Warning: Invalid argument supplied for foreach() in /home/podcastmag/public_html/wp-content/themes/fox/inc/admin/import.php on line 298

Warning: Cannot modify header information - headers already sent by (output started at /home/podcastmag/public_html/wp-content/themes/fox/inc/admin/import.php:298) in /home/podcastmag/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1794

Warning: Cannot modify header information - headers already sent by (output started at /home/podcastmag/public_html/wp-content/themes/fox/inc/admin/import.php:298) in /home/podcastmag/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1794

Warning: Cannot modify header information - headers already sent by (output started at /home/podcastmag/public_html/wp-content/themes/fox/inc/admin/import.php:298) in /home/podcastmag/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1794

Warning: Cannot modify header information - headers already sent by (output started at /home/podcastmag/public_html/wp-content/themes/fox/inc/admin/import.php:298) in /home/podcastmag/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1794

Warning: Cannot modify header information - headers already sent by (output started at /home/podcastmag/public_html/wp-content/themes/fox/inc/admin/import.php:298) in /home/podcastmag/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1794

Warning: Cannot modify header information - headers already sent by (output started at /home/podcastmag/public_html/wp-content/themes/fox/inc/admin/import.php:298) in /home/podcastmag/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1794

Warning: Cannot modify header information - headers already sent by (output started at /home/podcastmag/public_html/wp-content/themes/fox/inc/admin/import.php:298) in /home/podcastmag/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1794

Warning: Cannot modify header information - headers already sent by (output started at /home/podcastmag/public_html/wp-content/themes/fox/inc/admin/import.php:298) in /home/podcastmag/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1794
{"id":11673,"date":"2021-12-03T14:04:43","date_gmt":"2021-12-03T22:04:43","guid":{"rendered":"https:\/\/podcastmagazine.com\/?p=11673"},"modified":"2021-12-06T14:23:41","modified_gmt":"2021-12-06T22:23:41","slug":"smashing-security-and-perspectives","status":"publish","type":"post","link":"https:\/\/podcastmagazine.com\/smashing-security-and-perspectives","title":{"rendered":"Smashing Security AND Perspectives\u2026"},"content":{"rendered":"

Over the last several years, cybersecurity podcasts have been on the rise as threats have escalated around the world. No longer relegated to only those \u201cin the know,\u201d cybersecurity has become a relevant and ever-present aspect of the day-to-day consciousness of anyone who uses a device. And as smart devices creep into our homes via appliances, lightbulbs, doorbell cams, and even medical devices like pacemakers, the threat of a hack is everywhere.<\/span><\/p>\n

Enter <\/span>Smashing Security<\/span><\/i>, a U.K.-based show that has taken on the world of podcasts and won. Having generated close to seven million downloads, this is not just a \u2018geek-to-geek\u2019 show. Rather, as host Graham Cluley says, <\/span>\u201cIt is a show for everyone, because cybersecurity affects geeks and non-geeks alike.\u201d<\/span><\/i>\u00a0<\/span><\/p>\n

A massive fan of the show <\/span>Doctor Who<\/span><\/i>, Graham has a bit of the Doctor in him. The TARDIS could almost be a metaphor for how vast the world of cybersecurity is and how small it seems to the outsider. (If you don\u2019t know what the TARDIS is, or Doctor Who, just Google it\u2026 or, email Graham, and he will gladly enlighten you.)<\/span><\/p>\n

Graham and his co-host, Carole Theriault, have worked together in one capacity or another for over a decade. They also had a third co-host, Vanja Svajcer, for ten episodes, but he changed jobs, and the new company wanted oversight of the show in order for him to appear. Believe it or not, that happens frequently in the technology podcasting world.\u00a0<\/span><\/p>\n

After listening to the show, though, you probably would not be able to imagine a third host, because the banter between Graham and Carole and their insightful questioning of guests makes one feel as if there is no topic they cannot discuss thoroughly on their own.<\/span><\/h3>\n

Graham believes that <\/span>\u201cpeople\u2019s lives have a rhythm,\u201d<\/span><\/i> and they want their show to become part of it. What does that mean exactly? They are consistent in the show\u2019s recording and posting schedule, allowing them to fit into the life rhythms of their listeners. According to Graham, <\/span>\u201cThe lovely thing about podcasts is that you can listen to them while you\u2019re doing anything\u2014fixing the car, walking the dog, or doing the gardening.\u201d\"\"<\/span><\/i><\/p>\n

