{"id":58010,"date":"2017-10-03T16:51:50","date_gmt":"2017-10-03T21:51:50","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=58010"},"modified":"2021-12-20T18:37:10","modified_gmt":"2021-12-21T00:37:10","slug":"russians-allowed-dissect-pentagons-security-software","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/russians-allowed-dissect-pentagons-security-software\/","title":{"rendered":"Russians Allowed to Dissect Pentagon&#8217;s Security Software"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">Pentagon&#8217;s Security Software Source Codes Provided to Russian Defense Agency<\/h3>\n\n\n\n<p>Wait, what?!\u00a0 Yes, it is true  about the Pentagon&#8217;s Security Software.\u00a0 Hewlett Packard Enterprise (HPE) is allowing a Russian defense agency to dissect the source codes for the security software in use by the U.S. military.\u00a0 The HPE program, deemed ArcSight, alerts analysts when there are concerns computer systems are under attack.\u00a0 <\/p>\n\n\n\n<p>ArcSight is also used throughout the private sector.\u00a0 So why would HPE do this?\u00a0 According to <a href=\"http:\/\/www.newsweek.com\/russia-reviewed-security-software-used-pentagon-675586\">Newsweek<\/a>, it was in an effort to become certified to sell ArcSight to Russia&#8217;s public sector.<\/p>\n\n\n\n<p>Providing the source codes to the Russian defense agency led to major security concerns for other organizations using ArcSight.&nbsp; By allowing a third-party to dissect the core of the program, it could expose unknown vulnerabilities, which in turn could be used maliciously.&nbsp; Newsweek <a href=\"http:\/\/www.newsweek.com\/russia-reviewed-security-software-used-pentagon-675586\">reported<\/a>,<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>&#8220;Exploiting vulnerabilities found in ArcSight\u2019s source code could render it incapable of detecting that the military\u2019s network was under attack, said Allen Pomeroy, a former ArcSight employee who helped customers build their cyber defense systems.<\/p><\/blockquote>\n\n\n\n<p>Pomeroy went on to <a href=\"http:\/\/www.newsweek.com\/russia-reviewed-security-software-used-pentagon-675586\">state<\/a>,<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>\u201cA response to the attack would then be frankly impossible.\u201d<\/p><\/blockquote>\n\n\n\n<p>It is rather shocking HPE would provide such valuable information to the Russians when they are a known U.S. adversary.&nbsp; Alan Paller, the founder of the SANS Institute reported he did not find HPE&#8217;s decision surprising, considering source code disclosure is required to conduct business in Russia.<\/p>\n\n\n\n<p>HPE has already found quite the consumer base.&nbsp;&nbsp;<a href=\"http:\/\/www.newsweek.com\/russia-reviewed-security-software-used-pentagon-675586\">Russian government reports show <\/a>ArcSight is already being used by several state firms and companies with close ties to the Kremlin.<\/p>\n\n\n\n<p>**Please note, the PC Matic team will not be able to provide additional details regarding this matter.&nbsp; All of the information we have available to us, has been included within this post.&nbsp; However, if you are a PC Matic customer and find yourself in need of software assistance, or want to learn more about <a href=\"https:\/\/www.pcmatic.com\/pro\/compare-security-software.asp\">security software<\/a>, you may reach out to our support team at&nbsp;<a href=\"https:\/\/www.pcmatic.com\/help\" title=\"The Best Security Software\">https:\/\/www.pcmatic.com\/help<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pentagon&#8217;s Security Software Source Codes Provided to Russian Defense Agency Wait, what?!\u00a0 Yes, it is true about the Pentagon&#8217;s Security Software.\u00a0 Hewlett Packard Enterprise (HPE) is allowing a Russian defense agency to dissect the source codes for the security software in use by the U.S. military.\u00a0 The HPE program, deemed ArcSight, alerts analysts when there [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":55174,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[5090,183],"tags":[5357,5356,5358,5295],"class_list":["post-58010","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-slider","category-tips","tag-arcsight","tag-hpe","tag-kremlin","tag-pentagon"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Russians Allowed to Dissect Pentagon&#039;s Security Software<\/title>\n<meta name=\"description\" content=\"Hewlett Packard Enterprise handed over the source codes to ArcSight, the Pentagon&#039;s security software used to protect military...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/russians-allowed-dissect-pentagons-security-software\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Russians Allowed to Dissect Pentagon&#039;s Security Software\" \/>\n<meta property=\"og:description\" content=\"Hewlett Packard Enterprise handed over the source codes to ArcSight, the Pentagon&#039;s security software used to protect military...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/russians-allowed-dissect-pentagons-security-software\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2017-10-03T21:51:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-21T00:37:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBlueSlider.