{"id":986,"date":"2023-09-06T14:08:00","date_gmt":"2023-09-06T13:08:00","guid":{"rendered":"https:\/\/conscia.com\/ie\/?p=986"},"modified":"2026-05-18T10:03:45","modified_gmt":"2026-05-18T09:03:45","slug":"understanding-vulnerability-lifecycle-to-better-combat-exploits","status":"publish","type":"post","link":"https:\/\/conscia.com\/ie\/blog\/understanding-vulnerability-lifecycle-to-better-combat-exploits\/","title":{"rendered":"Understanding Vulnerability Lifecycle to Better Combat Exploits"},"content":{"rendered":"\n<p class=\" wp-block-paragraph\">If you care about cybersecurity, you surely have heard the term \u2018software vulnerability.\u2019 But it can quickly happen that sometimes we take this term for granted nowadays. That is why I decided to write this article to revisit the terminology behind software vulnerabilities and how they affect the cyber threat landscape.<\/p>\n\n\n\n<h2 class=\"wp-block-heading  wp-block-paragraph\">What are vulnerabilities in Software?<\/h2>\n\n\n\n<p class=\" wp-block-paragraph\">I assume that we are quite aware of the word vulnerability and its meaning. Without looking it up, I would say software vulnerability is the result of having a bug in the code that allows for unintended behavior.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">Now, I will borrow the&nbsp;<a href=\"https:\/\/csrc.nist.gov\/glossary\/term\/software_vulnerability#:~:text=A%20security%20flaw%2C%20glitch%2C%20or,an%20attacker%20(threat%20source).\">knowledge of NIST<\/a>, which shares the definition of Software vulnerability:<\/p>\n\n\n\n<p class=\" wp-block-paragraph\"><em>A security flaw, glitch, or weakness found in software code that could be exploited by an attacker (threat source).<\/em><\/p>\n\n\n\n<p class=\" wp-block-paragraph\">All right, this makes sense \u2013 so now we should know what makes software vulnerable. However, how does one now exploit this vulnerability, and what exactly is exploitation? We will learn this by traversing the Vulnerability Lifecycle. Note that&nbsp;we are not&nbsp;discussing the Vulnerability&nbsp;<strong>Management<\/strong>&nbsp;Lifecycle here.<\/p>\n\n\n\n<div class=\"wp-block-group  background-graphics--none has-gray-300-background-color has-background is-layout-constrained wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading  wp-block-paragraph\">Vulnerability Lifecycle<\/h2>\n\n\n\n<p class=\" wp-block-paragraph\">There may be different interpretations when describing the vulnerability lifecycle, but my approach here will show different stages of the vulnerability lifecycle. They are not necessarily followed in order but are rather of descriptive nature of how this lifecycle works. Let\u2019s start by defining the different stages.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Vulnerability Disclosure<\/li>\n\n\n\n<li>Vulnerability Patched<\/li>\n\n\n\n<li>Proof of Concept Code Available<\/li>\n\n\n\n<li>Exploit Code Available<\/li>\n\n\n\n<li>Weaponization<\/li>\n<\/ul>\n\n\n\n<p class=\" wp-block-paragraph\">If most of the vulnerabilities would follow the stages in order as described in the above list, the cyber world would be a significantly better place. However, unfortunately, this order is not always true. Let\u2019s step back and dive a bit deeper into each stage.<\/p>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading  wp-block-paragraph\">Vulnerability Disclosure<\/h2>\n\n\n\n<p class=\" background-graphics--none wp-block-paragraph\">There are two different types of vulnerability disclosure.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>One is, of course, the public one, where the vendor usually reports about the vulnerability. This is often done when the patch to fix the flaw is also ready for release.<\/li>\n\n\n\n<li>The other is the one we do not hear about \u2013 it is the stage when the vulnerability is discovered, hopefully, by a good actor who reports it to the vendor. However, it could be that threat actors uncover a vulnerability, which may be disclosed then on Dark Web for sale.<\/li>\n<\/ol>\n\n\n\n<p class=\" wp-block-paragraph\">There is also a middle-ground here, where the vendor is notified about the vulnerability, but it takes a really long time before they can provide a patch for it (if at all), and thus a threat actor discovers it, or the information gets somehow leaked.<\/p>\n\n\n\n<h2 class=\"wp-block-heading  wp-block-paragraph\">Vulnerability Patched<\/h2>\n\n\n\n<p class=\" wp-block-paragraph\">The stage where the vendor owning the vulnerable product released a fix for the flaw causing that vulnerability. This can take a few days since the disclosure, but more likely, weeks or several months.<\/p>\n\n\n\n<h2 class=\"wp-block-heading  wp-block-paragraph\">Proof of Concept Code<\/h2>\n\n\n\n<p class=\" wp-block-paragraph\">Proof of Concept (or PoC) code is the experimental code that could exploit the disclosed vulnerability. It is important to differentiate between PoC codes and actual Exploit Codes. PoC Codes are often also a tool to scam those looking to purchase exploit code for a given vulnerability because most of them do not actually work.