[{"data":1,"prerenderedAt":996},["ShallowReactive",2],{"$fIvTkZELk_ZzAaL2Flczy8yQnz-wvYxTwBhI3AmPGmLI":3,"$f8thqg1H2Y9m9m5SSvGt6jVaBv5R4o1j5gmJwWpTXET0":250,"$fpBs2Haf8hZjBAu9KfGRq_9Ss7hPwX-hRrmKR3oYaoys":418,"$fiGWLpQvDgHw83dMgkN5jClF1sD1PhdI5wXdb7q5UVeA":484,"$fKT6aBRIg5bl92Y_bY7CeuGs0IOI1w_55IB_yrW3ovpY":494,"$fFojeK6Aj8e5N2GgeEF0zbkM4s9Ix4Q7HVfLjB1s6aXs":942,"$fHGlI7DzclIaIIFw84_lNfgVv7j6dcJyDddjCUn0YKBA":961},[4,87,147,164,181,223],{"ID":5,"post_author":6,"post_date":7,"post_date_gmt":7,"post_content":8,"post_title":9,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":12,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":13,"guid":14,"menu_order":15,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":5,"menu_item_parent":17,"object_id":19,"object":20,"type":21,"type_label":22,"url":23,"title":9,"target":8,"attr_title":8,"description":8,"classes":24,"xfn":8,"layout_type":25,"children":26},13558,"32","2026-03-23 06:48:18","","Services","publish","closed","services-6",0,"https://cbtw.tech/preview/post/13558?p=13558&#038;preview=true&#038;post_type=nav_menu_item",1,"nav_menu_item","0","raw","12830","page","post_type","Page","https://cbtw.tech/service-overview/",[8],"services",[27,36,49,59,68,77],{"ID":28,"post_author":6,"post_date":7,"post_date_gmt":7,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":30,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":13,"guid":31,"menu_order":32,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":28,"menu_item_parent":33,"object_id":19,"object":20,"type":21,"type_label":22,"url":23,"title":34,"target":8,"attr_title":8,"description":8,"classes":35,"xfn":8,"layout_type":25},13559," ","13559","https://cbtw.tech/preview/post/13559?p=13559&#038;preview=true&#038;post_type=nav_menu_item",2,"13558","Services Overview",[8],{"ID":37,"post_author":38,"post_date":7,"post_date_gmt":39,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":40,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":41,"guid":42,"menu_order":43,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":37,"menu_item_parent":33,"object_id":44,"object":20,"type":21,"type_label":22,"url":45,"title":46,"target":8,"attr_title":8,"description":8,"classes":47,"xfn":8,"layout_type":48},8534,"22","2025-07-03 09:30:08","8534",12830,"https://cbtw.tech/preview/post/8534?p=8534&#038;preview=true&#038;post_type=nav_menu_item",3,"7212","https://cbtw.tech/service-overview/software-engineering/","Software Engineering",[8],"default",{"ID":50,"post_author":38,"post_date":7,"post_date_gmt":51,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":52,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":41,"guid":53,"menu_order":54,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":50,"menu_item_parent":33,"object_id":55,"object":20,"type":21,"type_label":22,"url":56,"title":57,"target":8,"attr_title":8,"description":8,"classes":58,"xfn":8,"layout_type":48},13388,"2026-03-20 09:17:28","13388","https://cbtw.tech/preview/post/13388?p=13388&#038;preview=true&#038;post_type=nav_menu_item",4,"13023","https://cbtw.tech/service-overview/ai-data-platforms/","AI &amp; Data Platforms",[8],{"ID":60,"post_author":38,"post_date":7,"post_date_gmt":39,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":61,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":41,"guid":62,"menu_order":63,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":60,"menu_item_parent":33,"object_id":64,"object":20,"type":21,"type_label":22,"url":65,"title":66,"target":8,"attr_title":8,"description":8,"classes":67,"xfn":8,"layout_type":25},8531,"8531","https://cbtw.tech/preview/post/8531?p=8531&#038;preview=true&#038;post_type=nav_menu_item",5,"7500","https://cbtw.tech/service-overview/cloud-and-enterprise-platforms/","Cloud &amp; Enterprise Platforms",[8],{"ID":69,"post_author":38,"post_date":7,"post_date_gmt":51,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":70,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":13,"guid":71,"menu_order":72,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":69,"menu_item_parent":33,"object_id":73,"object":20,"type":21,"type_label":22,"url":74,"title":75,"target":8,"attr_title":8,"description":8,"classes":76,"xfn":8,"layout_type":48},13387,"13387","https://cbtw.tech/preview/post/13387?p=13387&#038;preview=true&#038;post_type=nav_menu_item",6,"13141","https://cbtw.tech/service-overview/cybersecurity/","Cybersecurity",[8],{"ID":78,"post_author":38,"post_date":7,"post_date_gmt":79,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":80,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":41,"guid":81,"menu_order":82,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":78,"menu_item_parent":33,"object_id":83,"object":20,"type":21,"type_label":22,"url":84,"title":85,"target":8,"attr_title":8,"description":8,"classes":86,"xfn":8,"layout_type":48},8535,"2025-07-03 