{"id":5,"date":"2009-08-03T08:58:10","date_gmt":"2009-08-03T15:58:10","guid":{"rendered":"http:\/\/staging.paloaltonetworks.com\/wp2\/?page_id=5"},"modified":"2012-06-16T12:45:15","modified_gmt":"2012-06-16T19:45:15","slug":"threat-vault","status":"publish","type":"page","link":"https:\/\/www.paloaltonetworks.com\/blog\/threat-vault\/","title":{"rendered":"Threat Vault"},"content":{"rendered":"<p>The Threat Vault enables authorized users to research the latest threats (vulnerabilities\/exploits, viruses, and spyware) that Palo Alto Networks next-generation firewalls can detect and prevent. The Threat Vault is backed by the world class Palo Alto Networks threat research team and every entry contains a description, severity ranking, and links to more information for each threat.<\/p>\n<p><a target=\"_threatvault\" href=\"https:\/\/threatvault.paloaltonetworks.com\">Login to Threat Vault<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Threat Vault enables authorized users to research the latest threats (vulnerabilities\/exploits, viruses, and spyware) that Palo Alto Networks next-generation firewalls can detect and prevent. The Threat Vault is backed by the &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"coauthors":[],"class_list":["post-5","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/pages\/5","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=5"}],"version-history":[{"count":9,"href":"https:\/\/www.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/pages\/5\/revisions"}],"predecessor-version":[{"id":2571,"href":"https:\/\/www.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/pages\/5\/revisions\/2571"}],"wp:attachment":[{"href":"https:\/\/www.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=5"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=5"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}