{"id":2,"date":"2015-11-01T23:02:27","date_gmt":"2015-11-01T23:02:27","guid":{"rendered":"http:\/\/52.30.30.32\/?page_id=2"},"modified":"2015-11-25T21:29:43","modified_gmt":"2015-11-25T21:29:43","slug":"sample-page","status":"publish","type":"page","link":"https:\/\/www.ilovesecure.com\/index.php\/sample-page\/","title":{"rendered":"Security Resources"},"content":{"rendered":"<p>Here a collection of the most important sources of information regarding Security:<\/p>\n<p><a href=\"https:\/\/googleonlinesecurity.blogspot.it\/\">Google Online Security Blog<\/a><br \/>\n<a href=\"http:\/\/www.mckeay.net\/\" target=\"_blank\">Network Security Blog<\/a><br \/>\n<a href=\"http:\/\/blog.fortinet.com\/\" target=\"_blank\">Fortinet Security Blog <\/a><br \/>\n<a href=\"http:\/\/nakedsecurity.sophos.com\/\" target=\"_blank\">Naked Security Blog<\/a><br \/>\n<a href=\"http:\/\/blog.cognitivedissidents.com\/\" target=\"_blank\">Cognitive Dissidents Blog with Joshua Corman <\/a><br \/>\n<a href=\"http:\/\/newschoolsecurity.com\/\" target=\"_blank\">The New School of Information Security Blog<\/a><br \/>\n<a href=\"http:\/\/www.darkreading.com\/blog\" target=\"_blank\">Dark Reading Blog<\/a><br \/>\n<a href=\"https:\/\/securosis.com\/blog\" target=\"_blank\">Securosis Blog<\/a><br \/>\n<a href=\"http:\/\/krebsonsecurity.com\/\" target=\"_blank\">Krebs on Security with Brian Krebs<\/a><br \/>\n<a href=\"http:\/\/blog.thoughtcrime.org\/\" target=\"_blank\">Thought Crime Blog with Moxie Marlinspike <\/a><br \/>\n<a href=\"http:\/\/www.schneier.com\/\" target=\"_blank\">Schneier on Security with Bruce Schneier<\/a><br \/>\n<a href=\"http:\/\/rdist.root.org\/\" target=\"_blank\">Root Labs RDIST with Nate Lawson<\/a><br \/>\n<a href=\"http:\/\/threatpost.com\/en_us\" target=\"_blank\">Threatpost Blog<\/a><br \/>\n<a href=\"http:\/\/www.zdnet.com\/blog\/security\" target=\"_blank\">Zero Day Blog with Ryan Naraine and Dancho Danchev<\/a><br \/>\n<a href=\"http:\/\/www.rationalsurvivability.com\/blog\/\" target=\"_blank\">Rational Survivability Blog with Christofer Hoff<\/a><br \/>\n<a href=\"https:\/\/www.securelist.com\/en\/blog\" target=\"_blank\">Securelist Blog<\/a><br \/>\n<a href=\"http:\/\/taosecurity.blogspot.com\/\" target=\"_blank\">TaoSecurity with Richard Bejtlich<\/a><br \/>\n<a href=\"http:\/\/www.f-secure.com\/weblog\/\" target=\"_blank\">F-Secure News from the Lab Blog<\/a><br \/>\n<a href=\"http:\/\/www.andrewhay.ca\/\" target=\"_blank\">Andrew Hay Blog<\/a><br \/>\n<a href=\"http:\/\/blog.uncommonsensesecurity.com\/\" target=\"_blank\">Uncommon Sense Security Blog with Jack Daniel<\/a><br \/>\n<a href=\"http:\/\/www.mckeay.net\/\" target=\"_blank\">Network Security Blog with Martin McKeay<\/a><br \/>\n<a href=\"http:\/\/software-security.sans.org\/blog\" target=\"_blank\">SANS AppSec Blog with Frank Kim<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here a collection of the most important sources of information regarding Security: Google Online Security Blog Network Security Blog Fortinet Security Blog Naked Security Blog Cognitive Dissidents Blog with Joshua Corman The New School of Information Security Blog Dark Reading Blog Securosis Blog Krebs on Security with Brian Krebs Thought Crime Blog with Moxie Marlinspike [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-2","page","type-page","status-publish","hentry","no-thumb"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security Resources - I Love Secure<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ilovesecure.com\/index.php\/sample-page\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Resources - I Love Secure\" \/>\n<meta property=\"og:description\" content=\"Here a collection of the most important sources of information regarding Security: Google Online Security Blog Network Security Blog Fortinet Security Blog Naked Security Blog Cognitive Dissidents Blog with Joshua Corman The New School of Information Security Blog Dark Reading