{"id":451,"date":"2025-06-06T10:30:00","date_gmt":"2025-06-06T10:30:00","guid":{"rendered":"https:\/\/infosec-daily.com\/?page_id=451"},"modified":"2025-06-06T10:30:00","modified_gmt":"2025-06-06T10:30:00","slug":"inside-the-mind-of-the-adversary-why-more-security-leaders-are-selecting-aev","status":"publish","type":"page","link":"https:\/\/infosec-daily.com\/?page_id=451","title":{"rendered":"Inside the Mind of the Adversary: Why More Security Leaders Are Selecting AEV"},"content":{"rendered":"<p>Cybersecurity involves both playing the good guy and the bad guy. Diving deep into advanced technologies and yet also going rogue in the Dark Web. Defining technical policies and also profiling attacker behavior. Security teams cannot be focused on just ticking boxes, they need to inhabit the attacker\u2019s mindset.<br \/>\nThis is where AEV comes in.<br \/>\nAEV (Adversarial Exposure Validation) is an advanced<\/p>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity involves both playing the good guy and the bad guy. Diving deep into advanced technologies and yet also going rogue in the Dark Web. Defining technical policies and also&hellip;<\/p>\n","protected":false},"author":1,"featured_media":452,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"saved_in_kubio":false,"footnotes":""},"class_list":["post-451","page","type-page","status-publish","has-post-thumbnail","hentry"],"kubio_ai_page_context":{"short_desc":"","purpose":"general"},"_links":{"self":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/451","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=451"}],"version-history":[{"count":0,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/451\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/media\/452"}],"wp:attachment":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=451"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}