09:30:09","8535","https://cbtw.tech/preview/post/8535?p=8535&#038;preview=true&#038;post_type=nav_menu_item",7,"7149","https://cbtw.tech/service-overview/strategy-product-transformation/","Strategy, Product &amp; Transformation",[8],{"ID":88,"post_author":38,"post_date":7,"post_date_gmt":79,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":89,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":13,"guid":90,"menu_order":91,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":88,"menu_item_parent":17,"object_id":92,"object":20,"type":21,"type_label":22,"url":93,"title":94,"target":8,"attr_title":8,"description":8,"classes":95,"xfn":8,"layout_type":96,"children":97},8538,"8538","https://cbtw.tech/preview/post/8538?p=8538&#038;preview=true&#038;post_type=nav_menu_item",8,"6941","https://cbtw.tech/sectors/","Sectors",[8],"sectors",[98,109,118,128,137],{"ID":99,"post_author":38,"post_date":7,"post_date_gmt":100,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":101,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":102,"guid":103,"menu_order":104,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":99,"menu_item_parent":89,"object_id":105,"object":20,"type":21,"type_label":22,"url":106,"title":107,"target":8,"attr_title":8,"description":8,"classes":108,"xfn":8,"layout_type":48},8599,"2025-07-03 10:10:18","8599",6941,"https://cbtw.tech/preview/post/8599?p=8599&#038;preview=true&#038;post_type=nav_menu_item",9,"8592","https://cbtw.tech/sectors/banking-and-finance/","Banking &#038; Finance",[8],{"ID":110,"post_author":38,"post_date":7,"post_date_gmt":79,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":111,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":102,"guid":112,"menu_order":113,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":110,"menu_item_parent":89,"object_id":114,"object":20,"type":21,"type_label":22,"url":115,"title":116,"target":8,"attr_title":8,"description":8,"classes":117,"xfn":8,"layout_type":48},8540,"8540","https://cbtw.tech/preview/post/8540?p=8540&#038;preview=true&#038;post_type=nav_menu_item",10,"8111","https://cbtw.tech/sectors/energy-utilities/","Energy &amp; Utilities",[8],{"ID":119,"post_author":38,"post_date":7,"post_date_gmt":120,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":121,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":102,"guid":122,"menu_order":123,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":119,"menu_item_parent":89,"object_id":124,"object":20,"type":21,"type_label":22,"url":125,"title":126,"target":8,"attr_title":8,"description":8,"classes":127,"xfn":8,"layout_type":48},8641,"2025-07-03 10:57:54","8641","https://cbtw.tech/preview/post/8641?p=8641&#038;preview=true&#038;post_type=nav_menu_item",11,"8473","https://cbtw.tech/sectors/luxury/","Luxury",[8],{"ID":129,"post_author":38,"post_date":7,"post_date_gmt":79,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":130,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":102,"guid":131,"menu_order":132,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":129,"menu_item_parent":89,"object_id":133,"object":20,"type":21,"type_label":22,"url":134,"title":135,"target":8,"attr_title":8,"description":8,"classes":136,"xfn":8,"layout_type":48},8539,"8539","https://cbtw.tech/preview/post/8539?p=8539&#038;preview=true&#038;post_type=nav_menu_item",12,"8191","https://cbtw.tech/sectors/manufacturing-industry/","Manufacturing &amp; Industry",[8],{"ID":138,"post_author":38,"post_date":7,"post_date_gmt":139,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":140,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":102,"guid":141,"menu_order":142,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":138,"menu_item_parent":89,"object_id":143,"object":20,"type":21,"type_label":22,"url":144,"title":145,"target":8,"attr_title":8,"description":8,"classes":146,"xfn":8,"layout_type":48},8952,"2025-07-09 