Blog Securosis Blog Krebs on Security with Brian Krebs Thought Crime Blog with Moxie Marlinspike [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ilovesecure.com\/index.php\/sample-page\/\" \/>\n<meta property=\"og:site_name\" content=\"I Love Secure\" \/>\n<meta property=\"article:modified_time\" content=\"2015-11-25T21:29:43+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ilovesecure.com\/index.php\/sample-page\/\",\"url\":\"https:\/\/www.ilovesecure.com\/index.php\/sample-page\/\",\"name\":\"Security Resources - I Love Secure\",\"isPartOf\":{\"@id\":\"https:\/\/www.ilovesecure.com\/#website\"},\"datePublished\":\"2015-11-01T23:02:27+00:00\",\"dateModified\":\"2015-11-25T21:29:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ilovesecure.com\/index.php\/sample-page\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ilovesecure.com\/index.php\/sample-page\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ilovesecure.com\/index.php\/sample-page\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ilovesecure.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Resources\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ilovesecure.com\/#website\",\"url\":\"https:\/\/www.ilovesecure.com\/\",\"name\":\"I Love Secure\",\"description\":\"Security step by step\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ilovesecure.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Resources - I Love Secure","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ilovesecure.com\/index.php\/sample-page\/","og_locale":"en_US","og_type":"article","og_title":"Security Resources - I Love Secure","og_description":"Here a collection of the most important sources of information regarding Security: Google Online Security Blog Network Security Blog Fortinet Security Blog Naked Security Blog Cognitive Dissidents Blog with Joshua Corman The New School of Information Security Blog Dark Reading Blog Securosis Blog Krebs on Security with Brian Krebs Thought Crime Blog with Moxie Marlinspike [&hellip;]","og_url":"https:\/\/www.ilovesecure.com\/index.php\/sample-page\/","og_site_name":"I Love Secure","article_modified_time":"2015-11-25T21:29:43+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ilovesecure.com\/index.php\/sample-page\/","url":"https:\/\/www.ilovesecure.com\/index.php\/sample-page\/","name":"Security Resources - I Love Secure","isPartOf":{"@id":"https:\/\/www.ilovesecure.com\/#website"},"datePublished":"2015-11-01T23:02:27+00:00","dateModified":"2015-11-25T21:29:43+00:00","breadcrumb":{"@id":"https:\/\/www.ilovesecure.com\/index.php\/sample-page\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ilovesecure.com\/index.php\/sample-page\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ilovesecure.com\/index.php\/sample-page\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ilovesecure.com\/"},{"@type":"ListItem","position":2,"name":"Security Resources"}]},{"@type":"WebSite","@id":"https:\/\/www.ilovesecure.com\/#website","url":"https:\/\/www.ilovesecure.com\/","name":"I Love Secure","description":"Security step by step","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ilovesecure.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.ilovesecure.com\/index.php\/wp-json\/wp\/v2\/pages\/2","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ilovesecure.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ilovesecure.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ilovesecure.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ilovesecure.com\/index.php\/wp-json\/wp\/v2\/comments?post=2"}],"version-history":[{"count":4,"href":"https:\/\/www.ilovesecure.com\/index.php\/wp-json\/wp\/v2\/pages\/2\/revisions"}],"predecessor-version":[{"id":161,"href":"https:\/\/www.ilovesecure.com\/index.php\/wp-json\/wp\/v2\/pages\/2\/revisions\/161"}],"wp:attachment":[{"href":"https:\/\/www.ilovesecure.com\/index.php\/wp-json\/wp\/v2\/media?parent=2"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}