{"id":29240,"date":"2022-11-25T18:42:27","date_gmt":"2022-11-25T13:12:27","guid":{"rendered":"https:\/\/blazeclan.com\/biggest-cloud-security-blind-spots\/"},"modified":"2023-03-15T19:16:24","modified_gmt":"2023-03-15T13:46:24","slug":"biggest-cloud-security-blind-spots","status":"publish","type":"post","link":"https:\/\/blazeclan.com\/asean\/blog\/biggest-cloud-security-blind-spots\/","title":{"rendered":"Biggest Cloud Security Blind Spots"},"content":{"rendered":"<p>Cloud computing is evolving into one of the biggest de facto standards of delivering IT services across all sectors. According to the 2019 Public Cloud Trends report from the Enterprise Strategy Group, the use of infrastructure-as-a-service (IaaS) environments has shot up in the past eight years from 17 % of the organizations to 58%, and 39% of the organizations report they have a cloud-first mentality to all of their technology deployments.<\/p>\n<p>It\u2019s proven to be a boon for innovation but cybersecurity organizations continue to struggle to keep up with the constant developments and changes in cloud technology. One of the biggest challenges they face is <a href=\"https:\/\/blazeclan.com\/asean\/blog\/how-organizations-can-enhance-their-cloud-security\/\">gaining visibility of cloud infrastructure<\/a> and resources. In a recent study published by Cloud Security Alliance, they\u2019ve noted that nearly 75% of companies with assets in the public cloud cited lack of visibility as a major challenge.<\/p>\n<p>Let\u2019s look at these blind spots in detail.<\/p>\n<h4>Business-Managed IT<\/h4>\n<p>Enterprises and organizations that believe in managing their cloud assets and resources on their own are believed to have their cloud infrastructure managed and run by themselves. This approach to cloud adoption has proven to be a challenge for them because by doing so they are not encouraging collaboration from IT and Security professionals. The business managed IT silos the become a huge security blind-spot for these organizations. These same organizations innovate faster but also they\u2019re twice as likely to have multiple areas of security risk exposures<\/p>\n<h4>Cloud Misconfiguration<\/h4>\n<p>Misconfiguration of IaaS and cloud data stores is the leading cause of some of the most damaging cloud breaches and data exposures today. Whether it\u2019s from turning off default security settings, using default passwords, allowing unrestricted access to services &#8211; misconfiguration problems such as these introduce a raft of hidden risks that are frequently uncovered only post an incident. This proves to be one of the biggest challenges in the cloud industry<\/p>\n<h4>Hybrid Architecture and Multicloud Purchasing<\/h4>\n<p>According to a report published by Cloud Security Alliance, 55% of organizations run complex cloud computing environments that operate with a hybrid architecture. Such as setup offers a greater way for larger organizations to transition gradually to the cloud but introduces security visibility challenges as organizations struggle to track assets across entire architecture and monitor activity across complex hybrid setups. Firemon shows that 80% of organizations are challenged by the limitations and complexity of tools used for monitoring and managing security across hybrid environments.<\/p>\n<h4>Containers and Container Orchestration<\/h4>\n<p>The use of containerized workloads and container orchestration is skyrocketing in the cloud as organizations leverage the ephemeral flexibility and scalability of containerization to feed the rapid improvements of continuous integration\/continuous delivery (CI\/CD) in software development. But new platforms like Kubernetes are introducing new classes of misconfigurations and vulnerabilities to cloud environments faster than <a href=\"https:\/\/blazeclan.com\/asean\/products-frameworks\/csecure\/\">security teams<\/a> can even wrap their arms around how container technology works. According to <a href=\"https:\/\/www.stackrox.com\/kubernetes-adoption-and-security-trends-and-market-share-for-containers\/\">recent research<\/a> by AimPoint Group on behalf of StackRox, 40% of organizations today remain at the planning or basic stages of security strategy for container environments, and an additional 19% still have no strategy at all.