<\/p>\n\n\n\n<h2 class=\"wp-block-heading  wp-block-paragraph\">Exploit Code<\/h2>\n\n\n\n<p class=\" wp-block-paragraph\">Now, at this stage, we have a real deal. Exploit is a code tested and proven to work to abuse the flaw in the software. It is not necessarily malicious by intent; it depends on how this tool\/code is used.<\/p>\n\n\n\n<h2 class=\"wp-block-heading  wp-block-paragraph\">Weaponization<\/h2>\n\n\n\n<p class=\" wp-block-paragraph\">Weaponization is the stage in the vulnerability lifecycle that comes at the end, when threat actors start weaponizing the exploit code. Exploit code as itself is not doing anything; it has to be executed in a given environment with several different parameters and requirements. This is why the weaponization stage exists, and this is where that happens.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">All right, now that we are familiar with the vulnerability lifecycle let\u2019s look at an example I prepared. We will look into CVE-2023-3436, better known as MOVEit File Transfer vulnerability, which was and still is widely exploited by the infamous CL0P Ransomware group.<\/p>\n\n\n\n<h2 class=\"wp-block-heading  wp-block-paragraph\">MOVEit File Transfer Vulnerability Lifecycle<\/h2>\n\n\n\n<p class=\" wp-block-paragraph\">Below, we will depict a timeline view showing you the different stages of the vulnerability lifecycle described in the previous chapter. One thing to note is that due to vast intelligence sources, do not take every indicator on the graph for granted; try to disregard some obvious outliers and focus on the majority.<\/p>\n\n\n\n<figure class=\"wp-block-image\" id=\"attachment_19641\"><a href=\"https:\/\/conscia.com\/wp-content\/uploads\/2023\/09\/moveit-file-transfer-vulnerability-lifecycle.png\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" src=\"https:\/\/conscia.com\/wp-content\/uploads\/2023\/09\/moveit-file-transfer-vulnerability-lifecycle-1024x601.png\" alt=\"Figure 1 - MOVEit File Transfer Vulnerability Lifecycle\" class=\"wp-image-19641\"\/><\/a><figcaption class=\"wp-element-caption\">Figure 1 \u2013 MOVEit File Transfer Vulnerability Lifecycle<\/figcaption><\/figure>\n\n\n\n<p class=\" wp-block-paragraph\">As it can be seen, specifically with the case of CVE-2023-3436, we have&nbsp;<strong>disclosure and patch available around the same time \u2013 which is what we would&nbsp;<\/strong>expect.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">However, I want&nbsp;<strong>to point your attention to the Exploit and Weaponization stage<\/strong>. You can clearly notice that there were some activities with developing exploit code and weaponization before the vulnerability disclosure and patch.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">If you recall CL0P Ransomware Group\u2019s campaign spree that exploited this vulnerability, you should remember that their exploitation campaign also started before the disclosure date.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">To infer, with the help of such intelligence on vulnerability\u2019s lifecycle, we can better understand that exploits and weaponization can often happen much before the disclosure and patches \u2013 it is, however, often hidden from the public as it happens on Dark Web and underground forums, where such conversations may take place and exploits being sold.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn how vulnerability lifecycle management works and how organisations can identify, prioritise, and remediate risks to combat cyber exploits.<\/p>\n","protected":false},"author":2,"featured_media":987,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"global_solutions":[8,9,22],"global_partners":[],"global_industries":[25],"global_business_outcome":[43],"global_types":[],"class_list":["post-986","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","global_solutions-compliance","global_solutions-cybersecurity","global_solutions-threat-intelligence","global_industries-all-industries","global_business_outcome-security-operations"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.4 (Yoast SEO v26.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Understanding Vulnerability Lifecycle to Better Combat Exploits - Conscia Ireland<\/title>\n<meta name=\"description\" content=\"Understand the vulnerability lifecycle and how to manage and mitigate risks to better protect your organisation from cyber exploits.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conscia.com\/blog\/understanding-vulnerability-lifecycle-to-better-combat-exploits\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding Vulnerability Lifecycle to Better Combat Exploits\" \/>\n<meta property=\"og:description\" content=\"Understand the vulnerability lifecycle and how to manage and mitigate risks to better protect your organisation from cyber exploits.