{"id":15308,"date":"2024-02-05T15:34:11","date_gmt":"2024-02-05T15:34:11","guid":{"rendered":"https:\/\/ivaluegroup.com\/en-lk\/?page_id=15308"},"modified":"2024-02-05T15:35:08","modified_gmt":"2024-02-05T15:35:08","slug":"blogs","status":"publish","type":"page","link":"https:\/\/ivaluegroup.com\/en-lk\/blogs\/","title":{"rendered":"Blogs"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"15308\" class=\"elementor elementor-15308\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2f14d31 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2f14d31\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7a5d49f\" data-id=\"7a5d49f\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-cf2af53 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cf2af53\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-8282d66\" data-id=\"8282d66\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-af0581c elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-shortcode\" data-id=\"af0581c\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t\t<!-- Flexy Breadcrumb -->\r\n\t\t\t<div class=\"fbc fbc-page\">\r\n\r\n\t\t\t\t<!-- Breadcrumb wrapper -->\r\n\t\t\t\t<div class=\"fbc-wrap\">\r\n\r\n\t\t\t\t\t<!-- Ordered list-->\r\n\t\t\t\t\t<ol class=\"fbc-items\" itemscope itemtype=\"https:\/\/schema.org\/BreadcrumbList\">\r\n\t\t\t\t\t\t            <li itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\r\n                <span itemprop=\"name\">\r\n                    <!-- Home Link -->\r\n                    <a itemprop=\"item\" href=\"https:\/\/ivaluegroup.com\/en-lk\">\r\n                    \r\n                                                    <i class=\"fa fa-home\" aria-hidden=\"true\"><\/i>Home                    <\/a>\r\n                <\/span>\r\n                <meta itemprop=\"position\" content=\"1\" \/><!-- Meta Position-->\r\n             <\/li><li><span class=\"fbc-separator\">\/<\/span><\/li><li class=\"active\" itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\"><span itemprop=\"name\" title=\"Blogs\">Blogs<\/span><meta itemprop=\"position\" content=\"2\" \/><\/li>\t\t\t\t\t<\/ol>\r\n\t\t\t\t\t<div class=\"clearfix\"><\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eaba958 elementor-widget elementor-widget-heading\" data-id=\"eaba958\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 26-03-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h1 class=\"elementor-heading-title elementor-size-default\">Blogs<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a6b7551 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a6b7551\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9e0b1a1\" data-id=\"9e0b1a1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e42063b elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-card-shadow-yes elementor-posts__hover-gradient elementor-widget elementor-widget-posts\" data-id=\"e42063b\" data-element_type=\"widget\" data-settings=\"{&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:20,&quot;sizes&quot;:[]},&quot;pagination_type&quot;:&quot;numbers&quot;,&quot;cards_columns&quot;:&quot;3&quot;,&quot;cards_columns_tablet&quot;:&quot;2&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<link rel=\"stylesheet\" href=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/plugins\/elementor-pro\/assets\/css\/widget-posts.min.css\">\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-15209 post type-post status-publish format-standard has-post-thumbnail hentry category-blogs\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/understanding-cloud-security-best-practices-challenges\/\" tabindex=\"-1\"><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-300x300.jpg\" class=\"attachment-medium size-medium wp-image-15059\" alt=\"iValue Blogs\" srcset=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-300x300.jpg 300w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-150x150.jpg 150w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-24x24.jpg 24w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-36x36.jpg 36w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-48x48.jpg 48w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2.jpg 400w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/understanding-cloud-security-best-practices-challenges\/\">\n\t\t\t\tUnderstanding Cloud Security: Best Practices &amp; Challenges\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>If we had to describe the current weather of the digital sphere, an apt forecast would be \u2018mostly cloudy\u2019. It was partly cloudy back in 2015, with 30% of the<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/understanding-cloud-security-best-practices-challenges\/\" aria-label=\"Read more about Understanding Cloud Security: Best Practices &amp; Challenges\" tabindex=\"-1\">\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tJanuary 29, 2024\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-15208 post type-post status-publish format-standard has-post-thumbnail hentry category-blogs\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/10-cybersecurity-terms-you-need-to-know-in-2024\/\" tabindex=\"-1\"><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-300x300.jpg\" class=\"attachment-medium size-medium wp-image-15059\" alt=\"iValue Blogs\" srcset=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-300x300.jpg 300w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-150x150.jpg 150w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-24x24.jpg 24w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-36x36.jpg 