{"id":230131,"date":"2024-01-02T07:19:50","date_gmt":"2024-01-02T07:19:50","guid":{"rendered":"https:\/\/www.devsecops.ltd\/wp-content\/uploads\/2024\/01\/Why-is-threat-modeling-important.png"},"modified":"2024-01-02T07:20:00","modified_gmt":"2024-01-02T07:20:00","slug":"why-is-threat-modeling-important","status":"inherit","type":"attachment","link":"https:\/\/www.devsecops.ltd\/why-is-threat-modeling-important\/","title":{"rendered":"Why is threat modeling important"},"author":5,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":""},"description":{"rendered":"

\"Why<\/a><\/p>\n"},"caption":{"rendered":""},"alt_text":"Why is threat modeling important","media_type":"image","mime_type":"image\/png","media_details":{"width":1094,"height":604,"file":"2024\/01\/Why-is-threat-modeling-important.png","filesize":58776,"sizes":{"medium":{"file":"Why-is-threat-modeling-important-300x166.png","width":300,"height":166,"filesize":25015,"mime_type":"image\/png","source_url":"https:\/\/www.devsecops.ltd\/wp-content\/uploads\/2024\/01\/Why-is-threat-modeling-important-300x166.png"},"large":{"file":"Why-is-threat-modeling-important-1024x565.png","width":1024,"height":565,"filesize":184958,"mime_type":"image\/png","source_url":"https:\/\/www.devsecops.ltd\/wp-content\/uploads\/2024\/01\/Why-is-threat-modeling-important-1024x565.png"},"thumbnail":{"file":"Why-is-threat-modeling-important-150x150.png","width":150,"height":150,"filesize":7137,"mime_type":"image\/png","source_url":"https:\/\/www.devsecops.ltd\/wp-content\/uploads\/2024\/01\/Why-is-threat-modeling-important-150x150.png"},"medium_large":{"file":"Why-is-threat-modeling-important-768x424.png","width":768,"height":424,"filesize":112885,"mime_type":"image\/png","source_url":"https:\/\/www.devsecops.ltd\/wp-content\/uploads\/2024\/01\/Why-is-threat-modeling-important-768x424.png"},"et-pb-post-main-image":{"file":"Why-is-threat-modeling-important-400x250.png","width":400,"height":250,"filesize":46205,"mime_type":"image\/png","source_url":"https:\/\/www.devsecops.ltd\/wp-content\/uploads\/2024\/01\/Why-is-threat-modeling-important-400x250.png"},"et-pb-post-main-image-fullwidth":{"file":"Why-is-threat-modeling-important-1080x604.png","width":1080,"height":604,"filesize":67112,"mime_type":"image\/png","source_url":"https:\/\/www.devsecops.ltd\/wp-content\/uploads\/2024\/01\/Why-is-threat-modeling-important-1080x604.png"},"et-pb-portfolio-image":{"file":"Why-is-threat-modeling-important-400x284.png","width":400,"height":284,"filesize":45273,"mime_type":"image\/png","source_url":"https:\/\/www.devsecops.ltd\/wp-content\/uploads\/2024\/01\/Why-is-threat-modeling-important-400x284.png"},"et-pb-portfolio-module-image":{"file":"Why-is-threat-modeling-important-510x382.png","width":510,"height":382,"filesize":66181,"mime_type":"image\/png","source_url":"https:\/\/www.devsecops.ltd\/wp-content\/uploads\/2024\/01\/Why-is-threat-modeling-important-510x382.png"},"et-pb-portfolio-image-single":{"file":"Why-is-threat-modeling-important-1080x596.png","width":1080,"height":596,"filesize":190272,"mime_type":"image\/png","source_url":"https:\/\/www.devsecops.ltd\/wp-content\/uploads\/2024\/01\/Why-is-threat-modeling-important-1080x596.png"},"et-pb-gallery-module-image-portrait":{"file":"Why-is-threat-modeling-important-400x516.png","width":400,"height":516,"filesize":26455,"mime_type":"image\/png","source_url":"https:\/\/www.devsecops.ltd\/wp-content\/uploads\/2024\/01\/Why-is-threat-modeling-important-400x516.png"},"et-pb-image--responsive--tablet":{"file":"Why-is-threat-modeling-important-980x541.png","width":980,"height":541,"filesize":172360,"mime_type":"image\/png","source_url":"https:\/\/www.devsecops.ltd\/wp-content\/uploads\/2024\/01\/Why-is-threat-modeling-important-980x541.png"},"et-pb-image--responsive--phone":{"file":"Why-is-threat-modeling-important-480x265.png","width":480,"height":265,"filesize":52838,"mime_type":"image\/png","source_url":"https:\/\/www.devsecops.ltd\/wp-content\/uploads\/2024\/01\/Why-is-threat-modeling-important-480x265.png"},"full":{"file":"Why-is-threat-modeling-important.png","width":1094,"height":604,"mime_type":"image\/png","source_url":"https:\/\/www.devsecops.ltd\/wp-content\/uploads\/2024\/01\/Why-is-threat-modeling-important.png"}},"image_meta":{"aperture":"0","credit":"","camera":"","caption":"","created_timestamp":"0","copyright":"","focal_length":"0","iso":"0","shutter_speed":"0","title":"","orientation":"0","keywords":[]}},"post":null,"source_url":"https:\/\/www.devsecops.ltd\/wp-content\/uploads\/2024\/01\/Why-is-threat-modeling-important.png","_links":{"self":[{"href":"https:\/\/www.devsecops.ltd\/wp-json\/wp\/v2\/media\/230131"}],"collection":[{"href":"https:\/\/www.devsecops.ltd\/wp-json\/wp\/v2\/media"}],"about":[{"href":"https:\/\/www.devsecops.ltd\/wp-json\/wp\/v2\/types\/attachment"}],"author":[{"embeddable":true,"href":"https:\/\/www.devsecops.ltd\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.devsecops.ltd\/wp-json\/wp\/v2\/comments?post=230131"}]}}