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conscia.com\/blog\/understanding-vulnerability-lifecycle-to-better-combat-exploits\/\" \/>\n<meta property=\"og:site_name\" content=\"Conscia Ireland\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-06T13:08:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-18T09:03:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-deskwork-in-office-2-scaled-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mikkel Elvej\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mikkel Elvej\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/conscia.com\/blog\/understanding-vulnerability-lifecycle-to-better-combat-exploits\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/conscia.com\/ie\/blog\/understanding-vulnerability-lifecycle-to-better-combat-exploits\/\"},\"author\":{\"name\":\"Mikkel Elvej\",\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/person\/e65cdf0ee22f4931e48d2ae6c7943a5e\"},\"headline\":\"Understanding Vulnerability Lifecycle to Better Combat Exploits\",\"datePublished\":\"2023-09-06T13:08:00+00:00\",\"dateModified\":\"2026-05-18T09:03:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/conscia.com\/ie\/blog\/understanding-vulnerability-lifecycle-to-better-combat-exploits\/\"},\"wordCount\":886,\"publisher\":{\"@id\":\"https:\/\/conscia.com\/ie\/#organization\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/blog\/understanding-vulnerability-lifecycle-to-better-combat-exploits\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-deskwork-in-office-2-scaled-1.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conscia.com\/ie\/blog\/understanding-vulnerability-lifecycle-to-better-combat-exploits\/\",\"url\":\"https:\/\/conscia.com\/blog\/understanding-vulnerability-lifecycle-to-better-combat-exploits\/\",\"name\":\"Understanding Vulnerability Lifecycle to Better Combat Exploits - Conscia Ireland\",\"isPartOf\":{\"@id\":\"https:\/\/conscia.com\/ie\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conscia.com\/blog\/understanding-vulnerability-lifecycle-to-better-combat-exploits\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/blog\/understanding-vulnerability-lifecycle-to-better-combat-exploits\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-deskwork-in-office-2-scaled-1.jpg\",\"datePublished\":\"2023-09-06T13:08:00+00:00\",\"dateModified\":\"2026-05-18T09:03:45+00:00\",\"description\":\"Understand the vulnerability lifecycle and how to manage and mitigate risks to better protect your organisation from cyber exploits.\",\"breadcrumb\":{\"@id\":\"https:\/\/conscia.com\/blog\/understanding-vulnerability-lifecycle-to-better-combat-exploits\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conscia.com\/blog\/understanding-vulnerability-lifecycle-to-better-combat-exploits\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conscia.com\/blog\/understanding-vulnerability-lifecycle-to-better-combat-exploits\/#primaryimage\",\"url\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-deskwork-in-office-2-scaled-1.jpg\",\"contentUrl\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-deskwork-in-office-2-scaled-1.jpg\",\"width\":2560,\"height\":1440},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conscia.com\/blog\/understanding-vulnerability-lifecycle-to-better-combat-exploits\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conscia.com\/ie\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding Vulnerability Lifecycle to Better Combat Exploits\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conscia.com\/ie\/#website\",\"url\":\"https:\/\/conscia.com\/ie\/\",\"name\":\"Conscia Ireland\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/conscia.com\/ie\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conscia.com\/ie\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/conscia.com\/ie\/#organization\",\"name\":\"Conscia Ireland\",\"url\":\"https:\/\/conscia.com\/ie\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png\",\"contentUrl\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png\",\"width\":994,\"height\":241,\"caption\":\"Conscia Ireland\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/conscia-ireland\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/person\/e65cdf0ee22f4931e48d2ae6c7943a5e\",\"name\":\"Mikkel Elvej\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g\",\"caption\":\"Mikkel Elvej\"},\"url\":\"https:\/\/conscia.com\/ie\/blog\/author\/mhe\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Understanding Vulnerability Lifecycle to Better Combat Exploits - Conscia Ireland","description":"Understand the vulnerability lifecycle and how to manage and mitigate risks to better protect your organisation from cyber exploits.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conscia.com\/blog\/understanding-vulnerability-lifecycle-to-better-combat-exploits\/","og_locale":"en_US","og_type":"article","og_title":"Understanding Vulnerability Lifecycle to Better Combat Exploits","og_description":"Understand the vulnerability lifecycle and how to manage and mitigate risks to better protect your organisation from cyber exploits.","og_url":"https:\/\/conscia.com\/blog\/understanding-vulnerability-lifecycle-to-better-combat-exploits\/","og_site_name":"Conscia Ireland","article_published_time":"2023-09-06T13:08:00+00:00","article_modified_time":"2026-05-18T09:03:45+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-deskwork-in-office-2-scaled-1.jpg","type":"image\/jpeg"}],"author":"Mikkel Elvej","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mikkel