{"id":6,"date":"2020-10-08T10:51:28","date_gmt":"2020-10-08T05:21:28","guid":{"rendered":"https:\/\/xars.xiarch.co.in\/development_ui2okto3po\/x-blog\/?page_id=6"},"modified":"2021-06-10T18:03:47","modified_gmt":"2021-06-10T12:33:47","slug":"home","status":"publish","type":"page","link":"https:\/\/xiarch.com\/blog\/","title":{"rendered":"Xiarch Blog"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"6\" class=\"elementor elementor-6\">\n\t\t\t\t\t\t<div class=\"elementor-inner\">\n\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e7a94be elementor-section-full_width elementor-section-stretched elementor-section-height-default elementor-section-height-default\" data-id=\"e7a94be\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d9086b5\" data-id=\"d9086b5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-394a9f9 elementor-widget elementor-widget-image\" data-id=\"394a9f9\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-image\">\n\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1536\" height=\"498\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/blog-banner-header.jpg\" class=\"attachment-full size-full wp-image-2040\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/blog-banner-header.jpg 1536w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/blog-banner-header-300x97.jpg 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/blog-banner-header-1024x332.jpg 1024w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/blog-banner-header-768x249.jpg 768w\" sizes=\"(max-width: 1536px) 100vw, 1536px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5b4495f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5b4495f\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c73a62e\" data-id=\"c73a62e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-73e4846 elementor-widget__width-inherit elementor-grid-eael-col-4 elementor-grid-tablet-eael-col-2 elementor-grid-mobile-eael-col-1 elementor-widget elementor-widget-eael-post-grid\" data-id=\"73e4846\" data-element_type=\"widget\" data-settings=\"{&quot;eael_post_grid_columns&quot;:&quot;eael-col-4&quot;,&quot;eael_post_grid_columns_tablet&quot;:&quot;eael-col-2&quot;,&quot;eael_post_grid_columns_mobile&quot;:&quot;eael-col-1&quot;}\" data-widget_type=\"eael-post-grid.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div id=\"eael-post-grid-73e4846\" class=\"eael-post-grid-container\">\n            <div class=\"eael-post-grid eael-post-appender eael-post-appender-73e4846 eael-post-grid-style-default\" data-layout-mode=\"grid\"><article class=\"eael-grid-post eael-post-grid-column\" data-id=\"4801\">\n        <div class=\"eael-grid-post-holder\">\n            <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-media\"><div class=\"eael-entry-overlay fade-in\"><i class=\"fas fa-long-arrow-alt-right\" aria-hidden=\"true\"><\/i><a href=\"https:\/\/xiarch.com\/blog\/vulnerability-assessment-demystified-your-guide-to-stronger-cybersecurity\/\"><\/a><\/div><div class=\"eael-entry-thumbnail \">\n                <img width=\"300\" height=\"300\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-15-155406-300x300.png\" class=\"attachment-medium size-medium wp-image-4802\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-15-155406-300x300.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-15-155406-150x150.png 150w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-15-155406-600x600.png 600w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-15-155406.png 638w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\n            <\/div>\n        <\/div><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><h2 class=\"eael-entry-title\"><a\n                        class=\"eael-grid-post-link\"\n                        href=\"https:\/\/xiarch.com\/blog\/vulnerability-assessment-demystified-your-guide-to-stronger-cybersecurity\/\"\n                        title=\"Vulnerability Assessment Demystified: Your Guide to Stronger Cybersecurity\">Vulnerability Assessment Demystified: Your Guide to Stronger Cybersecurity<\/a><\/h2><\/header><div class=\"eael-entry-content\">\n                        <div class=\"eael-grid-post-excerpt\"><p>In the digital age, where businesses rely heavily on technology...<\/p><\/div>\n                    <\/div><div class=\"eael-entry-footer\"><div class=\"eael-author-avatar\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=96&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=192&#038;d=mm&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' loading='lazy' decoding='async'\/><\/a><\/div><div class=\"eael-entry-meta\"><span class=\"eael-posted-by\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\" title=\"Posts by Devyansh Sharda\" rel=\"author\"  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Devyansh Sharda<\/a><\/span><span class=\"eael-posted-on\"><time datetime=\"February 15, 2024\">February 15, 2024<\/time><\/span><\/div><\/div><\/div><\/div>\n        <\/div>\n    <\/article><article class=\"eael-grid-post eael-post-grid-column\" data-id=\"4793\">\n        <div class=\"eael-grid-post-holder\">\n            <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><h2 class=\"eael-entry-title\"><a\n                        class=\"eael-grid-post-link\"\n                        href=\"https:\/\/xiarch.com\/blog\/uncover-hidden-risks-dive-into-vulnerability-assessment-with-xiarch\/\"\n                        title=\"Uncover Hidden Risks: Dive into Vulnerability Assessment with Xiarch\">Uncover Hidden Risks: Dive into Vulnerability Assessment with Xiarch<\/a><\/h2><\/header><div class=\"eael-entry-content\">\n                        <div class=\"eael-grid-post-excerpt\"><p>In the digital landscape where cyber threats lurk around every...<\/p><\/div>\n                    <\/div><div class=\"eael-entry-footer\"><div class=\"eael-author-avatar\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=96&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=192&#038;d=mm&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' loading='lazy' decoding='async'\/><\/a><\/div><div class=\"eael-entry-meta\"><span class=\"eael-posted-by\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\" title=\"Posts by Devyansh Sharda\" rel=\"author\"  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Devyansh Sharda<\/a><\/span><span class=\"eael-posted-on\"><time datetime=\"February 8, 2024\">February 8, 2024<\/time><\/span><\/div><\/div><\/div><\/div>\n        <\/div>\n    <\/article><article class=\"eael-grid-post eael-post-grid-column\" data-id=\"4785\">\n        <div class=\"eael-grid-post-holder\">\n            <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><h2 class=\"eael-entry-title\"><a\n                        class=\"eael-grid-post-link\"\n                        href=\"https:\/\/xiarch.com\/blog\/strengthening-wireless-security-xiarchs-penetration-testing-for-robust-defense\/\"\n                        title=\"Strengthening Wireless Security: Xiarch&#8217;s Penetration Testing for Robust Defense\">Strengthening Wireless Security: Xiarch&#8217;s Penetration Testing for Robust Defense<\/a><\/h2><\/header><div class=\"eael-entry-content\">\n                        <div class=\"eael-grid-post-excerpt\"><p>In today&#8217;s digital landscape, where connectivity reigns supreme, wireless networks...<\/p><\/div>\n                    <\/div><div class=\"eael-entry-footer\"><div class=\"eael-author-avatar\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=96&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=192&#038;d=mm&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' loading='lazy' decoding='async'\/><\/a><\/div><div class=\"eael-entry-meta\"><span class=\"eael-posted-by\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\" title=\"Posts by Devyansh Sharda\" rel=\"author\"  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Devyansh Sharda<\/a><\/span><span class=\"eael-posted-on\"><time datetime=\"February 1, 2024\">February 1, 2024<\/time><\/span><\/div><\/div><\/div><\/div>\n        <\/div>\n    <\/article><article class=\"eael-grid-post eael-post-grid-column\" data-id=\"4778\">\n        <div class=\"eael-grid-post-holder\">\n            <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-media\"><div class=\"eael-entry-overlay fade-in\"><i class=\"fas fa-long-arrow-alt-right\" aria-hidden=\"true\"><\/i><a href=\"https:\/\/xiarch.com\/blog\/strengthen-your-digital-defense-with-xiarchs-wireless-penetration-testing-unveiling-the-power-of-expert-assessments\/\"><\/a><\/div><div class=\"eael-entry-thumbnail \">\n                <img width=\"300\" height=\"300\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-25-102352-300x300.png\" class=\"attachment-medium size-medium wp-image-4779\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-25-102352-300x300.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-25-102352-150x150.png 150w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-25-102352-600x600.png 600w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-25-102352.png 688w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\n            <\/div>\n        <\/div><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><h2 class=\"eael-entry-title\"><a\n                        class=\"eael-grid-post-link\"\n                        href=\"https:\/\/xiarch.com\/blog\/strengthen-your-digital-defense-with-xiarchs-wireless-penetration-testing-unveiling-the-power-of-expert-assessments\/\"\n                        title=\"Strengthen Your Digital Defense with Xiarch&#8217;s Wireless Penetration Testing: Unveiling the Power of Expert Assessments\">Strengthen Your Digital Defense with Xiarch&#8217;s Wireless Penetration Testing: Unveiling the Power of Expert Assessments<\/a><\/h2><\/header><div class=\"eael-entry-content\">\n                        <div class=\"eael-grid-post-excerpt\"><p>Introduction In the ever-evolving landscape of digital security, Xiarch&#8217;s Wireless...<\/p><\/div>\n                    <\/div><div class=\"eael-entry-footer\"><div class=\"eael-author-avatar\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=96&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=192&#038;d=mm&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' loading='lazy' decoding='async'\/><\/a><\/div><div class=\"eael-entry-meta\"><span class=\"eael-posted-by\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\" title=\"Posts by Devyansh Sharda\" rel=\"author\"  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Devyansh Sharda<\/a><\/span><span class=\"eael-posted-on\"><time datetime=\"January 25, 2024\">January 25, 2024<\/time><\/span><\/div><\/div><\/div><\/div>\n        <\/div>\n    <\/article><article class=\"eael-grid-post eael-post-grid-column\" data-id=\"4770\">\n        <div class=\"eael-grid-post-holder\">\n            <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-media\"><div class=\"eael-entry-overlay fade-in\"><i class=\"fas fa-long-arrow-alt-right\" aria-hidden=\"true\"><\/i><a href=\"https:\/\/xiarch.com\/blog\/xiarchs-penetration-testing-safeguarding-your-wireless-networks\/\"><\/a><\/div><div class=\"eael-entry-thumbnail \">\n                <img width=\"300\" height=\"300\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-18-123501-300x300.png\" class=\"attachment-medium size-medium wp-image-4771\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-18-123501-300x300.