{"id":25628,"date":"2025-07-24T22:22:55","date_gmt":"2025-07-25T02:22:55","guid":{"rendered":"https:\/\/www.sherweb.com\/blog\/?p=25628"},"modified":"2025-09-29T02:14:23","modified_gmt":"2025-09-29T06:14:23","slug":"operational-cybersecurity-for-msps","status":"publish","type":"post","link":"https:\/\/www.sherweb.com\/blog\/security\/operational-cybersecurity-for-msps\/","title":{"rendered":"Beyond tools: Integration, automation and workflow that makes security move"},"content":{"rendered":"<p><em>Most stacks can detect threats. Very few know what to do next. In this follow-up, Cybersecurity Technical Fellow <a href=\"https:\/\/www.sherweb.com\/blog\/tag\/author-roddy-bergeron\/\">Roddy Bergeron<\/a> explores the operational cybersecurity for MSPs that turns alerts into action. <a href=\"https:\/\/www.sherweb.com\/blog\/security\/security-stack-for-msps\/\">Missed Part 1? Start here \u203a<\/a><\/em><\/p>\n<p><strong>There\u2019s no shortage of MSPs with good security tools.<\/strong><br \/>\nWhat\u2019s rare is a team that knows exactly what happens (step-by-step) after something goes wrong.<\/p>\n<p>That\u2019s the real test of a security stack: not what it blocks, but how it behaves under pressure.<\/p>\n<p>Because when security is truly operationalized, response is immediate. Isolation is automatic. Escalation is predictable. The stack doesn\u2019t panic. It acts.<\/p>\n<p>But you don\u2019t get that from a vendor demo or a product lineup. You get there by wiring your tools together, designing workflows that move without manual input, and rehearsing your incident response like it\u2019s second nature.<\/p>\n<p>That\u2019s where most MSPs fall short. Not on intent, but on execution.<\/p>\n<p>Building a security stack is easy. Making it move is where most MSPs get stuck.<\/p>\n<h2>The hidden work of building a stack<\/h2>\n<p>The security industry loves to talk about \u201cbest-of-breed.\u201d But let me be clear: <strong>stack sprawl doesn\u2019t protect anyone<\/strong>.<\/p>\n<p>Integration is where real security happens.<\/p>\n<h2>Integration: The necessary grind<\/h2>\n<p>Everybody loves to talk about \u201cbest-of-breed\u201d tools, like if you collect enough shiny boxes, you\u2019re protected. The reality? If those boxes don\u2019t talk to each other, you\u2019re just creating more work and more risk. That\u2019s stack sprawl.<\/p>\n<p>More tools, more dashboards, more alerts, but none of it connected. It\u2019s the fastest way to drown your team in noise and blind spots. A tool that can\u2019t share intelligence or trigger actions across your environment isn\u2019t adding value, it\u2019s adding overhead. Every gap between products is time lost. Every alert that needs a human to push it forward is a potential breach expanding.<\/p>\n<p>I tell partners constantly, adding more people won\u2019t scale your security. Scaling comes from making your tools talk, so they handle the grunt work, and your team can focus on the threats only humans can solve.<\/p>\n<p>Integration is the gritty, unglamorous work that no one advertises but every MSP needs. It\u2019s building the glue that connects alerts to actions, so your stack doesn\u2019t just detect threats, it stops them before they spread.<\/p>\n<p>Let\u2019s say, your endpoint flags ransomware behavior. Without integration, it\u2019s just one alert among thousands, waiting for a human to notice. With integration, that alert isolates the device, opens a ticket and fires notifications with context to the right people automatically.<\/p>\n<p>But building that association isn\u2019t easy. It\u2019s not just flipping switches or clicking \u201cconnect\u201d buttons. \u00a0It means custom scripts, wrestling with APIs, normalizing log data, and constant tuning that have to work perfectly every time. It\u2019s workflow architecture, incident choreography, and relentless testing and designing escalation paths that don\u2019t bury critical alerts.<\/p>\n<p>The operational grind behind integration is the kind of work MSPs avoid because it\u2019s invisible until it breaks and then it breaks hard. But you build that muscle slowly, learning from every glitch and breach avoided.<\/p>\n<p>No shortcuts. No magic. Just relentless, unsexy integration.<\/p>\n<h2>Operationalizing the stack: Where security actually lives<\/h2>\n<p>You can have every tool perfectly integrated, every alert automated, but if your team isn\u2019t running the playbooks, none of it matters.<\/p>\n<p>Security lives in the daily grind. The repetitive work nobody celebrates but every MSP survives or fails on. It\u2019s in the documented workflows your techs follow without guessing. It\u2019s in the drills and tabletop exercises that turn chaos into choreography. It\u2019s in the discipline to apply the same baseline controls to every client, not \u201cthat one gets special treatment.