11:41:39","8952","https://cbtw.tech/preview/post/8952?p=8952&#038;preview=true&#038;post_type=nav_menu_item",13,"8746","https://cbtw.tech/sectors/telecommunications-media/","Telecommunications &amp; Media",[8],{"ID":148,"post_author":38,"post_date":7,"post_date_gmt":79,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":149,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":13,"guid":150,"menu_order":151,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":148,"menu_item_parent":17,"object_id":152,"object":20,"type":21,"type_label":22,"url":153,"title":154,"target":8,"attr_title":8,"description":8,"classes":155,"xfn":8,"layout_type":48,"children":156},8529,"8529","https://cbtw.tech/preview/post/8529?p=8529&#038;preview=true&#038;post_type=nav_menu_item",14,"8384","https://cbtw.tech/partners/","Partners",[8],[157],{"ID":158,"post_author":38,"post_date":7,"post_date_gmt":79,"post_content":8,"post_title":159,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":160,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":13,"guid":161,"menu_order":162,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":158,"menu_item_parent":149,"object_id":152,"object":20,"type":21,"type_label":22,"url":153,"title":159,"target":8,"attr_title":8,"description":8,"classes":163,"xfn":8,"layout_type":48},8542,"Ecosystem","ecosystem","https://cbtw.tech/preview/post/8542?p=8542&#038;preview=true&#038;post_type=nav_menu_item",15,[8],{"ID":165,"post_author":38,"post_date":7,"post_date_gmt":79,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":166,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":13,"guid":167,"menu_order":168,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":165,"menu_item_parent":17,"object_id":169,"object":20,"type":21,"type_label":22,"url":170,"title":171,"target":8,"attr_title":8,"description":8,"classes":172,"xfn":8,"layout_type":48,"children":173},8536,"8536","https://cbtw.tech/preview/post/8536?p=8536&#038;preview=true&#038;post_type=nav_menu_item",16,"7435","https://cbtw.tech/about/","About",[8],[174],{"ID":175,"post_author":38,"post_date":7,"post_date_gmt":79,"post_content":8,"post_title":176,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":177,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":13,"guid":178,"menu_order":179,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":175,"menu_item_parent":166,"object_id":169,"object":20,"type":21,"type_label":22,"url":170,"title":176,"target":8,"attr_title":8,"description":8,"classes":180,"xfn":8,"layout_type":48},8544,"Company","company-2","https://cbtw.tech/preview/post/8544?p=8544&#038;preview=true&#038;post_type=nav_menu_item",17,[8],{"ID":182,"post_author":183,"post_date":7,"post_date_gmt":184,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":185,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":13,"guid":186,"menu_order":187,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":182,"menu_item_parent":17,"object_id":188,"object":20,"type":21,"type_label":22,"url":189,"title":190,"target":8,"attr_title":8,"description":8,"classes":191,"xfn":8,"layout_type":192,"children":193},6625,"31","2025-05-28 06:53:21","6625","https://cbtw.tech/insights/6625",18,"74","https://cbtw.tech/insights/","Insights",[8],"insights",[194,205,214],{"ID":195,"post_author":38,"post_date":7,"post_date_gmt":196,"post_content":8,"post_title":190,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":197,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":13,"guid":198,"menu_order":199,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":195,"menu_item_parent":185,"object_id":200,"object":201,"type":201,"type_label":202,"title":190,"url":203,"target":8,"attr_title":8,"description":8,"classes":204,"xfn":8,"layout_type":48},8754,"2025-07-08 05:23:38","insights-2","https://cbtw.tech/preview/post/8754?p=8754&#038;preview=true&#038;post_type=nav_menu_item",19,"8754","custom","Custom Link","https://cbtw.tech/insights?categories=insights",[8],{"ID":206,"post_author":38,"post_date":7,"post_date_gmt":196,"post_content":8,"post_title":207,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":208,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":13,"guid":209,"menu_order":210,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":206,"menu_item_parent":185,"object_id":211,"object":201,"type":201,"type_label":202,"title":207,"url":212,"target":8,"attr_title":8,"description":8,"classes":213,"xfn":8,"layout_type":48},8756,"Case