36w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-48x48.jpg 48w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2.jpg 400w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/10-cybersecurity-terms-you-need-to-know-in-2024\/\">\n\t\t\t\t10 Cybersecurity Terms You Need to Know in 2024\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>With unprecedented innovations in technology, every aspect of our life is easier and faster and we are all connected inextricably. We live in a world where the focus is firmly<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/10-cybersecurity-terms-you-need-to-know-in-2024\/\" aria-label=\"Read more about 10 Cybersecurity Terms You Need to Know in 2024\" tabindex=\"-1\">\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tJanuary 29, 2024\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-15207 post type-post status-publish format-standard has-post-thumbnail hentry category-blogs\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/modernize-your-data-strategy-a-blog-by-mitish-chitnavis\/\" tabindex=\"-1\"><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-300x300.jpg\" class=\"attachment-medium size-medium wp-image-15059\" alt=\"iValue Blogs\" srcset=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-300x300.jpg 300w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-150x150.jpg 150w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-24x24.jpg 24w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-36x36.jpg 36w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-48x48.jpg 48w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2.jpg 400w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/modernize-your-data-strategy-a-blog-by-mitish-chitnavis\/\">\n\t\t\t\tModernize Your Data Strategy &#8211; a blog by Mitish Chitnavis\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>In today&#8217;s digital world, data is the most valuable asset for businesses of all sizes. However, with this great power comes great responsibility. Businesses must ensure that they are collecting,<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/modernize-your-data-strategy-a-blog-by-mitish-chitnavis\/\" aria-label=\"Read more about Modernize Your Data Strategy &#8211; a blog by Mitish Chitnavis\" tabindex=\"-1\">\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tJanuary 29, 2024\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-15206 post type-post status-publish format-standard has-post-thumbnail hentry category-blogs\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/what-are-deepfakes-and-how-are-they-made-a-blog-by-mitish-chitnavis\/\" tabindex=\"-1\"><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-300x300.jpg\" class=\"attachment-medium size-medium wp-image-15059\" alt=\"iValue Blogs\" srcset=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-300x300.jpg 300w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-150x150.jpg 150w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-24x24.jpg 24w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-36x36.jpg 36w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-48x48.jpg 48w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2.jpg 400w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/what-are-deepfakes-and-how-are-they-made-a-blog-by-mitish-chitnavis\/\">\n\t\t\t\tWhat are deepfakes and how are they made? &#8211; a Blog by Mitish Chitnavis\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>A deepfake is synthetic media where a person\u2019s face or voice is replaced with that of another person. Various techniques are used to create these deepfakes, including but not limited<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/what-are-deepfakes-and-how-are-they-made-a-blog-by-mitish-chitnavis\/\" aria-label=\"Read more about What are deepfakes and how are they made? &#8211; a Blog by Mitish Chitnavis\" tabindex=\"-1\">\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tJanuary 29, 2024\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-15205 post type-post status-publish format-standard has-post-thumbnail hentry category-blogs\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/how-to-improve-your-organizations-cyber-resiliency\/\" tabindex=\"-1\"><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-300x300.jpg\" class=\"attachment-medium size-medium wp-image-15059\" alt=\"iValue Blogs\" srcset=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-300x300.jpg 300w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-150x150.jpg 150w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-24x24.jpg 24w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-36x36.jpg 36w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-48x48.jpg 48w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2.jpg 400w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/how-to-improve-your-organizations-cyber-resiliency\/\">\n\t\t\t\tHow To Improve your Organization\u2019s Cyber-Resiliency\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Let\u2019s start with a hypothetical of comparing organizational cyber-security to the security of your home. The traditional approach to cyber-security has been akin to having a good lock on the<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/how-to-improve-your-organizations-cyber-resiliency\/\" aria-label=\"Read more about How To Improve your Organization\u2019s Cyber-Resiliency\" tabindex=\"-1\">\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tJanuary 29, 2024\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-13697 post type-post