{
"author": {
"name": "Roger Francis",
"webUrl": "/author/profile/roger-francis/",
"description": "",
"imageLarge": "https://secure.gravatar.com/avatar/f16d6fc2845f417ea0e93a3f2b6cd37d?s=136&d=mm&r=g",
"estimate": 2,
"social": [],
"articles": [
{
"uri": "/2023/06/29/developing-proactive-cyber-threat-intelligence/",
"title": "Developing proactive cyberthreat intelligence",
"byline": "Roger Francis",
"kicker": "Analysis",
"prettyDate": "June 29, 2023",
"timeToRead": "8 minute",
"image": {
"uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2023/06/f4-Cyber-Threat-Security_Falcon.jpg",
"width": "767",
"height": "633"
},
"authors": [
{
"webUrl": "/author/profile/roger-francis/",
"name": "Roger Francis"
}
],
"kickerNode": [
{
"uri": "/analysis/",
"sectionName": "Analysis"
}
],
"summary": "The best threat intelligence lets organizations improve their risk profile, thwart cyberattacks and avoid losses.",
"body": null
},
{
"uri": "/2021/10/12/exploitable-application-flaws-increase-cyber-risks/",
"title": "Exploitable application flaws increase cyber risks",
"byline": "Roger Francis",
"kicker": "Case Study",
"prettyDate": "October 12, 2021",
"timeToRead": "7 minute",
"image": {
"uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2021/10/Cyber-security-flaws_falcon.jpg",
"width": "617",
"height": "373"
},
"authors": [
{
"webUrl": "/author/profile/roger-francis/",
"name": "Roger Francis"
}
],
"kickerNode": [
{
"uri": "/case-study/",
"sectionName": "Case Study"
}
],
"summary": "A serious Microsoft vulnerability proved why paying claims can't be the only function of cyber insurance.",
"body": null
}
]
}
}