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-18-123501-150x150.png 150w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-18-123501-600x600.png 600w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-18-123501.png 688w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\n            <\/div>\n        <\/div><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><h2 class=\"eael-entry-title\"><a\n                        class=\"eael-grid-post-link\"\n                        href=\"https:\/\/xiarch.com\/blog\/xiarchs-penetration-testing-safeguarding-your-wireless-networks\/\"\n                        title=\"Xiarch&#8217;s Penetration Testing: Safeguarding Your Wireless Networks\">Xiarch&#8217;s Penetration Testing: Safeguarding Your Wireless Networks<\/a><\/h2><\/header><div class=\"eael-entry-content\">\n                        <div class=\"eael-grid-post-excerpt\"><p>Introduction In the ever-evolving landscape of cybersecurity, the importance of...<\/p><\/div>\n                    <\/div><div class=\"eael-entry-footer\"><div class=\"eael-author-avatar\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=96&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=192&#038;d=mm&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' loading='lazy' decoding='async'\/><\/a><\/div><div class=\"eael-entry-meta\"><span class=\"eael-posted-by\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\" title=\"Posts by Devyansh Sharda\" rel=\"author\"  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Devyansh Sharda<\/a><\/span><span class=\"eael-posted-on\"><time datetime=\"January 18, 2024\">January 18, 2024<\/time><\/span><\/div><\/div><\/div><\/div>\n        <\/div>\n    <\/article><article class=\"eael-grid-post eael-post-grid-column\" data-id=\"4764\">\n        <div class=\"eael-grid-post-holder\">\n            <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-media\"><div class=\"eael-entry-overlay fade-in\"><i class=\"fas fa-long-arrow-alt-right\" aria-hidden=\"true\"><\/i><a href=\"https:\/\/xiarch.com\/blog\/elevate-your-wireless-security-strategy-with-xiarchs-penetration-testing\/\"><\/a><\/div><div class=\"eael-entry-thumbnail \">\n                <img width=\"300\" height=\"300\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-12-122010-300x300.png\" class=\"attachment-medium size-medium wp-image-4765\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-12-122010-300x300.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-12-122010-150x150.png 150w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-12-122010-600x600.png 600w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2024\/01\/Screenshot-2024-01-12-122010.png 681w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\n            <\/div>\n        <\/div><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><h2 class=\"eael-entry-title\"><a\n                        class=\"eael-grid-post-link\"\n                        href=\"https:\/\/xiarch.com\/blog\/elevate-your-wireless-security-strategy-with-xiarchs-penetration-testing\/\"\n                        title=\"Elevate Your Wireless Security Strategy with Xiarch&#8217;s Penetration Testing\">Elevate Your Wireless Security Strategy with Xiarch&#8217;s Penetration Testing<\/a><\/h2><\/header><div class=\"eael-entry-content\">\n                        <div class=\"eael-grid-post-excerpt\"><p>Introduction In an era where cyber threats constantly evolve, securing...<\/p><\/div>\n                    <\/div><div class=\"eael-entry-footer\"><div class=\"eael-author-avatar\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=96&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=192&#038;d=mm&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' loading='lazy' decoding='async'\/><\/a><\/div><div class=\"eael-entry-meta\"><span class=\"eael-posted-by\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\" title=\"Posts by Devyansh Sharda\" rel=\"author\"  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Devyansh Sharda<\/a><\/span><span class=\"eael-posted-on\"><time datetime=\"January 12, 2024\">January 12, 2024<\/time><\/span><\/div><\/div><\/div><\/div>\n        <\/div>\n    <\/article><article class=\"eael-grid-post eael-post-grid-column\" data-id=\"4757\">\n        <div class=\"eael-grid-post-holder\">\n            <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-media\"><div class=\"eael-entry-overlay fade-in\"><i class=\"fas fa-long-arrow-alt-right\" aria-hidden=\"true\"><\/i><a href=\"https:\/\/xiarch.com\/blog\/worried-about-cyber-threats-to-your-business-our-scada-ics-security-assessments-provide-peace-of-mind-for-local-businesses-protect-your-critical-infrastructure-today\/\"><\/a><\/div><div class=\"eael-entry-thumbnail \">\n                <img width=\"300\" height=\"300\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/12\/Screenshot-2023-12-22-163353-300x300.png\" class=\"attachment-medium size-medium wp-image-4758\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/12\/Screenshot-2023-12-22-163353-300x300.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/12\/Screenshot-2023-12-22-163353-150x150.png 150w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/12\/Screenshot-2023-12-22-163353-600x600.png 600w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/12\/Screenshot-2023-12-22-163353.png 680w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\n            <\/div>\n        <\/div><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><h2 class=\"eael-entry-title\"><a\n                        class=\"eael-grid-post-link\"\n                        href=\"https:\/\/xiarch.com\/blog\/worried-about-cyber-threats-to-your-business-our-scada-ics-security-assessments-provide-peace-of-mind-for-local-businesses-protect-your-critical-infrastructure-today\/\"\n                        title=\"Worried about Cyber Threats to Your Business? Our SCADA &amp; ICS Security Assessments Provide Peace of Mind for Local Businesses. Protect Your Critical Infrastructure Today.\">Worried about Cyber Threats to Your Business? Our SCADA &amp; ICS Security Assessments Provide Peace of Mind for Local Businesses. Protect Your Critical Infrastructure Today.<\/a><\/h2><\/header><div class=\"eael-entry-content\">\n                        <div class=\"eael-grid-post-excerpt\"><p>Introduction In an era dominated by digital landscapes, safeguarding your...<\/p><\/div>\n                    <\/div><div class=\"eael-entry-footer\"><div class=\"eael-author-avatar\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=96&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=192&#038;d=mm&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' loading='lazy' decoding='async'\/><\/a><\/div><div class=\"eael-entry-meta\"><span class=\"eael-posted-by\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\" title=\"Posts by Devyansh Sharda\" rel=\"author\"  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Devyansh Sharda<\/a><\/span><span class=\"eael-posted-on\"><time datetime=\"December 22, 2023\">December 22, 2023<\/time><\/span><\/div><\/div><\/div><\/div>\n        <\/div>\n    <\/article><article class=\"eael-grid-post eael-post-grid-column\" data-id=\"4750\">\n        <div class=\"eael-grid-post-holder\">\n            <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-media\"><div class=\"eael-entry-overlay fade-in\"><i class=\"fas fa-long-arrow-alt-right\" aria-hidden=\"true\"><\/i><a href=\"https:\/\/xiarch.com\/blog\/local-businesses-cant-afford-security-lapses-our-scada-ics-security-assessments-ensure-your-systems-are-protected-from-potential-threats\/\"><\/a><\/div><div class=\"eael-entry-thumbnail \">\n                <img width=\"300\" height=\"300\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/12\/Screenshot-2023-12-13-175350-300x300.png\" class=\"attachment-medium size-medium wp-image-4752\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/12\/Screenshot-2023-12-13-175350-300x300.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/12\/Screenshot-2023-12-13-175350-150x150.png 150w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/12\/Screenshot-2023-12-13-175350-600x600.png 600w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/12\/Screenshot-2023-12-13-175350.png 678w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\n            <\/div>\n        <\/div><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><h2 class=\"eael-entry-title\"><a\n                        class=\"eael-grid-post-link\"\n                        href=\"https:\/\/xiarch.com\/blog\/local-businesses-cant-afford-security-lapses-our-scada-ics-security-assessments-ensure-your-systems-are-protected-from-potential-threats\/\"\n                        title=\"Local businesses can&#8217;t afford security lapses. Our SCADA &amp; ICS security assessments ensure your systems are protected from potential threats.\">Local businesses can&#8217;t afford security lapses. Our SCADA &amp; ICS security assessments ensure your systems are protected from potential threats.<\/a><\/h2><\/header><div class=\"eael-entry-content\">\n                        <div class=\"eael-grid-post-excerpt\"><p>Introduction: In an era dominated by digital landscapes, the vulnerability...<\/p><\/div>\n                    <\/div><div class=\"eael-entry-footer\"><div class=\"eael-author-avatar\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=96&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=192&#038;d=mm&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' loading='lazy' decoding='async'\/><\/a><\/div><div class=\"eael-entry-meta\"><span class=\"eael-posted-by\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\" title=\"Posts by Devyansh Sharda\" rel=\"author\"  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Devyansh Sharda<\/a><\/span><span class=\"eael-posted-on\"><time datetime=\"December 13, 2023\">December 13, 2023<\/time><\/span><\/div><\/div><\/div><\/div>\n        <\/div>\n    <\/article><article class=\"eael-grid-post eael-post-grid-column\" data-id=\"4744\">\n        <div class=\"eael-grid-post-holder\">\n            <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-media\"><div class=\"eael-entry-overlay fade-in\"><i class=\"fas fa-long-arrow-alt-right\" aria-hidden=\"true\"><\/i><a href=\"https:\/\/xiarch.com\/blog\/protect-your-business-with-our-scada-ics-security-assessments-local-businesses-cant-afford-to-be-vulnerable-contact-us-today-for-expert-solutions\/\"><\/a><\/div><div class=\"eael-entry-thumbnail \">\n                <img width=\"297\" height=\"300\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/12\/Screenshot-2023-12-08-160513-297x300.png\" class=\"attachment-medium size-medium wp-image-4745\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/12\/Screenshot-2023-12-08-160513-297x300.png 297w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/12\/Screenshot-2023-12-08-160513.png 676w\" sizes=\"(max-width: 297px) 100vw, 297px\" \/>\n            <\/div>\n        <\/div><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><h2 class=\"eael-entry-title\"><a\n                        class=\"eael-grid-post-link\"\n                        href=\"https:\/\/xiarch.com\/blog\/protect-your-business-with-our-scada-ics-security-assessments-local-businesses-cant-afford-to-be-vulnerable-contact-us-today-for-expert-solutions\/\"\n                        title=\"Protect Your Business with Our SCADA &amp; ICS Security Assessments. Local Businesses Can&#8217;t Afford to Be Vulnerable. Contact Us Today for Expert Solutions.