{"id":11355,"date":"2025-09-30T10:59:30","date_gmt":"2025-09-30T15:59:30","guid":{"rendered":"https:\/\/www.carahsoft.com\/wordpress\/?p=11355"},"modified":"2025-09-30T11:26:30","modified_gmt":"2025-09-30T16:26:30","slug":"broadcom-cloud-security-complex-threats-clear-solutions-blog-2025","status":"publish","type":"post","link":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-cloud-security-complex-threats-clear-solutions-blog-2025\/","title":{"rendered":"Cloud Security: Complex Threats, Clear Solutions"},"content":{"rendered":"\n<p>Cloud technology, for many years, enticed agencies looking for savings and efficiencies. Organizations pursued \u201ccloud-first\u201d policies that migrated data and applications away from onsite infrastructure and into the control, at least in part, of cloud service providers. While the cloud offered promising advantages, some agencies encountered unexpected cost challenges along the way. And lately, malicious actors have gotten exceptionally good at exploiting cloud vulnerabilities.<\/p>\n\n\n\n<p>There isn\u2019t one way to secure your cloud platform, unfortunately. You need a holistic, Zero Trust approach that combines security controls with cyber policies and procedures. Strong encryption and access rules, automated updates, clear visibility and detailed incident response plans are all critical. Knowing who\u2019s responsible for what should go without saying. And repatriating data \u2014 bringing it back on premises, for example \u2014 is often a commonsense answer.&nbsp;<\/p>\n\n\n\n<p>\u201cAgencies have to comply with stringent regulations \u2026 so that means they need a really robust [security] framework, all while managing the complexities of the cloud environment,\u201d said Garrett Lee, Regional Vice President for Public Sector in Broadcom\u2019s Enterprise Security Group. \u201cCloud, you know, solves some problems, but it also creates some others.\u201d\u202f&nbsp;<\/p>\n\n\n\n<p>In this video interview, Lee explores both the opportunities that cloud computing offers and how to confront its security challenges. Topics include:\u202f&nbsp;<\/p>\n\n\n\n<ul>\n<li>What a holistic approach to cloud security entails<\/li>\n\n\n\n<li>The cost and security drivers behind data repatriation, and why they matter<\/li>\n\n\n\n<li>How to secure four critical domains: endpoints, data, the cloud and networks<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-embed aligncenter is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Cloud Security: Complex Threats, Clear Solutions\" width=\"584\" height=\"329\" src=\"https:\/\/www.youtube.com\/embed\/ttPuotv90J0?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><strong><em>Want to learn more cyber resilience strategies? <\/em><\/strong><a href=\"https:\/\/www.carahsoft.com\/resources\/broadcom-focus-on-cyber-force-multipliers-guide-2025\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Broadcom Cloud Security Blog 2025 - Bottom CTA\"><strong><em>Download Symantec, Carbon Black and Carahsoft\u2019s guide<\/em><\/strong><\/a><strong><em> to explore four critical cyber force multipliers that enhance agencies\u2019 security posture amid growing threats and limited budgets.<\/em><\/strong><\/p>\n\n\n\n<p><em>Carahsoft Technology Corp. is The Trusted Government IT Solutions Provider, supporting Public Sector organizations across Federal, State and Local Government agencies and Education and Healthcare markets. As the Master Government Aggregator\u202ffor our vendor partners, including Broadcom we deliver\u202f<\/em><a data-track=\"Broadcom Cloud Security Blog 2025 - Carahsoft Solve\" href=\"https:\/\/www.carahsoft.com\/solve\" target=\"_blank\" rel=\"noreferrer noopener\"><em>solutions<\/em><\/a><em>\u202ffor Geospatial, Cybersecurity, MultiCloud, DevSecOps, Artificial Intelligence, Customer Experience and Engagement, Open Source and more. Working with resellers, systems integrators and consultants, our sales and marketing teams provide industry leading IT products, services and training through hundreds of contract vehicles. Explore the\u00a0<\/em><a data-track=\"Broadcom Cloud Security Blog 2025 - Carahsoft Blog\" href=\"https:\/\/www.carahsoft.com\/blog\" target=\"_blank\" rel=\"noreferrer noopener\"><em>Carahsoft Blog<\/em><\/a><em>\u00a0to learn more about the latest trends in Government technology markets and solutions, as well as Carahsoft\u2019s ecosystem of partner thought-leaders.<\/em><\/p>\n\n\n\n<p><em>This post originally appeared on&nbsp;<a href=\"https:\/\/www.govloop.com\/cloud-security-complex-threats-clear-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Broadcom Cloud Security Blog 2025 - Original Blog Post\">GovLoop.com<\/a>, and is re-published with permission<\/em><\/p>\n\n\n<p><head><meta name=\"url\" property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/blog\/broadcom-cloud-security-complex-threats-clear-solutions-blog-2025\"><\/head><\/p>","protected":false},"excerpt":{"rendered":"<p>Cloud technology, for many years, enticed agencies looking for savings and efficiencies. Organizations pursued \u201ccloud-first\u201d policies that migrated data and applications away from onsite infrastructure and into the control, at least in part, of cloud service providers. While the cloud &hellip; <a