For someone who works on the cutting edge of technology and threat prevention, you might be surprised to learn that Graham is a fan of retro TV\u2026 and not just the black-and-white reruns of the classic <\/span>Doctor Who<\/span><\/i>. In truth, Graham says he <\/span>\u201cfalls asleep\u201d <\/span><\/i>when he goes to <\/span>\u201ccinema today.\u201d<\/span><\/i> All the action and CGI doesn\u2019t keep his interest. For him, it is like <\/span>\u201cwatching a washing machine fight a dishwasher.\u201d<\/span><\/i> He prefers <\/span>\u201cthe slow, nothing much happening as a story builds\u201d <\/span><\/i>type of entertainment. Kind of like the podcast\u2014the story builds, and you are not always sure which path the conversation will take. One fan described the show this way: <\/span>\u201cIt\u2019s like one person is trying to tell a story, and the other two keep trying to derail it.\u201d<\/span><\/i><\/p>\n

Originally, Carole was the one who wanted to start the podcast, but Graham was not interested. They had already done one, the <\/span>Sophos Security Podcast<\/span><\/i>, way back before podcasts really were what they are today, but they then left <\/span>Sophos <\/span><\/i>and started their own businesses, thereby ending the show. Flash forward to 2016, and with Google Hangouts came the award-winning <\/span>Smashing Security<\/span><\/i>. Graham quickly moved away from video and the live format, and now, they record and edit their episodes to drop every Wednesday at 7:00 p.m. EST. Those who support them on Patreon get the episode a few hours earlier.<\/span><\/p>\n

Despite their millions of downloads, Graham is surprisingly humble. He is still the young man who learned to code by inputting code from magazines on a Sinclair ZX81 with 1k of memory <\/span>\u201cand a rubbish keyboard\u201d <\/span><\/i>that his dad brought home one day.<\/span><\/h3>\n

He later created a computer adventure game distributed for free via shareware on floppy disks in those same magazines. If players liked the game, they could send him a check for five or ten pounds in thanks, and he would offer help if they were stumped by the puzzles. Nowadays, inputting code from a magazine would end up on an episode of <\/span>Smashing Security<\/span><\/i> to detail how you can\u2019t trust a program just because it appears to be from a reputable source.<\/span><\/p>\n

That game secured him his first tech job as the first Windows programmer of Dr. Solomon\u2019s Anti-Virus Toolkit. Dr. Alan Solomon was a fan of the game, so he sent him a check, some cheesy biscuits, and a note that said, <\/span>\u201cLove the games. If you want a job, call me.\u201d<\/span><\/i> With that note, Graham\u2019s career in cybersecurity was launched.<\/span><\/p>\n

What began as a love of programing, talking, classic TV, and the Beatles morphed into one of the top cybersecurity podcasts in the world. Yet Graham is still always shocked when fans reach out to say they\u2019re listening. He treasures every review, email, letter, and guest who agrees to be featured, and he has traveled and spoken around the world, meeting fans and exploring how alike yet different we all are.\u00a0<\/span><\/p>\n

A lover of chess, he landed legend Garry Kasparov on the show twice and even got to play a game with him. Nope, he didn\u2019t win\u2014which didn\u2019t matter, though\u2014just being able to talk to someone he respects is what it is all about for Graham.<\/span><\/p>\n

That and pure fun, that is. Graham is all about having fun while doing life. If something becomes a job or chore, he considers moving on.\u00a0<\/span><\/p>\n

With this being the December issue of <\/span>Podcast Magazine<\/span><\/i>\u00ae, I can\u2019t think of a better gift to give yourself than having a listen to <\/span>Smashing Security<\/span><\/i>. Then, let Graham and his incredible co-host Carole know what you think. If you do reach out, expect a response back, because Graham is just that kind of host.<\/span><\/p>\n

 <\/p>\n

December 2021 Issue<\/p>\n","protected":false},"excerpt":{"rendered":"