\">Protect Your Business with Our SCADA &amp; ICS Security Assessments. Local Businesses Can&#8217;t Afford to Be Vulnerable. Contact Us Today for Expert Solutions.<\/a><\/h2><\/header><div class=\"eael-entry-content\">\n                        <div class=\"eael-grid-post-excerpt\"><p>Introduction: In an era dominated by technological advancements, protecting your...<\/p><\/div>\n                    <\/div><div class=\"eael-entry-footer\"><div class=\"eael-author-avatar\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=96&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=192&#038;d=mm&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' loading='lazy' decoding='async'\/><\/a><\/div><div class=\"eael-entry-meta\"><span class=\"eael-posted-by\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\" title=\"Posts by Devyansh Sharda\" rel=\"author\"  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Devyansh Sharda<\/a><\/span><span class=\"eael-posted-on\"><time datetime=\"December 8, 2023\">December 8, 2023<\/time><\/span><\/div><\/div><\/div><\/div>\n        <\/div>\n    <\/article><article class=\"eael-grid-post eael-post-grid-column\" data-id=\"4729\">\n        <div class=\"eael-grid-post-holder\">\n            <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-media\"><div class=\"eael-entry-overlay fade-in\"><i class=\"fas fa-long-arrow-alt-right\" aria-hidden=\"true\"><\/i><a href=\"https:\/\/xiarch.com\/blog\/dont-leave-your-businesss-security-to-chance-our-scada-ics-security-assessments-provide-robust-protection-for-local-businesses\/\"><\/a><\/div><div class=\"eael-entry-thumbnail \">\n                <img width=\"300\" height=\"300\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/11\/Screenshot-2023-11-30-142449-300x300.png\" class=\"attachment-medium size-medium wp-image-4731\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/11\/Screenshot-2023-11-30-142449-300x300.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/11\/Screenshot-2023-11-30-142449-150x150.png 150w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/11\/Screenshot-2023-11-30-142449-600x600.png 600w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/11\/Screenshot-2023-11-30-142449.png 654w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\n            <\/div>\n        <\/div><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><h2 class=\"eael-entry-title\"><a\n                        class=\"eael-grid-post-link\"\n                        href=\"https:\/\/xiarch.com\/blog\/dont-leave-your-businesss-security-to-chance-our-scada-ics-security-assessments-provide-robust-protection-for-local-businesses\/\"\n                        title=\"Don&#8217;t Leave Your Business&#8217;s Security to Chance. Our SCADA &amp; ICS Security Assessments Provide Robust Protection for Local Businesses.\">Don&#8217;t Leave Your Business&#8217;s Security to Chance. Our SCADA &amp; ICS Security Assessments Provide Robust Protection for Local Businesses.<\/a><\/h2><\/header><div class=\"eael-entry-content\">\n                        <div class=\"eael-grid-post-excerpt\"><p>Introduction In an era where digital threats loom large, safeguarding...<\/p><\/div>\n                    <\/div><div class=\"eael-entry-footer\"><div class=\"eael-author-avatar\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=96&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=192&#038;d=mm&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' loading='lazy' decoding='async'\/><\/a><\/div><div class=\"eael-entry-meta\"><span class=\"eael-posted-by\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\" title=\"Posts by Devyansh Sharda\" rel=\"author\"  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Devyansh Sharda<\/a><\/span><span class=\"eael-posted-on\"><time datetime=\"November 30, 2023\">November 30, 2023<\/time><\/span><\/div><\/div><\/div><\/div>\n        <\/div>\n    <\/article><article class=\"eael-grid-post eael-post-grid-column\" data-id=\"4722\">\n        <div class=\"eael-grid-post-holder\">\n            <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-media\"><div class=\"eael-entry-overlay fade-in\"><i class=\"fas fa-long-arrow-alt-right\" aria-hidden=\"true\"><\/i><a href=\"https:\/\/xiarch.com\/blog\/local-businesses-keep-your-critical-infrastructure-secure-with-our-scada-ics-security-assessment-services-dont-compromise-on-safety\/\"><\/a><\/div><div class=\"eael-entry-thumbnail \">\n                <img width=\"300\" height=\"300\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/11\/Screenshot-2023-11-23-110159-300x300.png\" class=\"attachment-medium size-medium wp-image-4724\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/11\/Screenshot-2023-11-23-110159-300x300.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/11\/Screenshot-2023-11-23-110159-150x150.png 150w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/11\/Screenshot-2023-11-23-110159-600x600.png 600w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/11\/Screenshot-2023-11-23-110159.png 649w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\n            <\/div>\n        <\/div><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><h2 class=\"eael-entry-title\"><a\n                        class=\"eael-grid-post-link\"\n                        href=\"https:\/\/xiarch.com\/blog\/local-businesses-keep-your-critical-infrastructure-secure-with-our-scada-ics-security-assessment-services-dont-compromise-on-safety\/\"\n                        title=\"Local Businesses, Keep Your Critical Infrastructure Secure with Our SCADA &amp; ICS Security Assessment Services. Don&#8217;t Compromise on Safety.\">Local Businesses, Keep Your Critical Infrastructure Secure with Our SCADA &amp; ICS Security Assessment Services. Don&#8217;t Compromise on Safety.<\/a><\/h2><\/header><div class=\"eael-entry-content\">\n                        <div class=\"eael-grid-post-excerpt\"><p>Introduction: In today&#8217;s fast-paced digital landscape, local businesses face unprecedented...<\/p><\/div>\n                    <\/div><div class=\"eael-entry-footer\"><div class=\"eael-author-avatar\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=96&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=192&#038;d=mm&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' loading='lazy' decoding='async'\/><\/a><\/div><div class=\"eael-entry-meta\"><span class=\"eael-posted-by\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\" title=\"Posts by Devyansh Sharda\" rel=\"author\"  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Devyansh Sharda<\/a><\/span><span class=\"eael-posted-on\"><time datetime=\"November 23, 2023\">November 23, 2023<\/time><\/span><\/div><\/div><\/div><\/div>\n        <\/div>\n    <\/article><article class=\"eael-grid-post eael-post-grid-column\" data-id=\"4715\">\n        <div class=\"eael-grid-post-holder\">\n            <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-media\"><div class=\"eael-entry-overlay fade-in\"><i class=\"fas fa-long-arrow-alt-right\" aria-hidden=\"true\"><\/i><a href=\"https:\/\/xiarch.com\/blog\/worried-about-cyber-threats-to-your-business-our-scada-ics-security-assessment-provides-peace-of-mind-for-local-businesses-protect-your-critical-infrastructure-today\/\"><\/a><\/div><div class=\"eael-entry-thumbnail \">\n                <img width=\"300\" height=\"300\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/11\/Screenshot-2023-11-17-105943-300x300.png\" class=\"attachment-medium size-medium wp-image-4717\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/11\/Screenshot-2023-11-17-105943-300x300.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/11\/Screenshot-2023-11-17-105943-150x150.png 150w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/11\/Screenshot-2023-11-17-105943-600x600.png 600w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/11\/Screenshot-2023-11-17-105943.png 650w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\n            <\/div>\n        <\/div><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><h2 class=\"eael-entry-title\"><a\n                        class=\"eael-grid-post-link\"\n                        href=\"https:\/\/xiarch.com\/blog\/worried-about-cyber-threats-to-your-business-our-scada-ics-security-assessment-provides-peace-of-mind-for-local-businesses-protect-your-critical-infrastructure-today\/\"\n                        title=\"Worried about cyber threats to your business? Our SCADA &amp; ICS security assessment provides peace of mind for local businesses. Protect your critical infrastructure today.\">Worried about cyber threats to your business? Our SCADA &amp; ICS security assessment provides peace of mind for local businesses. Protect your critical infrastructure today.<\/a><\/h2><\/header><div class=\"eael-entry-content\">\n                        <div class=\"eael-grid-post-excerpt\"><p>Introduction: In an era dominated by technology, safeguarding your business...<\/p><\/div>\n                    <\/div><div class=\"eael-entry-footer\"><div class=\"eael-author-avatar\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=96&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=192&#038;d=mm&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' loading='lazy' decoding='async'\/><\/a><\/div><div class=\"eael-entry-meta\"><span class=\"eael-posted-by\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\" title=\"Posts by Devyansh Sharda\" rel=\"author\"  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Devyansh Sharda<\/a><\/span><span class=\"eael-posted-on\"><time datetime=\"November 17, 2023\">November 17, 2023<\/time><\/span><\/div><\/div><\/div><\/div>\n        <\/div>\n    <\/article><article class=\"eael-grid-post eael-post-grid-column\" data-id=\"4707\">\n        <div class=\"eael-grid-post-holder\">\n            <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-media\"><div class=\"eael-entry-overlay fade-in\"><i class=\"fas fa-long-arrow-alt-right\" aria-hidden=\"true\"><\/i><a href=\"https:\/\/xiarch.com\/blog\/safeguard-your-critical-infrastructure-with-our-scada-ics-security-assessment-services\/\"><\/a><\/div><div class=\"eael-entry-thumbnail \">\n                <img width=\"298\" height=\"300\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/11\/Screenshot-2023-11-10-104740-298x300.jpg\" class=\"attachment-medium size-medium wp-image-4712\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/11\/Screenshot-2023-11-10-104740-298x300.jpg 298w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/11\/Screenshot-2023-11-10-104740-150x150.jpg 150w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/11\/Screenshot-2023-11-10-104740.jpg 459w\" sizes=\"(max-width: 298px) 100vw, 298px\" \/>\n            <\/div>\n        <\/div><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><h2 class=\"eael-entry-title\"><a\n                        class=\"eael-grid-post-link\"\n                        href=\"https:\/\/xiarch.com\/blog\/safeguard-your-critical-infrastructure-with-our-scada-ics-security-assessment-services\/\"\n                        title=\"Safeguard Your Critical Infrastructure with Our SCADA &amp; ICS Security Assessment Services\">Safeguard Your Critical Infrastructure with Our SCADA &amp; ICS Security Assessment Services<\/a><\/h2><\/header><div class=\"eael-entry-content\">\n                        <div class=\"eael-grid-post-excerpt\"><p>Introduction In an era where digital threats loom large, safeguarding...