status-publish format-standard has-post-thumbnail hentry category-blogs\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/what-financial-firms-need-to-know-about-sebis-cloud-computing-framework\/\" tabindex=\"-1\"><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-300x300.jpg\" class=\"attachment-medium size-medium wp-image-15059\" alt=\"iValue Blogs\" srcset=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-300x300.jpg 300w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-150x150.jpg 150w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-24x24.jpg 24w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-36x36.jpg 36w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-48x48.jpg 48w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2.jpg 400w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/what-financial-firms-need-to-know-about-sebis-cloud-computing-framework\/\">\n\t\t\t\tWhat Financial Firms Need to Know About SEBI&#8217;s Cloud Computing Framework\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>We are right in the midst of the Fourth Industrial Revolution, a time when technologies like IoT, AI, ML, robotics &amp; 3D printing are becoming increasingly prevalent in our world.<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/what-financial-firms-need-to-know-about-sebis-cloud-computing-framework\/\" aria-label=\"Read more about What Financial Firms Need to Know About SEBI&#8217;s Cloud Computing Framework\" tabindex=\"-1\">\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tJanuary 29, 2024\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-15204 post type-post status-publish format-standard has-post-thumbnail hentry category-blogs\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/the-importance-of-misconfiguration-management-in-cloud-security\/\" tabindex=\"-1\"><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-300x300.jpg\" class=\"attachment-medium size-medium wp-image-15059\" alt=\"iValue Blogs\" srcset=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-300x300.jpg 300w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-150x150.jpg 150w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-24x24.jpg 24w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-36x36.jpg 36w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-48x48.jpg 48w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2.jpg 400w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/the-importance-of-misconfiguration-management-in-cloud-security\/\">\n\t\t\t\tThe Importance of Misconfiguration Management in Cloud Security\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>They say every cloud comes with some gray. That sentiment stands equally true for virtual clouds as it does for physical ones. A recent survey by Forrester saw 93% of<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/the-importance-of-misconfiguration-management-in-cloud-security\/\" aria-label=\"Read more about The Importance of Misconfiguration Management in Cloud Security\" tabindex=\"-1\">\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tJanuary 29, 2024\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-15203 post type-post status-publish format-standard has-post-thumbnail hentry category-blogs\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/data-centric-security-protecting-your-organizations-most-valuable-asset\/\" tabindex=\"-1\"><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-300x300.jpg\" class=\"attachment-medium size-medium wp-image-15059\" alt=\"iValue Blogs\" srcset=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-300x300.jpg 300w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-150x150.jpg 150w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-24x24.jpg 24w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-36x36.jpg 36w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-48x48.jpg 48w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2.jpg 400w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/data-centric-security-protecting-your-organizations-most-valuable-asset\/\">\n\t\t\t\tData-Centric Security: Protecting Your Organization\u2019s Most Valuable Asset\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>There have been 4 great Industrial Revolutions in the modern world. \u00a0 The first one, back in 1784, focused on steam, water, and mechanization. The second one in 1870 had<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/data-centric-security-protecting-your-organizations-most-valuable-asset\/\" aria-label=\"Read more about Data-Centric Security: Protecting Your Organization\u2019s Most Valuable Asset\" tabindex=\"-1\">\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tDecember 29, 2023\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-15202 post type-post status-publish format-standard has-post-thumbnail hentry category-blogs\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/future-proofing-esg-trends-challenges-and-ivalues-approach\/\" tabindex=\"-1\"><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-300x300.jpg\" class=\"attachment-medium size-medium wp-image-15059\" alt=\"iValue Blogs\" srcset=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-300x300.jpg 300w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-150x150.jpg 150w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-24x24.jpg 24w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-36x36.jpg 36w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-48x48.jpg 48w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2.jpg 400w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/future-proofing-esg-trends-challenges-and-ivalues-approach\/\">\n\t\t\t\tFuture-Proofing ESG: Trends, Challenges and iValue\u2019s Approach\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>There are two sides to the India growth story. A story deeply interlinked with the growing role of technology in our lives. \u00a0 One side calls for appreciation.