Studies","case-studies-2","https://cbtw.tech/preview/post/8756?p=8756&#038;preview=true&#038;post_type=nav_menu_item",20,"8756","https://cbtw.tech/insights?categories=case-studies",[8],{"ID":215,"post_author":38,"post_date":7,"post_date_gmt":196,"post_content":8,"post_title":216,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":217,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":13,"guid":218,"menu_order":219,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":215,"menu_item_parent":185,"object_id":220,"object":201,"type":201,"type_label":202,"title":216,"url":221,"target":8,"attr_title":8,"description":8,"classes":222,"xfn":8,"layout_type":48},8755,"Resources","resources-2","https://cbtw.tech/preview/post/8755?p=8755&#038;preview=true&#038;post_type=nav_menu_item",21,"8755","https://cbtw.tech/insights?categories=resources",[8],{"ID":224,"post_author":38,"post_date":7,"post_date_gmt":79,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":225,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":13,"guid":226,"menu_order":227,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":224,"menu_item_parent":17,"object_id":228,"object":20,"type":21,"type_label":22,"url":229,"title":230,"target":8,"attr_title":8,"description":8,"classes":231,"xfn":8,"layout_type":48,"children":232},8537,"8537","https://cbtw.tech/preview/post/8537?p=8537&#038;preview=true&#038;post_type=nav_menu_item",22,"6937","https://cbtw.tech/careers/","Careers",[8],[233,240],{"ID":234,"post_author":38,"post_date":7,"post_date_gmt":79,"post_content":8,"post_title":235,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":236,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":13,"guid":237,"menu_order":238,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":234,"menu_item_parent":225,"object_id":228,"object":20,"type":21,"type_label":22,"url":229,"title":235,"target":8,"attr_title":8,"description":8,"classes":239,"xfn":8,"layout_type":48},8547,"Culture","culture","https://cbtw.tech/preview/post/8547?p=8547&#038;preview=true&#038;post_type=nav_menu_item",23,[8],{"ID":241,"post_author":38,"post_date":7,"post_date_gmt":79,"post_content":8,"post_title":242,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":243,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":13,"guid":244,"menu_order":245,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":241,"menu_item_parent":225,"object_id":246,"object":201,"type":201,"type_label":202,"title":242,"url":247,"target":248,"attr_title":8,"description":8,"classes":249,"xfn":8,"layout_type":48},8549,"Open Positions","open-positions","https://cbtw.tech/preview/post/8549?p=8549&#038;preview=true&#038;post_type=nav_menu_item",24,"8549","https://jobs-collaborationbetterstheworld.icims.com/jobs/search?hashed=-625911731","_blank",[8],[251,294,345,350,356,389,408],{"ID":252,"post_author":6,"post_date":253,"post_date_gmt":253,"post_content":8,"post_title":9,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":25,"to_ping":8,"pinged":8,"post_modified":253,"post_modified_gmt":253,"post_content_filtered":8,"post_parent":13,"guid":254,"menu_order":15,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":252,"menu_item_parent":17,"object_id":19,"object":20,"type":21,"type_label":22,"url":23,"title":9,"target":8,"attr_title":8,"description":8,"classes":255,"xfn":8,"layout_type":25,"children":256},13545,"2026-03-23 03:09:43","https://cbtw.tech/preview/post/13545?p=13545&#038;preview=true&#038;post_type=nav_menu_item",[8],[257,264,271,277,283,289],{"ID":258,"post_author":6,"post_date":253,"post_date_gmt":259,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":260,"to_ping":8,"pinged":8,"post_modified":253,"post_modified_gmt":253,"post_content_filtered":8,"post_parent":13,"guid":261,"menu_order":32,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":258,"menu_item_parent":262,"object_id":19,"object":20,"type":21,"type_label":22,"url":23,"title":34,"target":8,"attr_title":8,"description":8,"classes":263,"xfn":8,"layout_type":25},13542,"2026-03-23 