{"id":32,"date":"2022-04-28T02:55:52","date_gmt":"2022-04-28T02:55:52","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=32"},"modified":"2022-04-28T02:55:52","modified_gmt":"2022-04-28T02:55:52","slug":"rfc-9116-security-txt-has-been-published","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=32","title":{"rendered":"RFC 9116 \/ \u201csecurity.txt\u201d Has Been Published"},"content":{"rendered":"<div class=\"wp-block-embed__wrapper\">\n<div class=\"embed-twitter\">\n<p>After 5 years of work, security.txt is officially an RFC. I am pleased to announce RFC 9116: <a href=\"https:\/\/t.co\/uIqSRo28ak\">https:\/\/t.co\/uIqSRo28ak<\/a>.<\/p>\n<p>I would like to use this opportunity to thank those who made this possible. Thank you.  <a href=\"https:\/\/t.co\/Z8SNxd81ZO\">pic.twitter.com\/Z8SNxd81ZO<\/a><\/p>\n<p>\u2014 Ed (@EdOverflow) <a href=\"https:\/\/twitter.com\/EdOverflow\/status\/1519415583896481792?ref_src=twsrc%5Etfw\">April 27, 2022<\/a><\/p><\/div>\n<\/div>\n<p>See: <a href=\"https:\/\/www.rfc-editor.org\/rfc\/rfc9116\">https:\/\/www.rfc-editor.org\/rfc\/rfc9116<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>After 5 years of work, security.txt is officially an RFC. I am pleased to announce RFC 9116: https:\/\/t.co\/uIqSRo28ak. I would like to use this opportunity to thank those who made this possible. Thank you. pic.twitter.com\/Z8SNxd81ZO \u2014 Ed (@EdOverflow) April 27, 2022 See: https:\/\/www.rfc-editor.org\/rfc\/rfc9116<\/p>\n","protected":false},"author":0,"featured_media":33,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-32","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/32"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=32"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/32\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/33"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=32"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=32"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=32"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}