\u00a0 18 countries<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/future-proofing-esg-trends-challenges-and-ivalues-approach\/\" aria-label=\"Read more about Future-Proofing ESG: Trends, Challenges and iValue\u2019s Approach\" tabindex=\"-1\">\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tDecember 29, 2023\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-15201 post type-post status-publish format-standard has-post-thumbnail hentry category-blogs\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/implementing-phishing-resistant-mfa-best-practices-for-enterprises\/\" tabindex=\"-1\"><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-300x300.jpg\" class=\"attachment-medium size-medium wp-image-15059\" alt=\"iValue Blogs\" srcset=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-300x300.jpg 300w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-150x150.jpg 150w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-24x24.jpg 24w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-36x36.jpg 36w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-48x48.jpg 48w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2.jpg 400w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/implementing-phishing-resistant-mfa-best-practices-for-enterprises\/\">\n\t\t\t\tImplementing Phishing-Resistant MFA: Best Practices for Enterprises\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Let\u2019s take you through a new-age creation story. First came digital data. Then servers and accounts, to store and share and create more data. Along with accounts came usernames and<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/implementing-phishing-resistant-mfa-best-practices-for-enterprises\/\" aria-label=\"Read more about Implementing Phishing-Resistant MFA: Best Practices for Enterprises\" tabindex=\"-1\">\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tDecember 29, 2023\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-15200 post type-post status-publish format-standard has-post-thumbnail hentry category-blogs\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/understanding-phishing-attacks-and-how-phishing-resistant-mfa-can-help\/\" tabindex=\"-1\"><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-300x300.jpg\" class=\"attachment-medium size-medium wp-image-15059\" alt=\"iValue Blogs\" srcset=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-300x300.jpg 300w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-150x150.jpg 150w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-24x24.jpg 24w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-36x36.jpg 36w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-48x48.jpg 48w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2.jpg 400w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/understanding-phishing-attacks-and-how-phishing-resistant-mfa-can-help\/\">\n\t\t\t\tUnderstanding Phishing Attacks and  How Phishing-Resistant MFA Can Help\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Let\u2019s take you back to 2015, when Ukraine was a much calmer place. Relatively, because the seeds of the current war were being planted then itself with Russia\u2019s annexation of<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/understanding-phishing-attacks-and-how-phishing-resistant-mfa-can-help\/\" aria-label=\"Read more about Understanding Phishing Attacks and  How Phishing-Resistant MFA Can Help\" tabindex=\"-1\">\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tDecember 29, 2023\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-15199 post type-post status-publish format-standard has-post-thumbnail hentry category-blogs\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/stay-cybersafe-while-gift-shopping\/\" tabindex=\"-1\"><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-300x300.jpg\" class=\"attachment-medium size-medium wp-image-15059\" alt=\"iValue Blogs\" srcset=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-300x300.jpg 300w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-150x150.jpg 150w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-24x24.jpg 24w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-36x36.jpg 36w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-48x48.jpg 48w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2.jpg 400w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/stay-cybersafe-while-gift-shopping\/\">\n\t\t\t\tStay Cybersafe While Gift Shopping\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Once upon a (quite recent) time, shopping used to be an extremely evocative, on-site experience. Go out, take a few mall selfies, try on hundreds of clothes for hours on<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/stay-cybersafe-while-gift-shopping\/\" aria-label=\"Read more about Stay Cybersafe While Gift Shopping\" tabindex=\"-1\">\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tDecember 18, 2023\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-15198 post type-post status-publish format-standard has-post-thumbnail hentry category-blogs