Elvej","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/conscia.com\/blog\/understanding-vulnerability-lifecycle-to-better-combat-exploits\/#article","isPartOf":{"@id":"https:\/\/conscia.com\/ie\/blog\/understanding-vulnerability-lifecycle-to-better-combat-exploits\/"},"author":{"name":"Mikkel Elvej","@id":"https:\/\/conscia.com\/ie\/#\/schema\/person\/e65cdf0ee22f4931e48d2ae6c7943a5e"},"headline":"Understanding Vulnerability Lifecycle to Better Combat Exploits","datePublished":"2023-09-06T13:08:00+00:00","dateModified":"2026-05-18T09:03:45+00:00","mainEntityOfPage":{"@id":"https:\/\/conscia.com\/ie\/blog\/understanding-vulnerability-lifecycle-to-better-combat-exploits\/"},"wordCount":886,"publisher":{"@id":"https:\/\/conscia.com\/ie\/#organization"},"image":{"@id":"https:\/\/conscia.com\/blog\/understanding-vulnerability-lifecycle-to-better-combat-exploits\/#primaryimage"},"thumbnailUrl":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-deskwork-in-office-2-scaled-1.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/conscia.com\/ie\/blog\/understanding-vulnerability-lifecycle-to-better-combat-exploits\/","url":"https:\/\/conscia.com\/blog\/understanding-vulnerability-lifecycle-to-better-combat-exploits\/","name":"Understanding Vulnerability Lifecycle to Better Combat Exploits - Conscia Ireland","isPartOf":{"@id":"https:\/\/conscia.com\/ie\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conscia.com\/blog\/understanding-vulnerability-lifecycle-to-better-combat-exploits\/#primaryimage"},"image":{"@id":"https:\/\/conscia.com\/blog\/understanding-vulnerability-lifecycle-to-better-combat-exploits\/#primaryimage"},"thumbnailUrl":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-deskwork-in-office-2-scaled-1.jpg","datePublished":"2023-09-06T13:08:00+00:00","dateModified":"2026-05-18T09:03:45+00:00","description":"Understand the vulnerability lifecycle and how to manage and mitigate risks to better protect your organisation from cyber exploits.","breadcrumb":{"@id":"https:\/\/conscia.com\/blog\/understanding-vulnerability-lifecycle-to-better-combat-exploits\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conscia.com\/blog\/understanding-vulnerability-lifecycle-to-better-combat-exploits\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conscia.com\/blog\/understanding-vulnerability-lifecycle-to-better-combat-exploits\/#primaryimage","url":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-deskwork-in-office-2-scaled-1.jpg","contentUrl":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-deskwork-in-office-2-scaled-1.jpg","width":2560,"height":1440},{"@type":"BreadcrumbList","@id":"https:\/\/conscia.com\/blog\/understanding-vulnerability-lifecycle-to-better-combat-exploits\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conscia.com\/ie\/"},{"@type":"ListItem","position":2,"name":"Understanding Vulnerability Lifecycle to Better Combat Exploits"}]},{"@type":"WebSite","@id":"https:\/\/conscia.com\/ie\/#website","url":"https:\/\/conscia.com\/ie\/","name":"Conscia Ireland","description":"","publisher":{"@id":"https:\/\/conscia.com\/ie\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conscia.com\/ie\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/conscia.com\/ie\/#organization","name":"Conscia Ireland","url":"https:\/\/conscia.com\/ie\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/","url":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png","contentUrl":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png","width":994,"height":241,"caption":"Conscia Ireland"},"image":{"@id":"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/conscia-ireland\/"]},{"@type":"Person","@id":"https:\/\/conscia.com\/ie\/#\/schema\/person\/e65cdf0ee22f4931e48d2ae6c7943a5e","name":"Mikkel Elvej","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conscia.com\/ie\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g","caption":"Mikkel Elvej"},"url":"https:\/\/conscia.com\/ie\/blog\/author\/mhe\/"}]}},"_links":{"self":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/posts\/986","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/comments?post=986"}],"version-history":[{"count":3,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/posts\/986\/revisions"}],"predecessor-version":[{"id":1760,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/posts\/986\/revisions\/1760"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/media\/987"}],"wp:attachment":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/media?parent=986"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/categories?post=986"},{"taxonomy":"global_solutions","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_solutions?post=986"},{"taxonomy":"global_partners","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_partners?post=986"},{"taxonomy":"global_industries","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_industries?post=986"},{"taxonomy":"global_business_outcome","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_business_outcome?post=986"},{"taxonomy":"global_types","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_types?post=986"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}