Over the last several years, cybersecurity podcasts have been on the rise as threats have escalated around the world. No longer relegated to only those \u201cin the know,\u201d cybersecurity has become a relevant and ever-present aspect of the day-to-day consciousness of anyone who uses a device. And as smart devices creep into our homes via appliances, lightbulbs, doorbell cams, and even medical devices like pacemakers, the threat of a hack is everywhere. Enter Smashing Security, a U.K.-based show that has taken on the world of podcasts and won. Having generated close to seven million downloads, this is not just a<\/p>\n","protected":false},"author":21,"featured_media":11675,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[48],"tags":[2289,2291,2288,2287,2286,2292,192,2290],"acf":[],"yoast_head":"\nSmashing Security AND Perspectives\u2026 - Podcast Magazine\u00ae<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/podcastmagazine.com\/smashing-security-and-perspectives\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Smashing Security AND Perspectives\u2026 - Podcast Magazine\u00ae\" \/>\n<meta property=\"og:description\" content=\"Over the last several years, cybersecurity podcasts have been on the rise as threats have escalated around the world. No longer relegated to only those \u201cin the know,\u201d cybersecurity has become a relevant and ever-present aspect of the day-to-day consciousness of anyone who uses a device. And as smart devices creep into our homes via appliances, lightbulbs, doorbell cams, and even medical devices like pacemakers, the threat of a hack is everywhere. Enter Smashing Security, a U.K.-based show that has taken on the world of podcasts and won. Having generated close to seven million downloads, this is not just a\" \/>\n<meta property=\"og:url\" content=\"https:\/\/podcastmagazine.com\/smashing-security-and-perspectives\" \/>\n<meta property=\"og:site_name\" content=\"Podcast Magazine\u00ae\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ThePodcastMag\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-03T22:04:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-06T22:23:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/podcastmagazine.com\/wp-content\/uploads\/2021\/12\/IMG_0128-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1441\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Laura Steward\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@thepodcastmag\" \/>\n<meta name=\"twitter:site\" content=\"@thepodcastmag\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Laura Steward\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/podcastmagazine.com\/smashing-security-and-perspectives#article\",\"isPartOf\":{\"@id\":\"https:\/\/podcastmagazine.com\/smashing-security-and-perspectives\"},\"author\":{\"name\":\"Laura Steward\",\"@id\":\"https:\/\/podcastmagazine.com\/#\/schema\/person\/dd5638c66877f1433c38b4b795106cd3\"},\"headline\":\"Smashing Security AND Perspectives\u2026\",\"datePublished\":\"2021-12-03T22:04:43+00:00\",\"dateModified\":\"2021-12-06T22:23:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/podcastmagazine.com\/smashing-security-and-perspectives\"},\"wordCount\":1001,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/podcastmagazine.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/podcastmagazine.com\/smashing-security-and-perspectives#primaryimage\"},\"thumbnailUrl\":\"https:\/\/podcastmagazine.com\/wp-content\/uploads\/2021\/12\/IMG_0128-scaled.jpg\",\"keywords\":[\"Carole Theriault\",\"Doctor Who\",\"Graham Culey\",\"Smashing Security\",\"Smashing Security Podcast\",\"Sophos Security Podcast\",\"technology podcasts\",\"Vanja Svajcer\"],\"articleSection\":[\"Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/podcastmagazine.com\/smashing-security-and-perspectives#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/podcastmagazine.com\/smashing-security-and-perspectives\",\"url\":\"https:\/\/podcastmagazine.com\/smashing-security-and-perspectives\",\"name\":\"Smashing Security AND Perspectives\u2026 - Podcast Magazine\u00ae\",\"isPartOf\":{\"@id\":\"https:\/\/podcastmagazine.