category-deal\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/ivaluegroup.com\/en-lk\/oems\/deal\/3-most-common-cybersecurity-challenges-faced-by-companies-in-asia\/\" tabindex=\"-1\"><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-300x300.jpg\" class=\"attachment-medium size-medium wp-image-15059\" alt=\"iValue Blogs\" srcset=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-300x300.jpg 300w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-150x150.jpg 150w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-24x24.jpg 24w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-36x36.jpg 36w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-48x48.jpg 48w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2.jpg 400w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/ivaluegroup.com\/en-lk\/oems\/deal\/3-most-common-cybersecurity-challenges-faced-by-companies-in-asia\/\">\n\t\t\t\t3 Most Common Cybersecurity Challenges Faced by Companies in Asia\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>We are smack bang in the epicenter of the Asian Century. That makes the APAC region a \u2018Ground Zero\u2019 for almost everything shaping today\u2019s world. It\u2019s the \u2018Ground Zero\u2019 for<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/ivaluegroup.com\/en-lk\/oems\/deal\/3-most-common-cybersecurity-challenges-faced-by-companies-in-asia\/\" aria-label=\"Read more about 3 Most Common Cybersecurity Challenges Faced by Companies in Asia\" tabindex=\"-1\">\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tDecember 18, 2023\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-13568 post type-post status-publish format-standard has-post-thumbnail hentry category-blogs\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/cybersecurity-horror-stories-learn-from-others-mistakes\/\" tabindex=\"-1\"><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-300x300.jpg\" class=\"attachment-medium size-medium wp-image-15059\" alt=\"iValue Blogs\" srcset=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-300x300.jpg 300w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-150x150.jpg 150w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-24x24.jpg 24w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-36x36.jpg 36w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-48x48.jpg 48w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2.jpg 400w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/cybersecurity-horror-stories-learn-from-others-mistakes\/\">\n\t\t\t\tCybersecurity Horror Stories &#8211; Learn from Others\u2019 Mistakes\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Since it\u2019s Halloween, let\u2019s start by comparing and contrasting two of the more well-known figures of horror in recent pop culture.\u00a0 One feeds on human blood, the other on human<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/cybersecurity-horror-stories-learn-from-others-mistakes\/\" aria-label=\"Read more about Cybersecurity Horror Stories &#8211; Learn from Others\u2019 Mistakes\" tabindex=\"-1\">\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tOctober 31, 2023\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-13565 post type-post status-publish format-standard has-post-thumbnail hentry category-blogs\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/tips-to-stay-cybersafe-this-cybersecurity-awareness-month\/\" tabindex=\"-1\"><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-300x300.jpg\" class=\"attachment-medium size-medium wp-image-15059\" alt=\"iValue Blogs\" srcset=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-300x300.jpg 300w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-150x150.jpg 150w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-24x24.jpg 24w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-36x36.jpg 36w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-48x48.jpg 48w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2.jpg 400w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/tips-to-stay-cybersafe-this-cybersecurity-awareness-month\/\">\n\t\t\t\tTips To Stay Cybersafe This Cybersecurity Awareness Month\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Most of us can agree that it was a much simpler time back in 2004. Yet, behind the scenes, the seeds were being planted for the increasingly connected world we<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/tips-to-stay-cybersafe-this-cybersecurity-awareness-month\/\" aria-label=\"Read more about Tips To Stay Cybersafe This Cybersecurity Awareness Month\" tabindex=\"-1\">\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tOctober 30, 2023\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-15196 post type-post status-publish format-standard has-post-thumbnail hentry category-blogs tag-cyber-security tag-gap-assessment\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/4-ways-a-cybersecurity-gap-assessment-can-help-reduce-your-business-risk\/\" tabindex=\"-1\"><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-300x300.jpg\" class=\"attachment-medium size-medium wp-image-15059\" alt=\"iValue Blogs\" srcset=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-300x300.jpg 300w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-150x150.jpg 150w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-24x24.jpg 24w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-36x36.jpg 36w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-48x48.jpg 48w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2.jpg 400w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/4-ways-a-cybersecurity-gap-assessment-can-help-reduce-your-business-risk\/\">\n\t\t\t\t4 