<\/p><\/div>\n                    <\/div><div class=\"eael-entry-footer\"><div class=\"eael-author-avatar\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=96&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=192&#038;d=mm&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' loading='lazy' decoding='async'\/><\/a><\/div><div class=\"eael-entry-meta\"><span class=\"eael-posted-by\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\" title=\"Posts by Devyansh Sharda\" rel=\"author\"  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Devyansh Sharda<\/a><\/span><span class=\"eael-posted-on\"><time datetime=\"November 10, 2023\">November 10, 2023<\/time><\/span><\/div><\/div><\/div><\/div>\n        <\/div>\n    <\/article><article class=\"eael-grid-post eael-post-grid-column\" data-id=\"4701\">\n        <div class=\"eael-grid-post-holder\">\n            <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-media\"><div class=\"eael-entry-overlay fade-in\"><i class=\"fas fa-long-arrow-alt-right\" aria-hidden=\"true\"><\/i><a href=\"https:\/\/xiarch.com\/blog\/mastering-the-art-of-cloud-security-assessment\/\"><\/a><\/div><div class=\"eael-entry-thumbnail \">\n                <img width=\"300\" height=\"300\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/11\/Screenshot-2023-11-03-165050-300x300.png\" class=\"attachment-medium size-medium wp-image-4702\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/11\/Screenshot-2023-11-03-165050-300x300.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/11\/Screenshot-2023-11-03-165050-150x150.png 150w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/11\/Screenshot-2023-11-03-165050-600x600.png 600w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/11\/Screenshot-2023-11-03-165050.png 662w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\n            <\/div>\n        <\/div><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><h2 class=\"eael-entry-title\"><a\n                        class=\"eael-grid-post-link\"\n                        href=\"https:\/\/xiarch.com\/blog\/mastering-the-art-of-cloud-security-assessment\/\"\n                        title=\"Mastering the Art of Cloud Security Assessment\">Mastering the Art of Cloud Security Assessment<\/a><\/h2><\/header><div class=\"eael-entry-content\">\n                        <div class=\"eael-grid-post-excerpt\"><p>Introduction In today&#8217;s digital landscape, cloud technology is at the...<\/p><\/div>\n                    <\/div><div class=\"eael-entry-footer\"><div class=\"eael-author-avatar\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=96&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=192&#038;d=mm&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' loading='lazy' decoding='async'\/><\/a><\/div><div class=\"eael-entry-meta\"><span class=\"eael-posted-by\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\" title=\"Posts by Devyansh Sharda\" rel=\"author\"  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Devyansh Sharda<\/a><\/span><span class=\"eael-posted-on\"><time datetime=\"November 3, 2023\">November 3, 2023<\/time><\/span><\/div><\/div><\/div><\/div>\n        <\/div>\n    <\/article><article class=\"eael-grid-post eael-post-grid-column\" data-id=\"4693\">\n        <div class=\"eael-grid-post-holder\">\n            <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-media\"><div class=\"eael-entry-overlay fade-in\"><i class=\"fas fa-long-arrow-alt-right\" aria-hidden=\"true\"><\/i><a href=\"https:\/\/xiarch.com\/blog\/avoiding-common-pitfalls-in-cloud-security-assessment-a-comprehensive-guide\/\"><\/a><\/div><div class=\"eael-entry-thumbnail \">\n                <img width=\"300\" height=\"300\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/10\/Screenshot-2023-10-26-175906-300x300.png\" class=\"attachment-medium size-medium wp-image-4698\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/10\/Screenshot-2023-10-26-175906-300x300.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/10\/Screenshot-2023-10-26-175906-150x150.png 150w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/10\/Screenshot-2023-10-26-175906-600x600.png 600w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/10\/Screenshot-2023-10-26-175906.png 663w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\n            <\/div>\n        <\/div><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><h2 class=\"eael-entry-title\"><a\n                        class=\"eael-grid-post-link\"\n                        href=\"https:\/\/xiarch.com\/blog\/avoiding-common-pitfalls-in-cloud-security-assessment-a-comprehensive-guide\/\"\n                        title=\"Avoiding Common Pitfalls in Cloud Security Assessment: A Comprehensive Guide\">Avoiding Common Pitfalls in Cloud Security Assessment: A Comprehensive Guide<\/a><\/h2><\/header><div class=\"eael-entry-content\">\n                        <div class=\"eael-grid-post-excerpt\"><p>Introduction In today&#8217;s digital landscape, businesses rely heavily on cloud...<\/p><\/div>\n                    <\/div><div class=\"eael-entry-footer\"><div class=\"eael-author-avatar\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=96&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=192&#038;d=mm&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' loading='lazy' decoding='async'\/><\/a><\/div><div class=\"eael-entry-meta\"><span class=\"eael-posted-by\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\" title=\"Posts by Devyansh Sharda\" rel=\"author\"  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Devyansh Sharda<\/a><\/span><span class=\"eael-posted-on\"><time datetime=\"October 26, 2023\">October 26, 2023<\/time><\/span><\/div><\/div><\/div><\/div>\n        <\/div>\n    <\/article><article class=\"eael-grid-post eael-post-grid-column\" data-id=\"4686\">\n        <div class=\"eael-grid-post-holder\">\n            <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-media\"><div class=\"eael-entry-overlay fade-in\"><i class=\"fas fa-long-arrow-alt-right\" aria-hidden=\"true\"><\/i><a href=\"https:\/\/xiarch.com\/blog\/the-future-of-cloud-security-assessment-what-to-expect-ai\/\"><\/a><\/div><div class=\"eael-entry-thumbnail \">\n                <img width=\"300\" height=\"300\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/10\/Screenshot-2023-10-19-135234-300x300.png\" class=\"attachment-medium size-medium wp-image-4687\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/10\/Screenshot-2023-10-19-135234-300x300.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/10\/Screenshot-2023-10-19-135234-150x150.png 150w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/10\/Screenshot-2023-10-19-135234-600x600.png 600w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/10\/Screenshot-2023-10-19-135234.png 662w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\n            <\/div>\n        <\/div><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><h2 class=\"eael-entry-title\"><a\n                        class=\"eael-grid-post-link\"\n                        href=\"https:\/\/xiarch.com\/blog\/the-future-of-cloud-security-assessment-what-to-expect-ai\/\"\n                        title=\"The Future of Cloud Security Assessment: What to Expect AI\">The Future of Cloud Security Assessment: What to Expect AI<\/a><\/h2><\/header><div class=\"eael-entry-content\">\n                        <div class=\"eael-grid-post-excerpt\"><p>Introduction The world of cloud security assessment is evolving at...<\/p><\/div>\n                    <\/div><div class=\"eael-entry-footer\"><div class=\"eael-author-avatar\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=96&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=192&#038;d=mm&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' loading='lazy' decoding='async'\/><\/a><\/div><div class=\"eael-entry-meta\"><span class=\"eael-posted-by\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\" title=\"Posts by Devyansh Sharda\" rel=\"author\"  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Devyansh Sharda<\/a><\/span><span class=\"eael-posted-on\"><time datetime=\"October 19, 2023\">October 19, 2023<\/time><\/span><\/div><\/div><\/div><\/div>\n        <\/div>\n    <\/article><article class=\"eael-grid-post eael-post-grid-column\" data-id=\"4679\">\n        <div class=\"eael-grid-post-holder\">\n            <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-media\"><div class=\"eael-entry-overlay fade-in\"><i class=\"fas fa-long-arrow-alt-right\" aria-hidden=\"true\"><\/i><a href=\"https:\/\/xiarch.com\/blog\/mastering-the-art-of-cloud-security-assessment-ensuring-data-protection\/\"><\/a><\/div><div class=\"eael-entry-thumbnail \">\n                <img width=\"300\" height=\"300\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/10\/Screenshot-2023-10-12-221037-300x300.png\" class=\"attachment-medium size-medium wp-image-4680\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/10\/Screenshot-2023-10-12-221037-300x300.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/10\/Screenshot-2023-10-12-221037-150x150.png 150w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/10\/Screenshot-2023-10-12-221037-600x600.png 600w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/10\/Screenshot-2023-10-12-221037.png 658w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\n            <\/div>\n        <\/div><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><h2 class=\"eael-entry-title\"><a\n                        class=\"eael-grid-post-link\"\n                        href=\"https:\/\/xiarch.com\/blog\/mastering-the-art-of-cloud-security-assessment-ensuring-data-protection\/\"\n                        title=\"Mastering the Art of Cloud Security Assessment: Ensuring Data Protection\">Mastering the Art of Cloud Security Assessment: Ensuring Data Protection<\/a><\/h2><\/header><div class=\"eael-entry-content\">\n                        <div class=\"eael-grid-post-excerpt\"><p>Introduction In today&#8217;s digital age, organizations increasingly rely on cloud...