\u201d<\/p>\n<p>The real challenge isn\u2019t the technology. It\u2019s the people and processes.<\/p>\n<p>Because when an alert fires at 2 AM, the difference between a crisis and a close call is whether your team knows exactly what to do next without scrambling, guessing or calling for backup.<\/p>\n<p>If your incident response feels like a coin toss, if every client\u2019s environment is a snowflake, if your team is chasing alerts instead of managing them then your stack isn\u2019t operational. It\u2019s an expensive mess.<\/p>\n<p>Security doesn\u2019t live in your product list or your integrations. It lives in your everyday operations, every shift, every incident.<\/p>\n<p>That\u2019s where the real work happens.<\/p>\n<h2>Why this matters: Security as a growth engine<\/h2>\n<p>Let me be blunt: MSPs who see security as just overhead are stuck in the slow lane.<\/p>\n<p>The winners\u2014those landing bigger clients and keeping them for years\u2014treat security differently. Not as proof they can handle the worst without blinking. This goes beyond the usual product pitch or checkbox.<\/p>\n<p>Clients don\u2019t care about your toolset. They care about what happens when everything goes sideways.<\/p>\n<p>A solid stack doesn\u2019t just cut incident counts. It flips the whole conversation.<\/p>\n<p>When you can say with confidence that your stack:<\/p>\n<ul>\n<li>Reduces the impact of a breach<\/li>\n<li>Responds in seconds, not hours<\/li>\n<li>Keeps your clients\u2019 business humming with minimal disruption<\/li>\n<\/ul>\n<p>You\u2019re no longer fighting on price. You\u2019re trading on trust. And trust wins deals.<\/p>\n<h2><strong>The takeaway: Stop buying, start building<\/strong><\/h2>\n<p>Here\u2019s the challenge: next time you look at your security investments, don\u2019t ask what tool you\u2019re missing. Ask what your stack can do when you\u2019re not there.<\/p>\n<ul>\n<li>Are your tools running themselves or is your team running in circles managing them?<\/li>\n<li>Has your team become nose blind to notifications due to alert fatigue?<\/li>\n<li>Do your detections kick off real actions or just dump more to-dos into inboxes?<\/li>\n<li>Is your security designed to protect or just to check boxes and gather dust?<\/li>\n<\/ul>\n<p>A good security stack isn\u2019t a catalog of products. It\u2019s a system that moves on its own relentlessly, precisely, without waiting on humans.<\/p>\n<p>Because real security doesn\u2019t pause. It doesn\u2019t wait for someone to hit \u201cgo.\u201d It acts.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most stacks can detect threats. Very few know what to do next. In this follow-up, Cybersecurity T","protected":false},"author":188,"featured_media":25629,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[753],"tags":[919,1121,1143,1144,1145,1146],"class_list":["post-25628","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-cybersecurity","tag-author-roddy-bergeron","tag-operational-security","tag-security-workflows","tag-cybersecurity-automation","tag-msp-incident-response"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Beyond tools: Integration, automation and workflow that makes security move | Sherweb<\/title>\n<meta name=\"description\" content=\"If your stack waits, your clients pay. Explore how operational cybersecurity for MSPs transforms tools into fast, integrated threat response.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sherweb.com\/blog\/security\/operational-cybersecurity-for-msps\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Beyond tools: Integration, automation and workflow that makes security move | Sherweb\" \/>\n<meta property=\"og:description\" content=\"If your stack waits, your clients pay. Explore how operational cybersecurity for MSPs transforms tools into fast, integrated threat response.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sherweb.com\/blog\/security\/operational-cybersecurity-for-msps\/\" \/>\n<meta property=\"og:site_name\" content=\"Sherweb\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Sherweb\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-25T02:22:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-29T06:14:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/Beyond-tools-1200x480-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roddy Bergeron\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:site\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roddy Bergeron\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/operational-cybersecurity-for-msps\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/operational-cybersecurity-for-msps\\\/\"},\"author\":{\"name\":\"Roddy Bergeron\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/f6a0c8e1d541dbeb57fd3e025b325795\"},\"headline\":\"Beyond tools: Integration, automation and