Ways a Cybersecurity Gap Assessment Can Help Reduce Your Business Risk\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>In today&#8217;s digital age, technology has become the backbone of every organization. As a result, IT &#038; Cyber Security management is no longer a luxury, but a necessity. However, ensuring<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/4-ways-a-cybersecurity-gap-assessment-can-help-reduce-your-business-risk\/\" aria-label=\"Read more about 4 Ways a Cybersecurity Gap Assessment Can Help Reduce Your Business Risk\" tabindex=\"-1\">\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tJune 6, 2023\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-15195 post type-post status-publish format-standard has-post-thumbnail hentry category-blogs category-network-security tag-exploitable-vulnerabilities tag-networksecurity\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/business-impact-of-exploitable-vulnerabilities\/\" tabindex=\"-1\"><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-300x300.jpg\" class=\"attachment-medium size-medium wp-image-15059\" alt=\"iValue Blogs\" srcset=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-300x300.jpg 300w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-150x150.jpg 150w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-24x24.jpg 24w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-36x36.jpg 36w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-48x48.jpg 48w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2.jpg 400w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/business-impact-of-exploitable-vulnerabilities\/\">\n\t\t\t\tHow Exploitable Vulnerabilities Can Ruin Your Business\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Exploitable vulnerabilities can have a devastating impact on businesses, leading to financial losses, reputational damage, and regulatory fines. In addition to the direct costs of remediation and recovery, organizations may<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/business-impact-of-exploitable-vulnerabilities\/\" aria-label=\"Read more about How Exploitable Vulnerabilities Can Ruin Your Business\" tabindex=\"-1\">\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tMarch 20, 2023\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-15194 post type-post status-publish format-standard has-post-thumbnail hentry category-blogs tag-digital-world tag-infosec\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/building-safer-digital-world\/\" tabindex=\"-1\"><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-300x300.jpg\" class=\"attachment-medium size-medium wp-image-15059\" alt=\"iValue Blogs\" srcset=\"https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-300x300.jpg 300w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-150x150.jpg 150w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-24x24.jpg 24w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-36x36.jpg 36w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2-48x48.jpg 48w, https:\/\/ivaluegroup.com\/en-lk\/wp-content\/uploads\/sites\/6\/2022\/03\/iValue_Blogs_Card-2.jpg 400w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/building-safer-digital-world\/\">\n\t\t\t\tBuilding Safer Digital World\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Since the 2000s, the information age has reinvented almost every aspect of our lives. Your phone is no longer just a calling device. The smartphone is your entry into a<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/ivaluegroup.com\/en-lk\/blogs\/building-safer-digital-world\/\" aria-label=\"Read more about Building Safer Digital World\" tabindex=\"-1\">\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tJuly 25, 2022\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t<div class=\"e-load-more-anchor\" data-page=\"1\" data-max-page=\"3\" data-next-page=\"https:\/\/ivaluegroup.com\/en-lk\/wp-json\/wp\/v2\/pages\/15308\/page\/2\/\"><\/div>\n\t\t\t\t<nav class=\"elementor-pagination\" aria-label=\"Pagination\">\n\t\t\t<span aria-current=\"page\" class=\"page-numbers current\"><span class=\"elementor-screen-only\">Page<\/span>1<\/span>\n<a class=\"page-numbers\" href=\"https:\/\/ivaluegroup.com\/en-lk\/wp-json\/wp\/v2\/pages\/15308\/page\/2\/\"><span class=\"elementor-screen-only\">Page<\/span>2<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/ivaluegroup.com\/en-lk\/wp-json\/wp\/v2\/pages\/15308\/page\/3\/\"><span class=\"elementor-screen-only\">Page<\/span>3<\/a>\t\t<\/nav>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Blogs<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/ivaluegroup.com\/en-lk\/wp-json\/wp\/v2\/pages\/15308"}],"collection":[{"href":"https:\/\/ivaluegroup.com\/en-lk\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ivaluegroup.com\/en-lk\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-lk\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-lk\/wp-json\/wp\/v2\/comments?post=15308"}],"version-history":[{"count":4,"href":"https:\/\/ivaluegroup.com\/en-lk\/wp-json\/wp\/v2\/pages\/15308\/revisions"}],"predecessor-version":[{"id":15313,"href":"https:\/\/ivaluegroup.com\/en-lk\/wp-json\/wp\/v2\/pages\/15308\/revisions\/15313"}],"wp:attachment":[{"href":"https:\/\/ivaluegroup.com\/en-lk\/wp-json\/wp\/v2\/media?parent=15308"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-lk\/wp-json\/wp\/v2\/categories?post=15308"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-lk\/wp-json\/wp\/v2\/tags?post=15308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}