<\/p><\/div>\n                    <\/div><div class=\"eael-entry-footer\"><div class=\"eael-author-avatar\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=96&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=192&#038;d=mm&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' loading='lazy' decoding='async'\/><\/a><\/div><div class=\"eael-entry-meta\"><span class=\"eael-posted-by\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\" title=\"Posts by Devyansh Sharda\" rel=\"author\"  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Devyansh Sharda<\/a><\/span><span class=\"eael-posted-on\"><time datetime=\"October 12, 2023\">October 12, 2023<\/time><\/span><\/div><\/div><\/div><\/div>\n        <\/div>\n    <\/article><article class=\"eael-grid-post eael-post-grid-column\" data-id=\"4672\">\n        <div class=\"eael-grid-post-holder\">\n            <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-media\"><div class=\"eael-entry-overlay fade-in\"><i class=\"fas fa-long-arrow-alt-right\" aria-hidden=\"true\"><\/i><a href=\"https:\/\/xiarch.com\/blog\/unlocking-the-secrets-of-cloud-security-assessment\/\"><\/a><\/div><div class=\"eael-entry-thumbnail \">\n                <img width=\"300\" height=\"300\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/10\/Screenshot-2023-10-06-133808-300x300.png\" class=\"attachment-medium size-medium wp-image-4677\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/10\/Screenshot-2023-10-06-133808-300x300.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/10\/Screenshot-2023-10-06-133808-150x150.png 150w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/10\/Screenshot-2023-10-06-133808-600x600.png 600w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/10\/Screenshot-2023-10-06-133808.png 683w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\n            <\/div>\n        <\/div><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><h2 class=\"eael-entry-title\"><a\n                        class=\"eael-grid-post-link\"\n                        href=\"https:\/\/xiarch.com\/blog\/unlocking-the-secrets-of-cloud-security-assessment\/\"\n                        title=\"Unlocking the Secrets of Cloud Security Assessment\">Unlocking the Secrets of Cloud Security Assessment<\/a><\/h2><\/header><div class=\"eael-entry-content\">\n                        <div class=\"eael-grid-post-excerpt\"><p>Introduction In today&#8217;s digital age, where data is the lifeblood...<\/p><\/div>\n                    <\/div><div class=\"eael-entry-footer\"><div class=\"eael-author-avatar\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=96&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=192&#038;d=mm&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' loading='lazy' decoding='async'\/><\/a><\/div><div class=\"eael-entry-meta\"><span class=\"eael-posted-by\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\" title=\"Posts by Devyansh Sharda\" rel=\"author\"  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Devyansh Sharda<\/a><\/span><span class=\"eael-posted-on\"><time datetime=\"October 6, 2023\">October 6, 2023<\/time><\/span><\/div><\/div><\/div><\/div>\n        <\/div>\n    <\/article><article class=\"eael-grid-post eael-post-grid-column\" data-id=\"4665\">\n        <div class=\"eael-grid-post-holder\">\n            <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-media\"><div class=\"eael-entry-overlay fade-in\"><i class=\"fas fa-long-arrow-alt-right\" aria-hidden=\"true\"><\/i><a href=\"https:\/\/xiarch.com\/blog\/mastering-api-vulnerability-analysis-a-comprehensive-guide\/\"><\/a><\/div><div class=\"eael-entry-thumbnail \">\n                <img width=\"297\" height=\"300\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/09\/Screenshot-2023-09-28-175803-297x300.png\" class=\"attachment-medium size-medium wp-image-4666\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/09\/Screenshot-2023-09-28-175803-297x300.png 297w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/09\/Screenshot-2023-09-28-175803.png 686w\" sizes=\"(max-width: 297px) 100vw, 297px\" \/>\n            <\/div>\n        <\/div><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><h2 class=\"eael-entry-title\"><a\n                        class=\"eael-grid-post-link\"\n                        href=\"https:\/\/xiarch.com\/blog\/mastering-api-vulnerability-analysis-a-comprehensive-guide\/\"\n                        title=\"Mastering API Vulnerability Analysis: A Comprehensive Guide\">Mastering API Vulnerability Analysis: A Comprehensive Guide<\/a><\/h2><\/header><div class=\"eael-entry-content\">\n                        <div class=\"eael-grid-post-excerpt\"><p>Introduction In today&#8217;s interconnected digital landscape, APIs (Application Programming Interfaces)...<\/p><\/div>\n                    <\/div><div class=\"eael-entry-footer\"><div class=\"eael-author-avatar\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=96&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=192&#038;d=mm&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' loading='lazy' decoding='async'\/><\/a><\/div><div class=\"eael-entry-meta\"><span class=\"eael-posted-by\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\" title=\"Posts by Devyansh Sharda\" rel=\"author\"  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Devyansh Sharda<\/a><\/span><span class=\"eael-posted-on\"><time datetime=\"September 28, 2023\">September 28, 2023<\/time><\/span><\/div><\/div><\/div><\/div>\n        <\/div>\n    <\/article><article class=\"eael-grid-post eael-post-grid-column\" data-id=\"4657\">\n        <div class=\"eael-grid-post-holder\">\n            <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-media\"><div class=\"eael-entry-overlay fade-in\"><i class=\"fas fa-long-arrow-alt-right\" aria-hidden=\"true\"><\/i><a href=\"https:\/\/xiarch.com\/blog\/why-api-security-matters-protecting-your-digital-assets\/\"><\/a><\/div><div class=\"eael-entry-thumbnail \">\n                <img width=\"300\" height=\"300\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/09\/Screenshot-2023-09-21-143152-300x300.png\" class=\"attachment-medium size-medium wp-image-4662\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/09\/Screenshot-2023-09-21-143152-300x300.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/09\/Screenshot-2023-09-21-143152-150x150.png 150w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/09\/Screenshot-2023-09-21-143152-600x600.png 600w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/09\/Screenshot-2023-09-21-143152.png 685w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\n            <\/div>\n        <\/div><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><h2 class=\"eael-entry-title\"><a\n                        class=\"eael-grid-post-link\"\n                        href=\"https:\/\/xiarch.com\/blog\/why-api-security-matters-protecting-your-digital-assets\/\"\n                        title=\"Why API Security Matters: Protecting Your Digital Assets\">Why API Security Matters: Protecting Your Digital Assets<\/a><\/h2><\/header><div class=\"eael-entry-content\">\n                        <div class=\"eael-grid-post-excerpt\"><p>10 Reasons Why API Security Matters: Protecting Your Digital Assets...<\/p><\/div>\n                    <\/div><div class=\"eael-entry-footer\"><div class=\"eael-author-avatar\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=96&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=192&#038;d=mm&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' loading='lazy' decoding='async'\/><\/a><\/div><div class=\"eael-entry-meta\"><span class=\"eael-posted-by\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\" title=\"Posts by Devyansh Sharda\" rel=\"author\"  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Devyansh Sharda<\/a><\/span><span class=\"eael-posted-on\"><time datetime=\"September 21, 2023\">September 21, 2023<\/time><\/span><\/div><\/div><\/div><\/div>\n        <\/div>\n    <\/article><article class=\"eael-grid-post eael-post-grid-column\" data-id=\"4649\">\n        <div class=\"eael-grid-post-holder\">\n            <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-media\"><div class=\"eael-entry-overlay fade-in\"><i class=\"fas fa-long-arrow-alt-right\" aria-hidden=\"true\"><\/i><a href=\"https:\/\/xiarch.com\/blog\/unveiling-the-secrets-of-api-web-service-penetration-testing-2\/\"><\/a><\/div><div class=\"eael-entry-thumbnail \">\n                <img width=\"300\" height=\"300\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/09\/Screenshot-2023-09-14-143110-300x300.png\" class=\"attachment-medium size-medium wp-image-4655\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/09\/Screenshot-2023-09-14-143110-300x300.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/09\/Screenshot-2023-09-14-143110-150x150.png 150w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/09\/Screenshot-2023-09-14-143110-600x600.png 600w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/09\/Screenshot-2023-09-14-143110.png 692w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\n            <\/div>\n        <\/div><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><h2 class=\"eael-entry-title\"><a\n                        class=\"eael-grid-post-link\"\n                        href=\"https:\/\/xiarch.com\/blog\/unveiling-the-secrets-of-api-web-service-penetration-testing-2\/\"\n                        title=\"Unveiling the Secrets of API &amp; Web Service Penetration Testing\">Unveiling the Secrets of API &amp; Web Service Penetration Testing<\/a><\/h2><\/header><div class=\"eael-entry-content\">\n                        <div class=\"eael-grid-post-excerpt\"><p>Introduction APIs (Application Programming Interfaces) and web services have become...<\/p><\/div>\n                    <\/div><div class=\"eael-entry-footer\"><div class=\"eael-author-avatar\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=96&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=192&#038;d=mm&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' loading='lazy' decoding='async'\/><\/a><\/div><div class=\"eael-entry-meta\"><span class=\"eael-posted-by\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\" title=\"Posts by Devyansh Sharda\" rel=\"author\"  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Devyansh Sharda<\/a><\/span><span class=\"eael-posted-on\"><time datetime=\"September 14, 2023\">September 14, 2023<\/time><\/span><\/div><\/div><\/div><\/div>\n        <\/div>\n    <\/article><article class=\"eael-grid-post eael-post-grid-column\" data-id=\"4641\">\n        <div class=\"eael-grid-post-holder\">\n            <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-media\"><div class=\"eael-entry-overlay fade-in\"><i class=\"fas fa-long-arrow-alt-right\" aria-hidden=\"true\"><\/i><a href=\"https:\/\/xiarch.com\/blog\/unveiling-the-secrets-of-api-web-service-penetration-testing\/\"><\/a><\/div><div class=\"eael-entry-thumbnail \">\n                <img width=\"300\" height=\"300\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/09\/Screenshot-2023-09-01-194147-300x300.png\" class=\"attachment-medium size-medium wp-image-4639\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/09\/Screenshot-2023-09-01-194147-300x300.