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/podcastmagazine.com\/smashing-security-and-perspectives#primaryimage\"},\"image\":{\"@id\":\"https:\/\/podcastmagazine.com\/smashing-security-and-perspectives#primaryimage\"},\"thumbnailUrl\":\"https:\/\/podcastmagazine.com\/wp-content\/uploads\/2021\/12\/IMG_0128-scaled.jpg\",\"datePublished\":\"2021-12-03T22:04:43+00:00\",\"dateModified\":\"2021-12-06T22:23:41+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/podcastmagazine.com\/smashing-security-and-perspectives\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/podcastmagazine.com\/smashing-security-and-perspectives#primaryimage\",\"url\":\"https:\/\/podcastmagazine.com\/wp-content\/uploads\/2021\/12\/IMG_0128-scaled.jpg\",\"contentUrl\":\"https:\/\/podcastmagazine.com\/wp-content\/uploads\/2021\/12\/IMG_0128-scaled.jpg\",\"width\":2560,\"height\":1441},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/podcastmagazine.com\/#website\",\"url\":\"https:\/\/podcastmagazine.com\/\",\"name\":\"Podcast Magazine\u00ae\",\"description\":\"Beyond the Microphone\",\"publisher\":{\"@id\":\"https:\/\/podcastmagazine.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/podcastmagazine.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/podcastmagazine.com\/#organization\",\"name\":\"Podcast Magazine\",\"url\":\"https:\/\/podcastmagazine.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/podcastmagazine.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/podcastmagazine.com\/wp-content\/uploads\/2021\/01\/Podcast_logo_minimal.png\",\"contentUrl\":\"https:\/\/podcastmagazine.com\/wp-content\/uploads\/2021\/01\/Podcast_logo_minimal.png\",\"width\":400,\"height\":143,\"caption\":\"Podcast Magazine\"},\"image\":{\"@id\":\"https:\/\/podcastmagazine.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ThePodcastMag\/\",\"https:\/\/x.com\/thepodcastmag\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/podcastmagazine.com\/#\/schema\/person\/dd5638c66877f1433c38b4b795106cd3\",\"name\":\"Laura Steward\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/podcastmagazine.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/40a7a4c870189d2fe412c5537e323846?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/40a7a4c870189d2fe412c5537e323846?s=96&d=mm&r=g\",\"caption\":\"Laura Steward\"},\"url\":\"https:\/\/podcastmagazine.com\/author\/technology\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Smashing Security AND Perspectives\u2026 - Podcast Magazine\u00ae","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/podcastmagazine.com\/smashing-security-and-perspectives","og_locale":"en_US","og_type":"article","og_title":"Smashing Security AND Perspectives\u2026 - Podcast Magazine\u00ae","og_description":"Over the last several years, cybersecurity podcasts have been on the rise as threats have escalated around the world. No longer relegated to only those \u201cin the know,\u201d cybersecurity has become a relevant and ever-present aspect of the day-to-day consciousness of anyone who uses a device. And as smart devices creep into our homes via appliances, lightbulbs, doorbell cams, and even medical devices like pacemakers, the threat of a hack is everywhere. Enter Smashing Security, a U.K.-based show that has taken on the world of podcasts and won. Having generated close to seven million downloads, this is not just a","og_url":"https:\/\/podcastmagazine.com\/smashing-security-and-perspectives","og_site_name":"Podcast Magazine\u00ae","article_publisher":"https:\/\/www.facebook.com\/ThePodcastMag\/","article_published_time":"2021-12-03T22:04:43+00:00","article_modified_time":"2021-12-06T22:23:41+00:00","og_image":[{"width":2560,"height":1441,"url":"https:\/\/podcastmagazine.com\/wp-content\/uploads\/2021\/12\/IMG_0128-scaled.jpg","type":"image\/jpeg"}],"author":"Laura Steward","twitter_card":"summary_large_image","twitter_creator":"@thepodcastmag","twitter_site":"@thepodcastmag","twitter_misc":{"Written by":"Laura Steward","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/podcastmagazine.com\/smashing-security-and-perspectives#article","isPartOf":{"@id":"https:\/\/podcastmagazine.com\/smashing-security-and-perspectives"},"author":{"name":"Laura Steward","@id":"https:\/\/podcastmagazine.com\/#\/schema\/person\/dd5638c66877f1433c38b4b795106cd3"},"headline":"Smashing Security AND