href=\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-cloud-security-complex-threats-clear-solutions-blog-2025\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":11377,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2,1493,952],"tags":[1227,1652,545,611,443],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cloud Security: Complex Threats, Clear Solutions | Carahsoft<\/title>\n<meta name=\"description\" content=\"Explore Broadcom&#039;s cloud technology for Government, uncovering cost challenges and security risks behind cloud-first strategies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-cloud-security-complex-threats-clear-solutions-blog-2025\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud Security: Complex Threats, Clear Solutions | Carahsoft\" \/>\n<meta property=\"og:description\" content=\"Explore Broadcom&#039;s cloud technology for Government, uncovering cost challenges and security risks behind cloud-first strategies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-cloud-security-complex-threats-clear-solutions-blog-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"| Carahsoft\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-30T15:59:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-30T16:26:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/09\/Broadcom-Guest-blog-Legends-branding_875x635-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"875\" \/>\n\t<meta property=\"og:image:height\" content=\"635\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"caduncan@carahsoft.com\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"caduncan@carahsoft.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-cloud-security-complex-threats-clear-solutions-blog-2025\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-cloud-security-complex-threats-clear-solutions-blog-2025\/\"},\"author\":{\"name\":\"caduncan@carahsoft.com\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/7ef36b93fd236bf4ee76ab49a9105ef5\"},\"headline\":\"Cloud Security: Complex Threats, Clear Solutions\",\"datePublished\":\"2025-09-30T15:59:30+00:00\",\"dateModified\":\"2025-09-30T16:26:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-cloud-security-complex-threats-clear-solutions-blog-2025\/\"},\"wordCount\":409,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-cloud-security-complex-threats-clear-solutions-blog-2025\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/09\/Broadcom-Guest-blog-Legends-branding_875x635-1.jpg\",\"keywords\":[\"Broadcom\",\"Cloud Security\",\"Cybersecurity\",\"Federal Government\",\"Zero Trust\"],\"articleSection\":[\"Cybersecurity\",\"Partners\",\"Zero Trust\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-cloud-security-complex-threats-clear-solutions-blog-2025\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-cloud-security-complex-threats-clear-solutions-blog-2025\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-cloud-security-complex-threats-clear-solutions-blog-2025\/\",\"name\":\"Cloud Security: Complex Threats, Clear Solutions | Carahsoft\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-cloud-security-complex-threats-clear-solutions-blog-2025\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-cloud-security-complex-threats-clear-solutions-blog-2025\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/09\/Broadcom-Guest-blog-Legends-branding_875x635-1.jpg\",\"datePublished\":\"2025-09-30T15:59:30+00:00\",\"dateModified\":\"2025-09-30T16:26:30+00:00\",\"description\":\"Explore Broadcom's cloud technology for Government, uncovering cost challenges and security risks behind cloud-first strategies.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-cloud-security-complex-threats-clear-solutions-blog-2025\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-cloud-security-complex-threats-clear-solutions-blog-2025\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-cloud-security-complex-threats-clear-solutions-blog-2025\/#primaryimage\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/09\/Broadcom-Guest-blog-Legends-branding_875x635-1.jpg\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/09\/Broadcom-Guest-blog-Legends-branding_875x635-1.jpg\",\"width\":875,\"height\":635},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/broadcom-cloud-security-complex-threats-clear-solutions-blog-2025\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.carahsoft.com\/wordpress\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud Security: Complex Threats, Clear Solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"name\":\"| Carahsoft\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\",\"name\":\"Carahsoft\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png\",\"width\":3184,\"height\":846,\"caption\":\"Carahsoft\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/7ef36b93fd236bf4ee76ab49a9105ef5\",\"name\":\"caduncan@carahsoft.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/170e441354efb33164baf70f4f675d15?