/a>]<\/p>\n<p><a href=\"http:\/\/feedads.g.doubleclick.net\/~a\/ahPpKSUAmP0aVpR0ttjKHZnJozA\/0\/da\"><img decoding=\"async\" src=\"http:\/\/feedads.g.doubleclick.net\/~a\/ahPpKSUAmP0aVpR0ttjKHZnJozA\/0\/di\" border=\"0\" ismap=\"true\"><\/img><\/a><br \/>\n<a href=\"http:\/\/feedads.g.doubleclick.net\/~a\/ahPpKSUAmP0aVpR0ttjKHZnJozA\/1\/da\"><img decoding=\"async\" src=\"http:\/\/feedads.g.doubleclick.net\/~a\/ahPpKSUAmP0aVpR0ttjKHZnJozA\/1\/di\" border=\"0\" ismap=\"true\"><\/img><\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/CloudNewsDaily\/~4\/vS3IVCMVk4g\" height=\"1\" width=\"1\"\/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[Source: Coalfire]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[574,1060,173,702,79],"tags":[118],"class_list":["post-3969","post","type-post","status-publish","format-standard","hentry","category-coalfire","category-cybersecurity-act-of-2012","category-government","category-infographic","category-legal","tag-security"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/3969","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=3969"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/3969\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=3969"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=3969"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=3969"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}