<\/p>\n<h4>Dark Data<\/h4>\n<p>Unclassified and unmanaged data \u2014 also known as &#8220;dark data&#8221; \u2014 is a huge problem for most enterprises today, whether that data is on-premises or in the cloud. Organizations struggle to protect dark data due to the fact they can&#8217;t secure assets they don&#8217;t know about. According to a recent survey conducted by Vanson Bourne for Veritas, dark data is particularly acute in public cloud environments, where three in five companies say they&#8217;ve classified less than half of their public cloud data.<\/p>\n<p><strong>Forensics and Threat-Hunting Telemetry<\/strong><\/p>\n<p>Some of the biggest cloud blind spots that <a href=\"https:\/\/blazeclan.com\/asean\/products-frameworks\/csecure\/\">security teams<\/a> are battling today are related to forensics and threat-hunting telemetry. Not only do organizations struggle to get the right information fed from all of their different cloud resources, but even when they do manage to do this they face an uphill battle. Just consolidating that data and correlating it with on-premises telemetry becomes its own nightmare \u2014 a form of multi-dashboard blindness for incident response and threat-hunting teams.<\/p>\n<p><a href=\"https:\/\/www.sans.org\/webcasts\/109760?utm_medium=Referral&amp;utm_source=PR+Log&amp;utm_content=Analyst+Program+Webcasts+PR+04+2019+Cloud+Security+Survey&amp;utm_campaign=Analyst+Program+Webcasts\" class=\"broken_link\">According to the SANS Institute<\/a>, over half of the organizations faced frustrations in getting low-level logs and systems information for forensics from their cloud providers, and less than one in three organizations have been able to integrate the forensics and incident-response tools they use in-house with their public cloud environments.<\/p>\n<h4>Blazeclan\u2019s Cloud Security Operations Centre&nbsp;<\/h4>\n<p>Blazeclan developed a cloud <a href=\"https:\/\/blazeclan.com\/asean\/blog\/how-organizations-can-enhance-their-cloud-security\/\">security framework<\/a> that addresses the above-highlighted cloud security loopholes and enables organizations and enterprises to gain visibility across their cloud environments. The framework consists of the following pillars:<\/p>\n<p><strong>Cloud Security Assessments<\/strong><\/p>\n<p>Our security team works alongside our clients to detect, identify and note their cloud assets and resources. Irrespective of the client having a single cloud or a multi-cloud environment, our team helps the organization gain visibility into their environments. Doing so helps the organization gain visibility on their risk and exposure points and help them address these security risks.&nbsp;<\/p>\n<p><strong>Cloud Security Monitoring<\/strong><\/p>\n<p>Monitoring the cloud environment in near-real-time becomes very important for the organization as they need to stay on top of the agile nature of innovation. Our cloud security monitoring solution comprises of the best-in-class tool with threat detection engines and a set of professional experts enable the organization not only detect security events but also help with incident response and forensics.&nbsp;<\/p>\n<p><strong>Cloud Vulnerability Assessments and Penetration Testing<\/strong><\/p>\n<p>To stay on top of addressing security risks and threats that arise due to not patching and upgrading services and software, Blazeclan offers cloud vulnerability assessments and penetration testing. Our team of experts not only identifies and assess cloud environments but also assists them in addressing the detected threats.&nbsp;<\/p>\n<p>Please <a href=\"https:\/\/blazeclan.com\/asean\/contact\/\">get in touch with us<\/a> to know more about how Blazeclan can help you stay secure on the cloud while you continue innovating.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cloud computing is evolving into one of the biggest de facto standards of delivering IT services across all sectors. According to the 2019 Public Cloud Trends report from the Enterprise Strategy Group, the use of infrastructure-as-a-service (IaaS) environments has shot up in the past eight years from 17 % of the organizations to 58%, and [&hellip;]<\/p>\n","protected":false},"author":192,"featured_media":20457,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1709],"tags":[1192,1202,1099,1057],"class_list":["post-29240","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-aws-cloud-computing-asean","tag-aws-cloud-asean","tag-aws-cloud-el-eu","tag-cloud-security-asean","tag-security-asean"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Biggest