02:25:15","13542","https://cbtw.tech/preview/post/13542?p=13542&#038;preview=true&#038;post_type=nav_menu_item","13545",[8],{"ID":265,"post_author":266,"post_date":253,"post_date_gmt":267,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":268,"to_ping":8,"pinged":8,"post_modified":253,"post_modified_gmt":253,"post_content_filtered":8,"post_parent":41,"guid":269,"menu_order":43,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":265,"menu_item_parent":262,"object_id":44,"object":20,"type":21,"type_label":22,"url":45,"title":46,"target":8,"attr_title":8,"description":8,"classes":270,"xfn":8,"layout_type":48},8444,"26","2025-07-02 17:13:28","8444","https://cbtw.tech/insights/8444",[8],{"ID":272,"post_author":38,"post_date":253,"post_date_gmt":273,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":274,"to_ping":8,"pinged":8,"post_modified":253,"post_modified_gmt":253,"post_content_filtered":8,"post_parent":13,"guid":275,"menu_order":54,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":272,"menu_item_parent":262,"object_id":55,"object":20,"type":21,"type_label":22,"url":56,"title":57,"target":8,"attr_title":8,"description":8,"classes":276,"xfn":8,"layout_type":48},13390,"2026-03-20 09:19:01","13390","https://cbtw.tech/preview/post/13390?p=13390&#038;preview=true&#038;post_type=nav_menu_item",[8],{"ID":278,"post_author":38,"post_date":253,"post_date_gmt":279,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":280,"to_ping":8,"pinged":8,"post_modified":253,"post_modified_gmt":253,"post_content_filtered":8,"post_parent":13,"guid":281,"menu_order":63,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":278,"menu_item_parent":262,"object_id":64,"object":20,"type":21,"type_label":22,"url":65,"title":66,"target":8,"attr_title":8,"description":8,"classes":282,"xfn":8,"layout_type":25},8510,"2025-07-03 07:14:41","8510","https://cbtw.tech/preview/post/8510?p=8510&#038;preview=true&#038;post_type=nav_menu_item",[8],{"ID":284,"post_author":38,"post_date":253,"post_date_gmt":285,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":286,"to_ping":8,"pinged":8,"post_modified":253,"post_modified_gmt":253,"post_content_filtered":8,"post_parent":13,"guid":287,"menu_order":72,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":284,"menu_item_parent":262,"object_id":73,"object":20,"type":21,"type_label":22,"url":74,"title":75,"target":8,"attr_title":8,"description":8,"classes":288,"xfn":8,"layout_type":48},13389,"2026-03-20 09:19:02","13389","https://cbtw.tech/preview/post/13389?p=13389&#038;preview=true&#038;post_type=nav_menu_item",[8],{"ID":290,"post_author":266,"post_date":253,"post_date_gmt":267,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":291,"to_ping":8,"pinged":8,"post_modified":253,"post_modified_gmt":253,"post_content_filtered":8,"post_parent":13,"guid":292,"menu_order":82,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":290,"menu_item_parent":262,"object_id":83,"object":20,"type":21,"type_label":22,"url":84,"title":85,"target":8,"attr_title":8,"description":8,"classes":293,"xfn":8,"layout_type":48},8445,"8445","https://cbtw.tech/insights/8445",[8],{"ID":295,"post_author":38,"post_date":253,"post_date_gmt":296,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":297,"to_ping":8,"pinged":8,"post_modified":253,"post_modified_gmt":253,"post_content_filtered":8,"post_parent":13,"guid":298,"menu_order":91,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":295,"menu_item_parent":17,"object_id":92,"object":20,"type":21,"type_label":22,"url":93,"title":94,"target":8,"attr_title":8,"description":8,"classes":299,"xfn":8,"layout_type":96,"children":300},8267,"2025-07-01 22:49:06","8267","https://cbtw.tech/preview/post/8267?p=8267&#038;preview=true&#038;post_type=nav_menu_item",[8],[301,308,314,319,325,330,336],{"ID":302,"post_author":38,"post_date":253,"post_date_gmt":303,"post_content":8,"post_title":304,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":305,"to_ping":8,"pinged":8,"post_modified":253,"post_modified_gmt":253,"post_content_filtered":8,"post_parent":13,"guid":306,"menu_order":104,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":302,"menu_item_parent":297,"object_id":92,"object":20,"type":21,"type_label":22,"url":93,"title":304,"target":8,"attr_title":8,"description":8,"classes":307,"xfn":8,"layout_type":96},9578,"2025-07-24 08:22:02","Sectors