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/09\/Screenshot-2023-09-01-194147-150x150.png 150w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/09\/Screenshot-2023-09-01-194147-600x600.png 600w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/09\/Screenshot-2023-09-01-194147.png 689w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\n            <\/div>\n        <\/div><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><h2 class=\"eael-entry-title\"><a\n                        class=\"eael-grid-post-link\"\n                        href=\"https:\/\/xiarch.com\/blog\/unveiling-the-secrets-of-api-web-service-penetration-testing\/\"\n                        title=\"Unveiling the Secrets of API &amp; Web Service Penetration Testing\">Unveiling the Secrets of API &amp; Web Service Penetration Testing<\/a><\/h2><\/header><div class=\"eael-entry-content\">\n                        <div class=\"eael-grid-post-excerpt\"><p>Introduction In an age where digitalization is ubiquitous, ensuring the...<\/p><\/div>\n                    <\/div><div class=\"eael-entry-footer\"><div class=\"eael-author-avatar\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=96&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=192&#038;d=mm&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' loading='lazy' decoding='async'\/><\/a><\/div><div class=\"eael-entry-meta\"><span class=\"eael-posted-by\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\" title=\"Posts by Devyansh Sharda\" rel=\"author\"  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Devyansh Sharda<\/a><\/span><span class=\"eael-posted-on\"><time datetime=\"September 7, 2023\">September 7, 2023<\/time><\/span><\/div><\/div><\/div><\/div>\n        <\/div>\n    <\/article><article class=\"eael-grid-post eael-post-grid-column\" data-id=\"4635\">\n        <div class=\"eael-grid-post-holder\">\n            <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-media\"><div class=\"eael-entry-overlay fade-in\"><i class=\"fas fa-long-arrow-alt-right\" aria-hidden=\"true\"><\/i><a href=\"https:\/\/xiarch.com\/blog\/protect-your-customers-data-choose-our-database-security-assessment-for-a-safer-business-environment\/\"><\/a><\/div><div class=\"eael-entry-thumbnail \">\n                <img width=\"300\" height=\"300\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/09\/Screenshot-2023-09-01-194147-300x300.png\" class=\"attachment-medium size-medium wp-image-4639\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/09\/Screenshot-2023-09-01-194147-300x300.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/09\/Screenshot-2023-09-01-194147-150x150.png 150w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/09\/Screenshot-2023-09-01-194147-600x600.png 600w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/09\/Screenshot-2023-09-01-194147.png 689w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\n            <\/div>\n        <\/div><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><h2 class=\"eael-entry-title\"><a\n                        class=\"eael-grid-post-link\"\n                        href=\"https:\/\/xiarch.com\/blog\/protect-your-customers-data-choose-our-database-security-assessment-for-a-safer-business-environment\/\"\n                        title=\"Protect Your Customers&#8217; Data: Choose Our Database Security Assessment for a Safer Business Environment\">Protect Your Customers&#8217; Data: Choose Our Database Security Assessment for a Safer Business Environment<\/a><\/h2><\/header><div class=\"eael-entry-content\">\n                        <div class=\"eael-grid-post-excerpt\"><p>Introduction In today&#8217;s digital age, data is the lifeblood of...<\/p><\/div>\n                    <\/div><div class=\"eael-entry-footer\"><div class=\"eael-author-avatar\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=96&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=192&#038;d=mm&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' loading='lazy' decoding='async'\/><\/a><\/div><div class=\"eael-entry-meta\"><span class=\"eael-posted-by\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\" title=\"Posts by Devyansh Sharda\" rel=\"author\"  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Devyansh Sharda<\/a><\/span><span class=\"eael-posted-on\"><time datetime=\"September 1, 2023\">September 1, 2023<\/time><\/span><\/div><\/div><\/div><\/div>\n        <\/div>\n    <\/article><article class=\"eael-grid-post eael-post-grid-column\" data-id=\"4628\">\n        <div class=\"eael-grid-post-holder\">\n            <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-media\"><div class=\"eael-entry-overlay fade-in\"><i class=\"fas fa-long-arrow-alt-right\" aria-hidden=\"true\"><\/i><a href=\"https:\/\/xiarch.com\/blog\/data-breaches-can-cost-businesses-dearly-safeguard-your-sensitive-information-with-our-expert-assessment\/\"><\/a><\/div><div class=\"eael-entry-thumbnail \">\n                <img width=\"298\" height=\"300\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/08\/Screenshot-2023-08-25-183444-298x300.png\" class=\"attachment-medium size-medium wp-image-4632\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/08\/Screenshot-2023-08-25-183444-298x300.png 298w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/08\/Screenshot-2023-08-25-183444-150x150.png 150w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/08\/Screenshot-2023-08-25-183444.png 682w\" sizes=\"(max-width: 298px) 100vw, 298px\" \/>\n            <\/div>\n        <\/div><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><h2 class=\"eael-entry-title\"><a\n                        class=\"eael-grid-post-link\"\n                        href=\"https:\/\/xiarch.com\/blog\/data-breaches-can-cost-businesses-dearly-safeguard-your-sensitive-information-with-our-expert-assessment\/\"\n                        title=\"Data Breaches Can Cost Businesses Dearly: Safeguard Your Sensitive Information with Our Expert Assessment\">Data Breaches Can Cost Businesses Dearly: Safeguard Your Sensitive Information with Our Expert Assessment<\/a><\/h2><\/header><div class=\"eael-entry-content\">\n                        <div class=\"eael-grid-post-excerpt\"><p>Introduction In today&#8217;s digital age, data breaches have become an...<\/p><\/div>\n                    <\/div><div class=\"eael-entry-footer\"><div class=\"eael-author-avatar\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=96&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=192&#038;d=mm&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' loading='lazy' decoding='async'\/><\/a><\/div><div class=\"eael-entry-meta\"><span class=\"eael-posted-by\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\" title=\"Posts by Devyansh Sharda\" rel=\"author\"  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Devyansh Sharda<\/a><\/span><span class=\"eael-posted-on\"><time datetime=\"August 25, 2023\">August 25, 2023<\/time><\/span><\/div><\/div><\/div><\/div>\n        <\/div>\n    <\/article><article class=\"eael-grid-post eael-post-grid-column\" data-id=\"4620\">\n        <div class=\"eael-grid-post-holder\">\n            <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-media\"><div class=\"eael-entry-overlay fade-in\"><i class=\"fas fa-long-arrow-alt-right\" aria-hidden=\"true\"><\/i><a href=\"https:\/\/xiarch.com\/blog\/ai-driven-threat-hunting-enhancing-cyber-security-through-intelligent-detection\/\"><\/a><\/div><div class=\"eael-entry-thumbnail \">\n                <img width=\"300\" height=\"300\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/08\/Screenshot-2023-08-03-141545-300x300.png\" class=\"attachment-medium size-medium wp-image-4621\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/08\/Screenshot-2023-08-03-141545-300x300.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/08\/Screenshot-2023-08-03-141545-150x150.png 150w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/08\/Screenshot-2023-08-03-141545-600x600.png 600w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/08\/Screenshot-2023-08-03-141545.png 662w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\n            <\/div>\n        <\/div><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><h2 class=\"eael-entry-title\"><a\n                        class=\"eael-grid-post-link\"\n                        href=\"https:\/\/xiarch.com\/blog\/ai-driven-threat-hunting-enhancing-cyber-security-through-intelligent-detection\/\"\n                        title=\"AI-Driven Threat Hunting: Enhancing Cyber Security through Intelligent Detection\">AI-Driven Threat Hunting: Enhancing Cyber Security through Intelligent Detection<\/a><\/h2><\/header><div class=\"eael-entry-content\">\n                        <div class=\"eael-grid-post-excerpt\"><p>Introduction As technology continues to advance, the threat landscape in...<\/p><\/div>\n                    <\/div><div class=\"eael-entry-footer\"><div class=\"eael-author-avatar\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=96&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=192&#038;d=mm&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' loading='lazy' decoding='async'\/><\/a><\/div><div class=\"eael-entry-meta\"><span class=\"eael-posted-by\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\" title=\"Posts by Devyansh Sharda\" rel=\"author\"  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Devyansh Sharda<\/a><\/span><span class=\"eael-posted-on\"><time datetime=\"August 3, 2023\">August 3, 2023<\/time><\/span><\/div><\/div><\/div><\/div>\n        <\/div>\n    <\/article><article class=\"eael-grid-post eael-post-grid-column\" data-id=\"4612\">\n        <div class=\"eael-grid-post-holder\">\n            <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-media\"><div class=\"eael-entry-overlay fade-in\"><i class=\"fas fa-long-arrow-alt-right\" aria-hidden=\"true\"><\/i><a href=\"https:\/\/xiarch.com\/blog\/shield-your-network-from-cyber-attacks-with-expert-network-penetration-testing\/\"><\/a><\/div><div class=\"eael-entry-thumbnail \">\n                <img width=\"300\" height=\"300\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/07\/Screenshot-2023-07-27-203112-300x300.png\" class=\"attachment-medium size-medium wp-image-4618\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/07\/Screenshot-2023-07-27-203112-300x300.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/07\/Screenshot-2023-07-27-203112-150x150.png 150w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/07\/Screenshot-2023-07-27-203112-600x600.png 600w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/07\/Screenshot-2023-07-27-203112.png 662w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\n            <\/div>\n        <\/div><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><h2 class=\"eael-entry-title\"><a\n                        class=\"eael-grid-post-link\"\n                        href=\"https:\/\/xiarch.com\/blog\/shield-your-network-from-cyber-attacks-with-expert-network-penetration-testing\/\"\n                        title=\"Shield Your Network from Cyber Attacks with Expert Network Penetration Testing\">Shield Your Network from Cyber Attacks with Expert Network Penetration Testing<\/a><\/h2><\/header><div class=\"eael-entry-content\">\n                        <div class=\"eael-grid-post-excerpt\"><p>Introduction In today&#8217;s digital age, businesses and individuals heavily rely...