Cloud Security Blind Spots<\/title>\n<meta name=\"description\" content=\"Cybersecurity organizations continue to struggle as there&#039;s gaining visibility of cloud infrastructure &amp; resources. Read the blind spots of cloud security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blazeclan.com\/asean\/blog\/biggest-cloud-security-blind-spots\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Biggest Cloud Security Blind Spots\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity organizations continue to struggle as there&#039;s gaining visibility of cloud infrastructure &amp; resources. Read the blind spots of cloud security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blazeclan.com\/blog\/biggest-cloud-security-blind-spots\/\" \/>\n<meta property=\"og:site_name\" content=\"Blazeclan\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/blazeclan.hq\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-25T13:12:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-15T13:46:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blazeclan.com\/wp-content\/uploads\/2019\/08\/big-security-flaws-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1650\" \/>\n\t<meta property=\"og:image:height\" content=\"680\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Team Blazeclan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@blazeclan_hq\" \/>\n<meta name=\"twitter:site\" content=\"@blazeclan_hq\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Team Blazeclan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blazeclan.com\/blog\/biggest-cloud-security-blind-spots\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blazeclan.com\/asean\/blog\/biggest-cloud-security-blind-spots\/\"},\"author\":{\"name\":\"Team Blazeclan\",\"@id\":\"https:\/\/blazeclan.com\/asean\/#\/schema\/person\/779910eccddff4a1ea6663b6bfb271e8\"},\"headline\":\"Biggest Cloud Security Blind Spots\",\"datePublished\":\"2022-11-25T13:12:27+00:00\",\"dateModified\":\"2023-03-15T13:46:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blazeclan.com\/asean\/blog\/biggest-cloud-security-blind-spots\/\"},\"wordCount\":975,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blazeclan.com\/asean\/#organization\"},\"image\":{\"@id\":\"https:\/\/blazeclan.com\/blog\/biggest-cloud-security-blind-spots\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blazeclan.com\/wp-content\/uploads\/2019\/08\/big-security-flaws-1.jpg\",\"keywords\":[\"AWS Cloud\",\"AWS Cloud\",\"Cloud Security\",\"Security\"],\"articleSection\":[\"AWS Cloud Computing\"],\"inLanguage\":\"ASEAN\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blazeclan.com\/blog\/biggest-cloud-security-blind-spots\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blazeclan.com\/asean\/blog\/biggest-cloud-security-blind-spots\/\",\"url\":\"https:\/\/blazeclan.com\/blog\/biggest-cloud-security-blind-spots\/\",\"name\":\"Biggest Cloud Security Blind Spots\",\"isPartOf\":{\"@id\":\"https:\/\/blazeclan.com\/asean\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blazeclan.com\/blog\/biggest-cloud-security-blind-spots\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blazeclan.com\/blog\/biggest-cloud-security-blind-spots\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blazeclan.com\/wp-content\/uploads\/2019\/08\/big-security-flaws-1.jpg\",\"datePublished\":\"2022-11-25T13:12:27+00:00\",\"dateModified\":\"2023-03-15T13:46:24+00:00\",\"description\":\"Cybersecurity organizations continue to struggle as there's gaining visibility of cloud infrastructure & resources. Read the blind spots of cloud security.