workflow that makes security move\",\"datePublished\":\"2025-07-25T02:22:55+00:00\",\"dateModified\":\"2025-09-29T06:14:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/operational-cybersecurity-for-msps\\\/\"},\"wordCount\":1012,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/operational-cybersecurity-for-msps\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Beyond-tools-1200x480-1.jpg\",\"keywords\":[\"Cybersecurity\",\"Author: Roddy Bergeron\",\"Operational Security\",\"Security Workflows\",\"Cybersecurity Automation\",\"MSP Incident Response\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/operational-cybersecurity-for-msps\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/operational-cybersecurity-for-msps\\\/\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/operational-cybersecurity-for-msps\\\/\",\"name\":\"Beyond tools: Integration, automation and workflow that makes security move | Sherweb\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/operational-cybersecurity-for-msps\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/operational-cybersecurity-for-msps\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Beyond-tools-1200x480-1.jpg\",\"datePublished\":\"2025-07-25T02:22:55+00:00\",\"dateModified\":\"2025-09-29T06:14:23+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/f6a0c8e1d541dbeb57fd3e025b325795\"},\"description\":\"If your stack waits, your clients pay. Explore how operational cybersecurity for MSPs transforms tools into fast, integrated threat response.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/operational-cybersecurity-for-msps\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/operational-cybersecurity-for-msps\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/operational-cybersecurity-for-msps\\\/#primaryimage\",\"url\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Beyond-tools-1200x480-1.jpg\",\"contentUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Beyond-tools-1200x480-1.jpg\",\"width\":2400,\"height\":920,\"caption\":\"operational cybersecurity for MSPs\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/operational-cybersecurity-for-msps\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Beyond tools: Integration, automation and workflow that makes security move\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\",\"name\":\"Sherweb\",\"description\":\"More than a cloud marketplace\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/f6a0c8e1d541dbeb57fd3e025b325795\",\"name\":\"Roddy Bergeron\",\"description\":\"Roddy Bergeron's career has taken various paths including government auditing, nonprofit work, public\\\/private partnerships with the State of Louisiana, helping build an MSP by building their managed service, managed security, vCISO and compliance programs, and now as the Cybersecurity Technical Fellow with Sherweb. Roddy has obtained many certifications over the years including his MCSE, CCNA:Security, CEH, CCSP, CISSP and CSAP. Our MSP community is extremely important to Roddy and he loves giving back to the community that has helped him out so much over the years. Roddy hopes to continue to help other MSPs succeed and raise the cybersecurity tide for our industry.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/roddy-bergeron-cissp-ccsp-csap-33432573\\\/\"],\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/author\\\/roddy-bergeron\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Beyond tools: Integration, automation and workflow that makes security move | Sherweb","description":"If your stack waits, your clients pay. Explore how operational cybersecurity for MSPs transforms tools into fast, integrated threat response.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sherweb.com\/blog\/security\/operational-cybersecurity-for-msps\/","og_locale":"en_US","og_type":"article","og_title":"Beyond tools: Integration, automation and workflow that makes security move | Sherweb","og_description":"If your stack waits, your clients pay. Explore how operational cybersecurity for MSPs transforms tools into fast, integrated threat response.","og_url":"https:\/\/www.sherweb.com\/blog\/security\/operational-cybersecurity-for-msps\/","og_site_name":"Sherweb","article_publisher":"https:\/\/www.facebook.com\/Sherweb","article_published_time":"2025-07-25T02:22:55+00:00","article_modified_time":"2025-09-29T06:14:23+00:00","og_image":[{"width":2400,"height":920,"url":"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/Beyond-tools-1200x480-1.jpg","type":"image\/jpeg"}],"author":"Roddy Bergeron","twitter_card":"summary_large_image","twitter_creator":"@SherWeb","twitter_site":"@SherWeb","twitter_misc":{"Written by":"Roddy Bergeron","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sherweb.com\/blog\/security\/operational-cybersecurity-for-msps\/#article","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/operational-cybersecurity-for-msps\/"},"author":{"name":"Roddy