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/russians-allowed-dissect-pentagons-security-software\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/russians-allowed-dissect-pentagons-security-software\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Russians Allowed to Dissect Pentagon&#8217;s Security Software\",\"datePublished\":\"2017-10-03T21:51:50+00:00\",\"dateModified\":\"2021-12-21T00:37:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/russians-allowed-dissect-pentagons-security-software\\\/\"},\"wordCount\":358,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/russians-allowed-dissect-pentagons-security-software\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/lockBlueSlider.jpg\",\"keywords\":[\"ArcSight\",\"HPE\",\"Kremlin\",\"Pentagon\"],\"articleSection\":[\"TechTalk Slider\",\"tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/russians-allowed-dissect-pentagons-security-software\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/russians-allowed-dissect-pentagons-security-software\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/russians-allowed-dissect-pentagons-security-software\\\/\",\"name\":\"Russians Allowed to Dissect Pentagon's Security Software\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/russians-allowed-dissect-pentagons-security-software\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/russians-allowed-dissect-pentagons-security-software\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/lockBlueSlider.jpg\",\"datePublished\":\"2017-10-03T21:51:50+00:00\",\"dateModified\":\"2021-12-21T00:37:10+00:00\",\"description\":\"Hewlett Packard Enterprise handed over the source codes to ArcSight, the Pentagon's security software used to protect military...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/russians-allowed-dissect-pentagons-security-software\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/russians-allowed-dissect-pentagons-security-software\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/russians-allowed-dissect-pentagons-security-software\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/lockBlueSlider.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/lockBlueSlider.jpg\",\"width\":1920,\"height\":550,\"caption\":\"Security lock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/russians-allowed-dissect-pentagons-security-software\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Russians Allowed to Dissect Pentagon&#8217;s Security Software\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Russians Allowed to Dissect Pentagon's Security Software","description":"Hewlett Packard Enterprise handed over the source codes to ArcSight, the Pentagon's security software used to protect military...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/russians-allowed-dissect-pentagons-security-software\/","og_locale":"en_US","og_type":"article","og_title":"Russians Allowed to Dissect Pentagon's Security Software","og_description":"Hewlett Packard Enterprise handed over the source codes to ArcSight, the Pentagon's security software used to protect military...","og_url":"https:\/\/www.pcmatic.com\/blog\/russians-allowed-dissect-pentagons-security-software\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2017-10-03T21:51:50+00:00","article_modified_time":"2021-12-21T00:37:10+00:00","og_image":[{"width":1920,"height":550,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBlueSlider.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/russians-allowed-dissect-pentagons-security-software\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/russians-allowed-dissect-pentagons-security-software\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Russians Allowed to Dissect Pentagon&#8217;s Security Software","datePublished":"2017-10-03T21:51:50+00:00","dateModified":"2021-12-21T00:37:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/russians-allowed-dissect-pentagons-security-software\/"},"wordCount":358,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/russians-allowed-dissect-pentagons-security-software\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBlueSlider.jpg","keywords":["ArcSight","HPE","Kremlin","Pentagon"],"articleSection":["TechTalk Slider","tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/russians-allowed-dissect-pentagons-security-software\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/russians-allowed-dissect-pentagons-security-software\/","url":"https:\/\/www.pcmatic.com\/blog\/russians-allowed-dissect-pentagons-security-software\/","name":"Russians Allowed to Dissect Pentagon's Security Software","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/russians-allowed-dissect-pentagons-security-software\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/russians-allowed-dissect-pentagons-security-software\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBlueSlider.jpg","datePublished":"2017-10-03T21:51:50+00:00","dateModified":"2021-12-21T00:37:10+00:00","description":"Hewlett Packard Enterprise handed over the source codes to ArcSight, the Pentagon's security software used to protect military...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/russians-allowed-dissect-pentagons-security-software\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/russians-allowed-dissect-pentagons-security-software\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/russians-allowed-dissect-pentagons-security-software\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBlueSlider.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBlueSlider.jpg","width":1920,"height":550,"caption":"Security lock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/russians-allowed-dissect-pentagons-security-software\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Russians Allowed to Dissect Pentagon&#8217;s Security Software"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/58010","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=58010"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/58010\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55174"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=58010"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=58010"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=58010"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}