\",\"breadcrumb\":{\"@id\":\"https:\/\/blazeclan.com\/blog\/biggest-cloud-security-blind-spots\/#breadcrumb\"},\"inLanguage\":\"ASEAN\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blazeclan.com\/blog\/biggest-cloud-security-blind-spots\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ASEAN\",\"@id\":\"https:\/\/blazeclan.com\/blog\/biggest-cloud-security-blind-spots\/#primaryimage\",\"url\":\"https:\/\/blazeclan.com\/wp-content\/uploads\/2019\/08\/big-security-flaws-1.jpg\",\"contentUrl\":\"https:\/\/blazeclan.com\/wp-content\/uploads\/2019\/08\/big-security-flaws-1.jpg\",\"width\":1650,\"height\":680},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blazeclan.com\/blog\/biggest-cloud-security-blind-spots\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blazeclan.com\/asean\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Biggest Cloud Security Blind Spots\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blazeclan.com\/asean\/#website\",\"url\":\"https:\/\/blazeclan.com\/asean\/\",\"name\":\"Blazeclan\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/blazeclan.com\/asean\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blazeclan.com\/asean\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ASEAN\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blazeclan.com\/asean\/#organization\",\"name\":\"Blazeclan\",\"url\":\"https:\/\/blazeclan.com\/asean\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ASEAN\",\"@id\":\"https:\/\/blazeclan.com\/asean\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blazeclan.com\/wp-content\/uploads\/2024\/10\/ITCI-Blazeclan_logo.svg\",\"contentUrl\":\"https:\/\/blazeclan.com\/wp-content\/uploads\/2024\/10\/ITCI-Blazeclan_logo.svg\",\"caption\":\"Blazeclan\"},\"image\":{\"@id\":\"https:\/\/blazeclan.com\/asean\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/blazeclan.hq\/\",\"https:\/\/x.com\/blazeclan_hq\",\"https:\/\/www.instagram.com\/blazeclantechnologies\/\",\"https:\/\/www.linkedin.com\/company\/blazeclan-technologies\/\",\"https:\/\/www.youtube.com\/channel\/UCCKF4Lcbtus-pUoZr7Lxrow\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blazeclan.com\/asean\/#\/schema\/person\/779910eccddff4a1ea6663b6bfb271e8\",\"name\":\"Team Blazeclan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ASEAN\",\"@id\":\"https:\/\/blazeclan.com\/asean\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a43c1fa01bb3c7e839254c9084bf11ed422d7e633231f9e935096045af416ba2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a43c1fa01bb3c7e839254c9084bf11ed422d7e633231f9e935096045af416ba2?s=96&d=mm&r=g\",\"caption\":\"Team Blazeclan\"},\"sameAs\":[\"http:\/\/localhost\/ps-local-wp\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Biggest Cloud Security Blind Spots","description":"Cybersecurity organizations continue to struggle as there's gaining visibility of cloud infrastructure & resources. Read the blind spots of cloud security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blazeclan.com\/asean\/blog\/biggest-cloud-security-blind-spots\/","og_locale":"en_US","og_type":"article","og_title":"Biggest Cloud Security Blind Spots","og_description":"Cybersecurity organizations continue to struggle as there's gaining visibility of cloud infrastructure & resources. Read the blind spots of cloud security.","og_url":"https:\/\/blazeclan.com\/blog\/biggest-cloud-security-blind-spots\/","og_site_name":"Blazeclan","article_publisher":"https:\/\/www.facebook.com\/blazeclan.hq\/","article_published_time":"2022-11-25T13:12:27+00:00","article_modified_time":"2023-03-15T13:46:24+00:00","og_image":[{"width":1650,"height":680,"url":"https:\/\/blazeclan.com\/wp-content\/uploads\/2019\/08\/big-security-flaws-1.jpg","type":"image\/jpeg"}],"author":"Team Blazeclan","twitter_card":"summary_large_image","twitter_creator":"@blazeclan_hq","twitter_site":"@blazeclan_hq","twitter_misc":{"Written by":"Team Blazeclan","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blazeclan.com\/blog\/biggest-cloud-security-blind-spots\/#article","isPartOf":{"@id":"https:\/\/blazeclan.com\/asean\/blog\/biggest-cloud-security-blind-spots\/"},"author":{"name":"Team Blazeclan","@id":"https:\/\/blazeclan.com\/asean\/#\/schema\/person\/779910eccddff4a1ea6663b6bfb271e8"},"headline":"Biggest Cloud Security Blind Spots","datePublished":"2022-11-25T13:12:27+00:00","dateModified":"2023-03-15T13:46:24+00:00","mainEntityOfPage":{"@id":"https:\/\/blazeclan.com\/asean\/blog\/biggest-cloud-security-blind-spots\/"},"wordCount":975,"commentCount":0,"publisher":{"@id":"https:\/\/blazeclan.com\/asean\/#organization"},"image":{"@id":"https:\/\/blazeclan.com\/blog\/biggest-cloud-security-blind-spots\/#primaryimage"},"thumbnailUrl":"https:\/\/blazeclan.com\/wp-content\/uploads\/2019\/08\/big-security-flaws-1.jpg","keywords":["AWS Cloud","AWS Cloud","Cloud Security","Security"],"articleSection":["AWS Cloud