{"id":1716,"date":"2025-05-15T10:45:28","date_gmt":"2025-05-15T10:45:28","guid":{"rendered":"https:\/\/dataexpert.com.my\/V2\/?page_id=1716"},"modified":"2025-05-15T10:49:14","modified_gmt":"2025-05-15T10:49:14","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/dataexpert.com.my\/V2\/cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1716\" class=\"elementor elementor-1716\">\n\t\t\t\t<div class=\"elementor-element elementor-element-64f56c9 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\" data-id=\"64f56c9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-56846cc e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\" data-id=\"56846cc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-048ab47 elementor-widget elementor-widget-heading\" data-id=\"048ab47\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber Security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-250092f e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\" data-id=\"250092f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5c776b3 e-grid e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-child\" data-id=\"5c776b3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c89d51d elementor-position-left elementor-vertical-align-middle elementor-widget elementor-widget-image-box\" data-id=\"c89d51d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img fetchpriority=\"high\" decoding=\"async\" width=\"562\" height=\"421\" src=\"https:\/\/dataexpert.com.my\/V2\/wp-content\/uploads\/2025\/05\/IBM-Security-ReaQta.png\" class=\"attachment-full size-full wp-image-1719\" alt=\"\" srcset=\"https:\/\/dataexpert.com.my\/V2\/wp-content\/uploads\/2025\/05\/IBM-Security-ReaQta.png 562w, https:\/\/dataexpert.com.my\/V2\/wp-content\/uploads\/2025\/05\/IBM-Security-ReaQta-300x225.png 300w\" sizes=\"(max-width: 562px) 100vw, 562px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">IBM Security ReaQta<\/h3><p class=\"elementor-image-box-description\">Artificial Intelligence detection engines are used both on the endpoints and at \nthe  infrastructural level to identify new patterns of attack.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b8b4c3b e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\" data-id=\"b8b4c3b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2370ead elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"2370ead\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cyber Security IBM Security ReaQta Artificial Intelligence detection engines are used both on the endpoints and at the infrastructural level to identify new patterns of attack.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_canvas","meta":{"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"class_list":["post-1716","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/dataexpert.com.my\/V2\/wp-json\/wp\/v2\/pages\/1716","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dataexpert.com.my\/V2\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dataexpert.com.my\/V2\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dataexpert.com.my\/V2\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dataexpert.com.my\/V2\/wp-json\/wp\/v2\/comments?post=1716"}],"version-history":[{"count":4,"href":"https:\/\/dataexpert.com.my\/V2\/wp-json\/wp\/v2\/pages\/1716\/revisions"}],"predecessor-version":[{"id":1722,"href":"https:\/\/dataexpert.com.my\/V2\/wp-json\/wp\/v2\/pages\/1716\/revisions\/1722"}],"wp:attachment":[{"href":"https:\/\/dataexpert.com.my\/V2\/wp-json\/wp\/v2\/media?parent=1716"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}