Overview","sectors-overview","https://cbtw.tech/preview/post/9578?p=9578&#038;preview=true&#038;post_type=nav_menu_item",[8],{"ID":309,"post_author":38,"post_date":253,"post_date_gmt":310,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":311,"to_ping":8,"pinged":8,"post_modified":253,"post_modified_gmt":253,"post_content_filtered":8,"post_parent":102,"guid":312,"menu_order":113,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":309,"menu_item_parent":297,"object_id":105,"object":20,"type":21,"type_label":22,"url":106,"title":107,"target":8,"attr_title":8,"description":8,"classes":313,"xfn":8,"layout_type":48},8598,"2025-07-03 10:09:48","8598","https://cbtw.tech/preview/post/8598?p=8598&#038;preview=true&#038;post_type=nav_menu_item",[8],{"ID":315,"post_author":38,"post_date":253,"post_date_gmt":296,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":316,"to_ping":8,"pinged":8,"post_modified":253,"post_modified_gmt":253,"post_content_filtered":8,"post_parent":102,"guid":317,"menu_order":123,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":315,"menu_item_parent":297,"object_id":114,"object":20,"type":21,"type_label":22,"url":115,"title":116,"target":8,"attr_title":8,"description":8,"classes":318,"xfn":8,"layout_type":48},8268,"8268","https://cbtw.tech/preview/post/8268?p=8268&#038;preview=true&#038;post_type=nav_menu_item",[8],{"ID":320,"post_author":38,"post_date":253,"post_date_gmt":321,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":322,"to_ping":8,"pinged":8,"post_modified":253,"post_modified_gmt":253,"post_content_filtered":8,"post_parent":102,"guid":323,"menu_order":132,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":320,"menu_item_parent":297,"object_id":124,"object":20,"type":21,"type_label":22,"url":125,"title":126,"target":8,"attr_title":8,"description":8,"classes":324,"xfn":8,"layout_type":48},8642,"2025-07-03 10:58:18","8642","https://cbtw.tech/preview/post/8642?p=8642&#038;preview=true&#038;post_type=nav_menu_item",[8],{"ID":326,"post_author":38,"post_date":253,"post_date_gmt":279,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":327,"to_ping":8,"pinged":8,"post_modified":253,"post_modified_gmt":253,"post_content_filtered":8,"post_parent":102,"guid":328,"menu_order":142,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":326,"menu_item_parent":297,"object_id":133,"object":20,"type":21,"type_label":22,"url":134,"title":135,"target":8,"attr_title":8,"description":8,"classes":329,"xfn":8,"layout_type":48},8512,"8512","https://cbtw.tech/preview/post/8512?p=8512&#038;preview=true&#038;post_type=nav_menu_item",[8],{"ID":331,"post_author":38,"post_date":253,"post_date_gmt":332,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":333,"to_ping":8,"pinged":8,"post_modified":253,"post_modified_gmt":253,"post_content_filtered":8,"post_parent":102,"guid":334,"menu_order":151,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":331,"menu_item_parent":297,"object_id":143,"object":20,"type":21,"type_label":22,"url":144,"title":145,"target":8,"attr_title":8,"description":8,"classes":335,"xfn":8,"layout_type":48},8953,"2025-07-09 11:41:56","8953","https://cbtw.tech/preview/post/8953?p=8953&#038;preview=true&#038;post_type=nav_menu_item",[8],{"ID":337,"post_author":38,"post_date":253,"post_date_gmt":338,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":339,"to_ping":8,"pinged":8,"post_modified":253,"post_modified_gmt":253,"post_content_filtered":8,"post_parent":102,"guid":340,"menu_order":162,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":337,"menu_item_parent":297,"object_id":341,"object":20,"type":21,"type_label":22,"url":342,"title":343,"target":8,"attr_title":8,"description":8,"classes":344,"xfn":8,"layout_type":48},13463,"2026-03-20 14:08:59","13463","https://cbtw.tech/preview/post/13463?p=13463&#038;preview=true&#038;post_type=nav_menu_item","13333","https://cbtw.tech/sectors/retail-and-e-commerce/","Retail &amp; E-commerce",[8],{"ID":346,"post_author":38,"post_date":253,"post_date_gmt":279,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":347,"to_ping":8,"pinged":8,"post_modified":253,"post_modified_gmt":253,"post_content_filtered":8,"post_parent":13,"guid":348,"menu_order":168,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":346,"menu_item_parent":17,"object_id":152,"object":20,"type":21,"type_label":22,"url":153,"title":154,"target":8,"attr_title":8,"description":8,"classes":349,"xfn":8,"layout_type":48},8511,"8511","https://cbtw.tech/preview/post/8511?p=8511&#038;preview=true&#038;post_type=nav_menu_item",[8],{"ID":351,"post_author":38,"post_date":253,"post_date_gmt":352,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":353,"to_ping":8,"pinged":8,"post_modified":253,"post_modified_gmt":253,"post_content_filtered":8,"post_parent":13,"guid":354,"menu_order":179,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":351,"menu_item_parent":17,"object_id":169,"object":20,"type":21,"type_label":22,"url":170,"title":171,"target":8,"attr_title":8,"description":8,"classes":355,"xfn":8,"layout_type":48},8269,"2025-07-01 