<\/p><\/div>\n                    <\/div><div class=\"eael-entry-footer\"><div class=\"eael-author-avatar\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=96&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=192&#038;d=mm&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' loading='lazy' decoding='async'\/><\/a><\/div><div class=\"eael-entry-meta\"><span class=\"eael-posted-by\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\" title=\"Posts by Devyansh Sharda\" rel=\"author\"  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Devyansh Sharda<\/a><\/span><span class=\"eael-posted-on\"><time datetime=\"July 27, 2023\">July 27, 2023<\/time><\/span><\/div><\/div><\/div><\/div>\n        <\/div>\n    <\/article><article class=\"eael-grid-post eael-post-grid-column\" data-id=\"4606\">\n        <div class=\"eael-grid-post-holder\">\n            <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-media\"><div class=\"eael-entry-overlay fade-in\"><i class=\"fas fa-long-arrow-alt-right\" aria-hidden=\"true\"><\/i><a href=\"https:\/\/xiarch.com\/blog\/enhance-your-networks-resilience-against-cyber-threats-through-penetration-testing\/\"><\/a><\/div><div class=\"eael-entry-thumbnail \">\n                <img width=\"300\" height=\"300\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/07\/Screenshot-2023-07-20-181636-300x300.png\" class=\"attachment-medium size-medium wp-image-4607\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/07\/Screenshot-2023-07-20-181636-300x300.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/07\/Screenshot-2023-07-20-181636-150x150.png 150w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/07\/Screenshot-2023-07-20-181636-600x600.png 600w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/07\/Screenshot-2023-07-20-181636.png 667w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\n            <\/div>\n        <\/div><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><h2 class=\"eael-entry-title\"><a\n                        class=\"eael-grid-post-link\"\n                        href=\"https:\/\/xiarch.com\/blog\/enhance-your-networks-resilience-against-cyber-threats-through-penetration-testing\/\"\n                        title=\"Enhance Your Network&#8217;s Resilience against Cyber Threats through Penetration Testing\">Enhance Your Network&#8217;s Resilience against Cyber Threats through Penetration Testing<\/a><\/h2><\/header><div class=\"eael-entry-content\">\n                        <div class=\"eael-grid-post-excerpt\"><p>Introduction In today&#8217;s interconnected world, where cyber threats loom large,...<\/p><\/div>\n                    <\/div><div class=\"eael-entry-footer\"><div class=\"eael-author-avatar\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=96&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=192&#038;d=mm&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' loading='lazy' decoding='async'\/><\/a><\/div><div class=\"eael-entry-meta\"><span class=\"eael-posted-by\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\" title=\"Posts by Devyansh Sharda\" rel=\"author\"  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Devyansh Sharda<\/a><\/span><span class=\"eael-posted-on\"><time datetime=\"July 20, 2023\">July 20, 2023<\/time><\/span><\/div><\/div><\/div><\/div>\n        <\/div>\n    <\/article><article class=\"eael-grid-post eael-post-grid-column\" data-id=\"4598\">\n        <div class=\"eael-grid-post-holder\">\n            <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-media\"><div class=\"eael-entry-overlay fade-in\"><i class=\"fas fa-long-arrow-alt-right\" aria-hidden=\"true\"><\/i><a href=\"https:\/\/xiarch.com\/blog\/defend-your-network-against-cyber-threats\/\"><\/a><\/div><div class=\"eael-entry-thumbnail \">\n                <img width=\"300\" height=\"300\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/07\/Screenshot-2023-07-13-105832-300x300.png\" class=\"attachment-medium size-medium wp-image-4603\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/07\/Screenshot-2023-07-13-105832-300x300.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/07\/Screenshot-2023-07-13-105832-150x150.png 150w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/07\/Screenshot-2023-07-13-105832-600x600.png 600w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/07\/Screenshot-2023-07-13-105832.png 662w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\n            <\/div>\n        <\/div><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><h2 class=\"eael-entry-title\"><a\n                        class=\"eael-grid-post-link\"\n                        href=\"https:\/\/xiarch.com\/blog\/defend-your-network-against-cyber-threats\/\"\n                        title=\"Defend Your Network against Cyber Threats with Our Penetration Testing Service\">Defend Your Network against Cyber Threats with Our Penetration Testing Service<\/a><\/h2><\/header><div class=\"eael-entry-content\">\n                        <div class=\"eael-grid-post-excerpt\"><p>Introduction In today&#8217;s digital age, where technology plays a crucial...<\/p><\/div>\n                    <\/div><div class=\"eael-entry-footer\"><div class=\"eael-author-avatar\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=96&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=192&#038;d=mm&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' loading='lazy' decoding='async'\/><\/a><\/div><div class=\"eael-entry-meta\"><span class=\"eael-posted-by\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\" title=\"Posts by Devyansh Sharda\" rel=\"author\"  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Devyansh Sharda<\/a><\/span><span class=\"eael-posted-on\"><time datetime=\"July 13, 2023\">July 13, 2023<\/time><\/span><\/div><\/div><\/div><\/div>\n        <\/div>\n    <\/article><article class=\"eael-grid-post eael-post-grid-column\" data-id=\"4587\">\n        <div class=\"eael-grid-post-holder\">\n            <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-media\"><div class=\"eael-entry-overlay fade-in\"><i class=\"fas fa-long-arrow-alt-right\" aria-hidden=\"true\"><\/i><a href=\"https:\/\/xiarch.com\/blog\/discover-weak-points-in-your-network-infrastructure-through-our-penetration-testing\/\"><\/a><\/div><div class=\"eael-entry-thumbnail \">\n                <img width=\"300\" height=\"300\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/07\/Screenshot-2023-07-06-110920-300x300.png\" class=\"attachment-medium size-medium wp-image-4588\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/07\/Screenshot-2023-07-06-110920-300x300.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/07\/Screenshot-2023-07-06-110920-150x150.png 150w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/07\/Screenshot-2023-07-06-110920-600x600.png 600w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/07\/Screenshot-2023-07-06-110920.png 668w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\n            <\/div>\n        <\/div><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><h2 class=\"eael-entry-title\"><a\n                        class=\"eael-grid-post-link\"\n                        href=\"https:\/\/xiarch.com\/blog\/discover-weak-points-in-your-network-infrastructure-through-our-penetration-testing\/\"\n                        title=\"Discover Weak Points in Your Network Infrastructure through Our Penetration Testing\">Discover Weak Points in Your Network Infrastructure through Our Penetration Testing<\/a><\/h2><\/header><div class=\"eael-entry-content\">\n                        <div class=\"eael-grid-post-excerpt\"><p>Introduction In today&#8217;s digital landscape, network security is of paramount...<\/p><\/div>\n                    <\/div><div class=\"eael-entry-footer\"><div class=\"eael-author-avatar\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=96&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=192&#038;d=mm&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' loading='lazy' decoding='async'\/><\/a><\/div><div class=\"eael-entry-meta\"><span class=\"eael-posted-by\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\" title=\"Posts by Devyansh Sharda\" rel=\"author\"  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Devyansh Sharda<\/a><\/span><span class=\"eael-posted-on\"><time datetime=\"July 6, 2023\">July 6, 2023<\/time><\/span><\/div><\/div><\/div><\/div>\n        <\/div>\n    <\/article><article class=\"eael-grid-post eael-post-grid-column\" data-id=\"4580\">\n        <div class=\"eael-grid-post-holder\">\n            <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-media\"><div class=\"eael-entry-overlay fade-in\"><i class=\"fas fa-long-arrow-alt-right\" aria-hidden=\"true\"><\/i><a href=\"https:\/\/xiarch.com\/blog\/ensuring-compliance-in-mobile-application-security\/\"><\/a><\/div><div class=\"eael-entry-thumbnail \">\n                <img width=\"300\" height=\"300\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-29-191910-300x300.png\" class=\"attachment-medium size-medium wp-image-4581\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-29-191910-300x300.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-29-191910-150x150.png 150w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-29-191910-600x600.png 600w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-29-191910.png 671w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\n            <\/div>\n        <\/div><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><h2 class=\"eael-entry-title\"><a\n                        class=\"eael-grid-post-link\"\n                        href=\"https:\/\/xiarch.com\/blog\/ensuring-compliance-in-mobile-application-security\/\"\n                        title=\"Ensuring Compliance in Mobile Application Security\">Ensuring Compliance in Mobile Application Security<\/a><\/h2><\/header><div class=\"eael-entry-content\">\n                        <div class=\"eael-grid-post-excerpt\"><p>Introduction Ensuring compliance in mobile application security is of paramount...<\/p><\/div>\n                    <\/div><div class=\"eael-entry-footer\"><div class=\"eael-author-avatar\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=96&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=192&#038;d=mm&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' loading='lazy' decoding='async'\/><\/a><\/div><div class=\"eael-entry-meta\"><span class=\"eael-posted-by\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\" title=\"Posts by Devyansh Sharda\" rel=\"author\"  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Devyansh Sharda<\/a><\/span><span class=\"eael-posted-on\"><time datetime=\"June 29, 2023\">June 29, 2023<\/time><\/span><\/div><\/div><\/div><\/div>\n        <\/div>\n    <\/article><article class=\"eael-grid-post eael-post-grid-column\" data-id=\"4573\">\n        <div class=\"eael-grid-post-holder\">\n            <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-media\"><div class=\"eael-entry-overlay fade-in\"><i class=\"fas fa-long-arrow-alt-right\" aria-hidden=\"true\"><\/i><a href=\"https:\/\/xiarch.com\/blog\/understanding-the-mobile-app-development-life-cycle\/\"><\/a><\/div><div class=\"eael-entry-thumbnail \">\n                <img width=\"300\" height=\"300\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-22-112615-300x300.png\" class=\"attachment-medium size-medium wp-image-4578\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-22-112615-300x300.