Perspectives\u2026","datePublished":"2021-12-03T22:04:43+00:00","dateModified":"2021-12-06T22:23:41+00:00","mainEntityOfPage":{"@id":"https:\/\/podcastmagazine.com\/smashing-security-and-perspectives"},"wordCount":1001,"commentCount":0,"publisher":{"@id":"https:\/\/podcastmagazine.com\/#organization"},"image":{"@id":"https:\/\/podcastmagazine.com\/smashing-security-and-perspectives#primaryimage"},"thumbnailUrl":"https:\/\/podcastmagazine.com\/wp-content\/uploads\/2021\/12\/IMG_0128-scaled.jpg","keywords":["Carole Theriault","Doctor Who","Graham Culey","Smashing Security","Smashing Security Podcast","Sophos Security Podcast","technology podcasts","Vanja Svajcer"],"articleSection":["Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/podcastmagazine.com\/smashing-security-and-perspectives#respond"]}]},{"@type":"WebPage","@id":"https:\/\/podcastmagazine.com\/smashing-security-and-perspectives","url":"https:\/\/podcastmagazine.com\/smashing-security-and-perspectives","name":"Smashing Security AND Perspectives\u2026 - Podcast Magazine\u00ae","isPartOf":{"@id":"https:\/\/podcastmagazine.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/podcastmagazine.com\/smashing-security-and-perspectives#primaryimage"},"image":{"@id":"https:\/\/podcastmagazine.com\/smashing-security-and-perspectives#primaryimage"},"thumbnailUrl":"https:\/\/podcastmagazine.com\/wp-content\/uploads\/2021\/12\/IMG_0128-scaled.jpg","datePublished":"2021-12-03T22:04:43+00:00","dateModified":"2021-12-06T22:23:41+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/podcastmagazine.com\/smashing-security-and-perspectives"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/podcastmagazine.com\/smashing-security-and-perspectives#primaryimage","url":"https:\/\/podcastmagazine.com\/wp-content\/uploads\/2021\/12\/IMG_0128-scaled.jpg","contentUrl":"https:\/\/podcastmagazine.com\/wp-content\/uploads\/2021\/12\/IMG_0128-scaled.jpg","width":2560,"height":1441},{"@type":"WebSite","@id":"https:\/\/podcastmagazine.com\/#website","url":"https:\/\/podcastmagazine.com\/","name":"Podcast Magazine\u00ae","description":"Beyond the Microphone","publisher":{"@id":"https:\/\/podcastmagazine.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/podcastmagazine.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/podcastmagazine.com\/#organization","name":"Podcast Magazine","url":"https:\/\/podcastmagazine.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/podcastmagazine.com\/#\/schema\/logo\/image\/","url":"https:\/\/podcastmagazine.com\/wp-content\/uploads\/2021\/01\/Podcast_logo_minimal.png","contentUrl":"https:\/\/podcastmagazine.com\/wp-content\/uploads\/2021\/01\/Podcast_logo_minimal.png","width":400,"height":143,"caption":"Podcast Magazine"},"image":{"@id":"https:\/\/podcastmagazine.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ThePodcastMag\/","https:\/\/x.com\/thepodcastmag"]},{"@type":"Person","@id":"https:\/\/podcastmagazine.com\/#\/schema\/person\/dd5638c66877f1433c38b4b795106cd3","name":"Laura Steward","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/podcastmagazine.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/40a7a4c870189d2fe412c5537e323846?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/40a7a4c870189d2fe412c5537e323846?s=96&d=mm&r=g","caption":"Laura Steward"},"url":"https:\/\/podcastmagazine.com\/author\/technology"}]}},"_links":{"self":[{"href":"https:\/\/podcastmagazine.com\/wp-json\/wp\/v2\/posts\/11673"}],"collection":[{"href":"https:\/\/podcastmagazine.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/podcastmagazine.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/podcastmagazine.com\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/podcastmagazine.com\/wp-json\/wp\/v2\/comments?post=11673"}],"version-history":[{"count":1,"href":"https:\/\/podcastmagazine.com\/wp-json\/wp\/v2\/posts\/11673\/revisions"}],"predecessor-version":[{"id":11676,"href":"https:\/\/podcastmagazine.com\/wp-json\/wp\/v2\/posts\/11673\/revisions\/11676"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/podcastmagazine.com\/wp-json\/wp\/v2\/media\/11675"}],"wp:attachment":[{"href":"https:\/\/podcastmagazine.com\/wp-json\/wp\/v2\/media?parent=11673"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/podcastmagazine.com\/wp-json\/wp\/v2\/categories?post=11673"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/podcastmagazine.com\/wp-json\/wp\/v2\/tags?post=11673"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}