22:50:12","8269","https://cbtw.tech/preview/post/8269?p=8269&#038;preview=true&#038;post_type=nav_menu_item",[8],{"ID":357,"post_author":266,"post_date":253,"post_date_gmt":358,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":359,"to_ping":8,"pinged":8,"post_modified":253,"post_modified_gmt":253,"post_content_filtered":8,"post_parent":13,"guid":360,"menu_order":187,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":357,"menu_item_parent":17,"object_id":188,"object":20,"type":21,"type_label":22,"url":189,"title":190,"target":8,"attr_title":8,"description":8,"classes":361,"xfn":8,"layout_type":192,"children":362},6754,"2025-05-28 15:17:46","6754","https://cbtw.tech/preview/post/6754?p=6754&#038;preview=true&#038;post_type=nav_menu_item",[8],[363,370,377,383],{"ID":364,"post_author":38,"post_date":253,"post_date_gmt":365,"post_content":8,"post_title":366,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":367,"to_ping":8,"pinged":8,"post_modified":253,"post_modified_gmt":253,"post_content_filtered":8,"post_parent":13,"guid":368,"menu_order":199,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":364,"menu_item_parent":359,"object_id":188,"object":20,"type":21,"type_label":22,"url":189,"title":366,"target":8,"attr_title":8,"description":8,"classes":369,"xfn":8,"layout_type":192},9662,"2025-07-28 13:56:12","Insights Overview","insights-overview","https://cbtw.tech/preview/post/9662?p=9662&#038;preview=true&#038;post_type=nav_menu_item",[8],{"ID":371,"post_author":38,"post_date":253,"post_date_gmt":372,"post_content":8,"post_title":373,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":192,"to_ping":8,"pinged":8,"post_modified":253,"post_modified_gmt":253,"post_content_filtered":8,"post_parent":13,"guid":374,"menu_order":210,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":371,"menu_item_parent":359,"object_id":375,"object":201,"type":201,"type_label":202,"title":373,"url":203,"target":8,"attr_title":8,"description":8,"classes":376,"xfn":8,"layout_type":48},8753,"2025-07-08 05:22:38","Expert Articles","https://cbtw.tech/preview/post/8753?p=8753&#038;preview=true&#038;post_type=nav_menu_item","8753",[8],{"ID":378,"post_author":38,"post_date":253,"post_date_gmt":372,"post_content":8,"post_title":207,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":379,"to_ping":8,"pinged":8,"post_modified":253,"post_modified_gmt":253,"post_content_filtered":8,"post_parent":13,"guid":380,"menu_order":219,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":378,"menu_item_parent":359,"object_id":381,"object":201,"type":201,"type_label":202,"title":207,"url":212,"target":8,"attr_title":8,"description":8,"classes":382,"xfn":8,"layout_type":48},8751,"case-studies","https://cbtw.tech/preview/post/8751?p=8751&#038;preview=true&#038;post_type=nav_menu_item","8751",[8],{"ID":384,"post_author":38,"post_date":253,"post_date_gmt":372,"post_content":8,"post_title":216,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":385,"to_ping":8,"pinged":8,"post_modified":253,"post_modified_gmt":253,"post_content_filtered":8,"post_parent":13,"guid":386,"menu_order":227,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":384,"menu_item_parent":359,"object_id":387,"object":201,"type":201,"type_label":202,"title":216,"url":221,"target":8,"attr_title":8,"description":8,"classes":388,"xfn":8,"layout_type":48},8752,"resources","https://cbtw.tech/preview/post/8752?p=8752&#038;preview=true&#038;post_type=nav_menu_item","8752",[8],{"ID":390,"post_author":38,"post_date":253,"post_date_gmt":352,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":391,"to_ping":8,"pinged":8,"post_modified":253,"post_modified_gmt":253,"post_content_filtered":8,"post_parent":13,"guid":392,"menu_order":238,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":390,"menu_item_parent":17,"object_id":228,"object":20,"type":21,"type_label":22,"url":229