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-22-112615-150x150.png 150w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-22-112615-600x600.png 600w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-22-112615.png 698w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\n            <\/div>\n        <\/div><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><h2 class=\"eael-entry-title\"><a\n                        class=\"eael-grid-post-link\"\n                        href=\"https:\/\/xiarch.com\/blog\/understanding-the-mobile-app-development-life-cycle\/\"\n                        title=\"Understanding the Mobile App Development Life Cycle\">Understanding the Mobile App Development Life Cycle<\/a><\/h2><\/header><div class=\"eael-entry-content\">\n                        <div class=\"eael-grid-post-excerpt\"><p>Introduction In today&#8217;s digital age, mobile applications have become an...<\/p><\/div>\n                    <\/div><div class=\"eael-entry-footer\"><div class=\"eael-author-avatar\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=96&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=192&#038;d=mm&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' loading='lazy' decoding='async'\/><\/a><\/div><div class=\"eael-entry-meta\"><span class=\"eael-posted-by\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\" title=\"Posts by Devyansh Sharda\" rel=\"author\"  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Devyansh Sharda<\/a><\/span><span class=\"eael-posted-on\"><time datetime=\"June 22, 2023\">June 22, 2023<\/time><\/span><\/div><\/div><\/div><\/div>\n        <\/div>\n    <\/article><article class=\"eael-grid-post eael-post-grid-column\" data-id=\"4563\">\n        <div class=\"eael-grid-post-holder\">\n            <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-media\"><div class=\"eael-entry-overlay fade-in\"><i class=\"fas fa-long-arrow-alt-right\" aria-hidden=\"true\"><\/i><a href=\"https:\/\/xiarch.com\/blog\/mobile-application-penetration-testing-vs-web-app-testing-ensuring-secure-applications\/\"><\/a><\/div><div class=\"eael-entry-thumbnail \">\n                <img width=\"300\" height=\"300\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-15-193937-300x300.png\" class=\"attachment-medium size-medium wp-image-4570\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-15-193937-300x300.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-15-193937-150x150.png 150w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-15-193937-600x600.png 600w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-15-193937.png 696w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\n            <\/div>\n        <\/div><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><h2 class=\"eael-entry-title\"><a\n                        class=\"eael-grid-post-link\"\n                        href=\"https:\/\/xiarch.com\/blog\/mobile-application-penetration-testing-vs-web-app-testing-ensuring-secure-applications\/\"\n                        title=\"Mobile Application Penetration Testing vs. Web App Testing: Ensuring Secure Applications\">Mobile Application Penetration Testing vs. Web App Testing: Ensuring Secure Applications<\/a><\/h2><\/header><div class=\"eael-entry-content\">\n                        <div class=\"eael-grid-post-excerpt\"><p>Introduction In today&#8217;s digital landscape, where mobile applications and web...<\/p><\/div>\n                    <\/div><div class=\"eael-entry-footer\"><div class=\"eael-author-avatar\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=96&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=192&#038;d=mm&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' loading='lazy' decoding='async'\/><\/a><\/div><div class=\"eael-entry-meta\"><span class=\"eael-posted-by\"><a href=\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\" title=\"Posts by Devyansh Sharda\" rel=\"author\"  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Devyansh Sharda<\/a><\/span><span class=\"eael-posted-on\"><time datetime=\"June 15, 2023\">June 15, 2023<\/time><\/span><\/div><\/div><\/div><\/div>\n        <\/div>\n    <\/article><\/div>\n            <div class=\"clearfix\"><\/div>\n        <\/div>            <div class=\"eael-load-more-button-wrap eael-force-hide\">\n                <button class=\"eael-load-more-button\" id=\"eael-load-more-btn-73e4846\" data-widget-id=\"73e4846\" data-widget=\"73e4846\" data-page-id=\"6\" data-nonce=\"6448f7ba43\" data-template=\"{&quot;dir&quot;:&quot;lite&quot;,&quot;file_name&quot;:&quot;default.php&quot;,&quot;name&quot;:&quot;Post-Grid&quot;}\" data-class=\"Essential_Addons_Elementor\\Elements\\Post_Grid\" data-layout=\"grid\" data-page=\"1\" data-args=\"orderby=date&amp;order=desc&amp;ignore_sticky_posts=1&amp;post_status=publish&amp;posts_per_page=32&amp;offset=0&amp;post_type=post\" data-max-page=\"17\">\n                    <div class=\"eael-btn-loader button__loader\"><\/div>\n                    <span>Load More<\/span>\n                <\/button>\n            <\/div>\n        \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Advance UAF Vulnerability Affecting Microsoft Office to Patched Today Four security vulnerabilities found in the Microsoft Office suite, which&#8230; Xiarch SecurityJune 9, 2021 Using Negotiated VPN Password Hackers Breached Colonial Pipeline In the early last month, the ransomware gang that organizes&#8230; Xiarch SecurityJune 8, 2021 Microsoft, Google, and Mozilla Work Together on Standardizing browser extensions. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Xiarch Blog - Xiarch Solutions Private Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xiarch.com\/blog\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Xiarch Blog - Xiarch Solutions Private Limited\" \/>\n<meta property=\"og:description\" content=\"Advance UAF Vulnerability Affecting Microsoft Office to Patched Today Four security vulnerabilities found in the Microsoft Office suite, which&#8230; Xiarch SecurityJune 9, 2021 Using Negotiated VPN Password Hackers Breached Colonial Pipeline In the early last month, the ransomware gang that organizes&#8230; Xiarch SecurityJune 8, 2021 Microsoft, Google, and Mozilla Work Together on Standardizing browser extensions. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiarch.com\/blog\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiarch Solutions Private Limited\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/xiarch\/\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-10T12:33:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/blog-banner-header.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@xiarch\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"17 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xiarch.com\/blog\/\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"name\":\"Xiarch Blog - Xiarch Solutions Private Limited\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#website\"},\"datePublished\":\"2020-10-08T05:21:28+00:00\",\"dateModified\":\"2021-06-10T12:33:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xiarch.com\/blog\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xiarch.com\/blog\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xiarch.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Xiarch Blog\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xiarch.com\/blog\/#website\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"name\":\"Xiarch Solutions Private Limited\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xiarch.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\",\"name\":\"Xiarch\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"contentUrl\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"width\":300,\"height\":300,\"caption\":\"Xiarch\"},\"image\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/xiarch\/\",\"https:\/\/twitter.com\/xiarch\",\"https:\/\/www.linkedin.com\/company\/xiarch\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Xiarch Blog - Xiarch Solutions Private Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xiarch.com\/blog\/","og_locale":"en_US","og_type":"article","og_title":"Xiarch Blog - Xiarch Solutions Private Limited","og_description":"Advance UAF Vulnerability Affecting Microsoft Office to Patched Today Four security vulnerabilities found in the Microsoft Office suite, which&#8230; Xiarch SecurityJune 9, 2021 Using Negotiated VPN Password Hackers Breached Colonial Pipeline In the early last month, the ransomware gang that organizes&#8230; Xiarch SecurityJune 8, 2021 Microsoft, Google, and Mozilla Work Together on Standardizing browser extensions. [&hellip;]","og_url":"https:\/\/xiarch.com\/blog\/","og_site_name":"Xiarch Solutions Private Limited","article_publisher":"https:\/\/www.facebook.com\/xiarch\/","article_modified_time":"2021-06-10T12:33:47+00:00","og_image":[{"url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/blog-banner-header.jpg"}],"twitter_card":"summary_large_image","twitter_site":"@xiarch","twitter_misc":{"Est. reading time":"17 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/xiarch.com\/blog\/","url":"https:\/\/xiarch.com\/blog\/","name":"Xiarch Blog - Xiarch Solutions Private Limited","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/#website"},"datePublished":"2020-10-08T05:21:28+00:00","dateModified":"2021-06-10T12:33:47+00:00","breadcrumb":{"@id":"https:\/\/xiarch.com\/blog\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiarch.com\/blog\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/xiarch.com\/blog\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiarch.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Xiarch Blog"}]},{"@type":"WebSite","@id":"https:\/\/xiarch.com\/blog\/#website","url":"https:\/\/xiarch.com\/blog\/","name":"Xiarch Solutions Private Limited","description":"","publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiarch.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiarch.com\/blog\/#organization","name":"Xiarch","url":"https:\/\/xiarch.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","contentUrl":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","width":300,"height":300,"caption":"Xiarch"},"image":{"@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/xiarch\/","https:\/\/twitter.com\/xiarch","https:\/\/www.linkedin.com\/company\/xiarch"]}]}},"_links":{"self":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/pages\/6"}],"collection":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/comments?post=6"}],"version-history":[{"count":87,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/pages\/6\/revisions"}],"predecessor-version":[{"id":2142,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/pages\/6\/revisions\/2142"}],"wp:attachment":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media?parent=6"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}