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/170e441354efb33164baf70f4f675d15?s=96&d=mm&r=g\",\"caption\":\"caduncan@carahsoft.com\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloud Security: Complex Threats, Clear Solutions | Carahsoft","description":"Explore Broadcom's cloud technology for Government, uncovering cost challenges and security risks behind cloud-first strategies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-cloud-security-complex-threats-clear-solutions-blog-2025\/","og_locale":"en_US","og_type":"article","og_title":"Cloud Security: Complex Threats, Clear Solutions | Carahsoft","og_description":"Explore Broadcom's cloud technology for Government, uncovering cost challenges and security risks behind cloud-first strategies.","og_url":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-cloud-security-complex-threats-clear-solutions-blog-2025\/","og_site_name":"| Carahsoft","article_published_time":"2025-09-30T15:59:30+00:00","article_modified_time":"2025-09-30T16:26:30+00:00","og_image":[{"width":875,"height":635,"url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/09\/Broadcom-Guest-blog-Legends-branding_875x635-1.jpg","type":"image\/jpeg"}],"author":"caduncan@carahsoft.com","twitter_misc":{"Written by":"caduncan@carahsoft.com","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-cloud-security-complex-threats-clear-solutions-blog-2025\/#article","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-cloud-security-complex-threats-clear-solutions-blog-2025\/"},"author":{"name":"caduncan@carahsoft.com","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/7ef36b93fd236bf4ee76ab49a9105ef5"},"headline":"Cloud Security: Complex Threats, Clear Solutions","datePublished":"2025-09-30T15:59:30+00:00","dateModified":"2025-09-30T16:26:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-cloud-security-complex-threats-clear-solutions-blog-2025\/"},"wordCount":409,"commentCount":0,"publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-cloud-security-complex-threats-clear-solutions-blog-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/09\/Broadcom-Guest-blog-Legends-branding_875x635-1.jpg","keywords":["Broadcom","Cloud Security","Cybersecurity","Federal Government","Zero Trust"],"articleSection":["Cybersecurity","Partners","Zero Trust"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.carahsoft.com\/wordpress\/broadcom-cloud-security-complex-threats-clear-solutions-blog-2025\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-cloud-security-complex-threats-clear-solutions-blog-2025\/","url":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-cloud-security-complex-threats-clear-solutions-blog-2025\/","name":"Cloud Security: Complex Threats, Clear Solutions | Carahsoft","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-cloud-security-complex-threats-clear-solutions-blog-2025\/#primaryimage"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-cloud-security-complex-threats-clear-solutions-blog-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/09\/Broadcom-Guest-blog-Legends-branding_875x635-1.jpg","datePublished":"2025-09-30T15:59:30+00:00","dateModified":"2025-09-30T16:26:30+00:00","description":"Explore Broadcom's cloud technology for Government, uncovering cost challenges and security risks behind cloud-first strategies.","breadcrumb":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-cloud-security-complex-threats-clear-solutions-blog-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.carahsoft.com\/wordpress\/broadcom-cloud-security-complex-threats-clear-solutions-blog-2025\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-cloud-security-complex-threats-clear-solutions-blog-2025\/#primaryimage","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/09\/Broadcom-Guest-blog-Legends-branding_875x635-1.jpg","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/09\/Broadcom-Guest-blog-Legends-branding_875x635-1.jpg","width":875,"height":635},{"@type":"BreadcrumbList","@id":"https:\/\/www.carahsoft.com\/wordpress\/broadcom-cloud-security-complex-threats-clear-solutions-blog-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.carahsoft.com\/wordpress\/"},{"@type":"ListItem","position":2,"name":"Cloud Security: Complex Threats, Clear Solutions"}]},{"@type":"WebSite","@id":"https:\/\/www.carahsoft.com\/wordpress\/#website","url":"https:\/\/www.carahsoft.com\/wordpress\/","name":"| Carahsoft","description":"","publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization","name":"Carahsoft","url":"https:\/\/www.carahsoft.com\/wordpress\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png","width":3184,"height":846,"caption":"Carahsoft"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/7ef36b93fd236bf4ee76ab49a9105ef5","name":"caduncan@carahsoft.com","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/170e441354efb33164baf70f4f675d15?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/170e441354efb33164baf70f4f675d15?s=96&d=mm&r=g","caption":"caduncan@carahsoft.com"}}]}},"_links":{"self":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/11355"}],"collection":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/comments?post=11355"}],"version-history":[{"count":4,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/11355\/revisions"}],"predecessor-version":[{"id":11362,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/11355\/revisions\/11362"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media\/11377"}],"wp:attachment":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media?parent=11355"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/categories?post=11355"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/tags?post=11355"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}