Bergeron","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/f6a0c8e1d541dbeb57fd3e025b325795"},"headline":"Beyond tools: Integration, automation and workflow that makes security move","datePublished":"2025-07-25T02:22:55+00:00","dateModified":"2025-09-29T06:14:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/operational-cybersecurity-for-msps\/"},"wordCount":1012,"commentCount":0,"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/operational-cybersecurity-for-msps\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/Beyond-tools-1200x480-1.jpg","keywords":["Cybersecurity","Author: Roddy Bergeron","Operational Security","Security Workflows","Cybersecurity Automation","MSP Incident Response"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sherweb.com\/blog\/security\/operational-cybersecurity-for-msps\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sherweb.com\/blog\/security\/operational-cybersecurity-for-msps\/","url":"https:\/\/www.sherweb.com\/blog\/security\/operational-cybersecurity-for-msps\/","name":"Beyond tools: Integration, automation and workflow that makes security move | Sherweb","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/operational-cybersecurity-for-msps\/#primaryimage"},"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/operational-cybersecurity-for-msps\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/Beyond-tools-1200x480-1.jpg","datePublished":"2025-07-25T02:22:55+00:00","dateModified":"2025-09-29T06:14:23+00:00","author":{"@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/f6a0c8e1d541dbeb57fd3e025b325795"},"description":"If your stack waits, your clients pay. Explore how operational cybersecurity for MSPs transforms tools into fast, integrated threat response.","breadcrumb":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/operational-cybersecurity-for-msps\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sherweb.com\/blog\/security\/operational-cybersecurity-for-msps\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sherweb.com\/blog\/security\/operational-cybersecurity-for-msps\/#primaryimage","url":"\/blog\/wp-content\/uploads\/Beyond-tools-1200x480-1.jpg","contentUrl":"\/blog\/wp-content\/uploads\/Beyond-tools-1200x480-1.jpg","width":2400,"height":920,"caption":"operational cybersecurity for MSPs"},{"@type":"BreadcrumbList","@id":"https:\/\/www.sherweb.com\/blog\/security\/operational-cybersecurity-for-msps\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sherweb.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.sherweb.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Beyond tools: Integration, automation and workflow that makes security move"}]},{"@type":"WebSite","@id":"https:\/\/www.sherweb.com\/blog\/#website","url":"https:\/\/www.sherweb.com\/blog\/","name":"Sherweb","description":"More than a cloud marketplace","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/f6a0c8e1d541dbeb57fd3e025b325795","name":"Roddy Bergeron","description":"Roddy Bergeron's career has taken various paths including government auditing, nonprofit work, public\/private partnerships with the State of Louisiana, helping build an MSP by building their managed service, managed security, vCISO and compliance programs, and now as the Cybersecurity Technical Fellow with Sherweb. Roddy has obtained many certifications over the years including his MCSE, CCNA:Security, CEH, CCSP, CISSP and CSAP. Our MSP community is extremely important to Roddy and he loves giving back to the community that has helped him out so much over the years. Roddy hopes to continue to help other MSPs succeed and raise the cybersecurity tide for our industry.","sameAs":["https:\/\/www.linkedin.com\/in\/roddy-bergeron-cissp-ccsp-csap-33432573\/"],"url":"https:\/\/www.sherweb.com\/blog\/author\/roddy-bergeron\/"}]}},"tag_names":["Cybersecurity","Author: Roddy Bergeron","Operational Security","Security Workflows","Cybersecurity Automation","MSP Incident Response"],"_links":{"self":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/25628","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/users\/188"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/comments?post=25628"}],"version-history":[{"count":2,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/25628\/revisions"}],"predecessor-version":[{"id":25631,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/25628\/revisions\/25631"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media\/25629"}],"wp:attachment":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media?parent=25628"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/categories?post=25628"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/tags?post=25628"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}