Computing"],"inLanguage":"ASEAN","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blazeclan.com\/blog\/biggest-cloud-security-blind-spots\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blazeclan.com\/asean\/blog\/biggest-cloud-security-blind-spots\/","url":"https:\/\/blazeclan.com\/blog\/biggest-cloud-security-blind-spots\/","name":"Biggest Cloud Security Blind Spots","isPartOf":{"@id":"https:\/\/blazeclan.com\/asean\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blazeclan.com\/blog\/biggest-cloud-security-blind-spots\/#primaryimage"},"image":{"@id":"https:\/\/blazeclan.com\/blog\/biggest-cloud-security-blind-spots\/#primaryimage"},"thumbnailUrl":"https:\/\/blazeclan.com\/wp-content\/uploads\/2019\/08\/big-security-flaws-1.jpg","datePublished":"2022-11-25T13:12:27+00:00","dateModified":"2023-03-15T13:46:24+00:00","description":"Cybersecurity organizations continue to struggle as there's gaining visibility of cloud infrastructure & resources. Read the blind spots of cloud security.","breadcrumb":{"@id":"https:\/\/blazeclan.com\/blog\/biggest-cloud-security-blind-spots\/#breadcrumb"},"inLanguage":"ASEAN","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blazeclan.com\/blog\/biggest-cloud-security-blind-spots\/"]}]},{"@type":"ImageObject","inLanguage":"ASEAN","@id":"https:\/\/blazeclan.com\/blog\/biggest-cloud-security-blind-spots\/#primaryimage","url":"https:\/\/blazeclan.com\/wp-content\/uploads\/2019\/08\/big-security-flaws-1.jpg","contentUrl":"https:\/\/blazeclan.com\/wp-content\/uploads\/2019\/08\/big-security-flaws-1.jpg","width":1650,"height":680},{"@type":"BreadcrumbList","@id":"https:\/\/blazeclan.com\/blog\/biggest-cloud-security-blind-spots\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blazeclan.com\/asean\/"},{"@type":"ListItem","position":2,"name":"Biggest Cloud Security Blind Spots"}]},{"@type":"WebSite","@id":"https:\/\/blazeclan.com\/asean\/#website","url":"https:\/\/blazeclan.com\/asean\/","name":"Blazeclan","description":"","publisher":{"@id":"https:\/\/blazeclan.com\/asean\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blazeclan.com\/asean\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ASEAN"},{"@type":"Organization","@id":"https:\/\/blazeclan.com\/asean\/#organization","name":"Blazeclan","url":"https:\/\/blazeclan.com\/asean\/","logo":{"@type":"ImageObject","inLanguage":"ASEAN","@id":"https:\/\/blazeclan.com\/asean\/#\/schema\/logo\/image\/","url":"https:\/\/blazeclan.com\/wp-content\/uploads\/2024\/10\/ITCI-Blazeclan_logo.svg","contentUrl":"https:\/\/blazeclan.com\/wp-content\/uploads\/2024\/10\/ITCI-Blazeclan_logo.svg","caption":"Blazeclan"},"image":{"@id":"https:\/\/blazeclan.com\/asean\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/blazeclan.hq\/","https:\/\/x.com\/blazeclan_hq","https:\/\/www.instagram.com\/blazeclantechnologies\/","https:\/\/www.linkedin.com\/company\/blazeclan-technologies\/","https:\/\/www.youtube.com\/channel\/UCCKF4Lcbtus-pUoZr7Lxrow"]},{"@type":"Person","@id":"https:\/\/blazeclan.com\/asean\/#\/schema\/person\/779910eccddff4a1ea6663b6bfb271e8","name":"Team Blazeclan","image":{"@type":"ImageObject","inLanguage":"ASEAN","@id":"https:\/\/blazeclan.com\/asean\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a43c1fa01bb3c7e839254c9084bf11ed422d7e633231f9e935096045af416ba2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a43c1fa01bb3c7e839254c9084bf11ed422d7e633231f9e935096045af416ba2?s=96&d=mm&r=g","caption":"Team Blazeclan"},"sameAs":["http:\/\/localhost\/ps-local-wp"]}]}},"_links":{"self":[{"href":"https:\/\/blazeclan.com\/asean\/wp-json\/wp\/v2\/posts\/29240","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blazeclan.com\/asean\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blazeclan.com\/asean\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blazeclan.com\/asean\/wp-json\/wp\/v2\/users\/192"}],"replies":[{"embeddable":true,"href":"https:\/\/blazeclan.com\/asean\/wp-json\/wp\/v2\/comments?post=29240"}],"version-history":[{"count":0,"href":"https:\/\/blazeclan.com\/asean\/wp-json\/wp\/v2\/posts\/29240\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blazeclan.com\/asean\/wp-json\/wp\/v2\/media\/20457"}],"wp:attachment":[{"href":"https:\/\/blazeclan.com\/asean\/wp-json\/wp\/v2\/media?parent=29240"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blazeclan.com\/asean\/wp-json\/wp\/v2\/categories?post=29240"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blazeclan.com\/asean\/wp-json\/wp\/v2\/tags?post=29240"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}