,"title":230,"target":8,"attr_title":8,"description":8,"classes":393,"xfn":8,"layout_type":48,"children":394},8270,"8270","https://cbtw.tech/preview/post/8270?p=8270&#038;preview=true&#038;post_type=nav_menu_item",[8],[395,400],{"ID":396,"post_author":38,"post_date":253,"post_date_gmt":303,"post_content":8,"post_title":235,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":397,"to_ping":8,"pinged":8,"post_modified":253,"post_modified_gmt":253,"post_content_filtered":8,"post_parent":13,"guid":398,"menu_order":245,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":396,"menu_item_parent":391,"object_id":228,"object":20,"type":21,"type_label":22,"url":229,"title":235,"target":8,"attr_title":8,"description":8,"classes":399,"xfn":8,"layout_type":48},9579,"culture-2","https://cbtw.tech/preview/post/9579?p=9579&#038;preview=true&#038;post_type=nav_menu_item",[8],{"ID":401,"post_author":38,"post_date":253,"post_date_gmt":402,"post_content":8,"post_title":242,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":403,"to_ping":8,"pinged":8,"post_modified":253,"post_modified_gmt":253,"post_content_filtered":8,"post_parent":13,"guid":404,"menu_order":405,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":401,"menu_item_parent":391,"object_id":406,"object":201,"type":201,"type_label":202,"title":242,"url":247,"target":248,"attr_title":8,"description":8,"classes":407,"xfn":8,"layout_type":48},8380,"2025-07-02 16:19:28","job-opportunities","https://cbtw.tech/preview/post/8380?p=8380&#038;preview=true&#038;post_type=nav_menu_item",25,"8380",[8],{"ID":409,"post_author":266,"post_date":253,"post_date_gmt":358,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":410,"to_ping":8,"pinged":8,"post_modified":253,"post_modified_gmt":253,"post_content_filtered":8,"post_parent":13,"guid":411,"menu_order":412,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":409,"menu_item_parent":17,"object_id":413,"object":20,"type":21,"type_label":22,"url":414,"title":415,"target":8,"attr_title":8,"description":8,"classes":416,"xfn":8,"layout_type":417},6755,"6755","https://cbtw.tech/preview/post/6755?p=6755&#038;preview=true&#038;post_type=nav_menu_item",26,"6718","https://cbtw.tech/contact/","Contact",[8],"contact",[419,430,439,448,458,467,476],{"ID":420,"post_author":421,"post_date":422,"post_date_gmt":423,"post_content":8,"post_title":424,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":425,"to_ping":8,"pinged":8,"post_modified":422,"post_modified_gmt":422,"post_content_filtered":8,"post_parent":13,"guid":426,"menu_order":15,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":420,"menu_item_parent":17,"object_id":427,"object":201,"type":201,"type_label":202,"title":424,"url":428,"target":8,"attr_title":8,"description":8,"classes":429,"xfn":8,"layout_type":48},1375,"7","2025-05-13 06:56:54","2024-01-17 10:16:49","Cookie Settings","cookie-settings","https://admin.cbtw.tech/?p=1375","1375","?cookie-settings",[8],{"ID":431,"post_author":421,"post_date":422,"post_date_gmt":423,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":432,"to_ping":8,"pinged":8,"post_modified":422,"post_modified_gmt":422,"post_content_filtered":8,"post_parent":13,"guid":433,"menu_order":32,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":431,"menu_item_parent":17,"object_id":434,"object":20,"type":21,"type_label":22,"url":435,"title":436,"target":8,"attr_title":8,"description":8,"classes":437,"xfn":8,"layout_type":438},1370,"1370","https://admin.cbtw.tech/?p=1370","616","https://cbtw.tech/terms-of-use/","General terms of use",[8],"terms-of-use",{"ID":440,"post_author":421,"post_date":422,"post_date_gmt":423,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":441,"to_ping":8,"pinged":8,"post_modified":422,"post_modified_gmt":422,"post_content_filtered":8,"post_parent":13,"guid":442,"menu_order":43,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":440,"menu_item_parent":17,"object_id":443,"object":20,"type":21,"type_label":22,"url":444,"title":445,"target":8,"attr_title":8,"description":8,"classes":446,"xfn":8,"layout_type":447},1371,"1371","https://admin.cbtw.tech/?p=1371","687","https://cbtw.tech/cookie-policy/","Cookies Policy",[8],"cookie-policy",{"ID":449,"post_author":421,"post_date":450,"post_date_gmt":423,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":451,"to_ping":8,"pinged":8,"post_modified":450,"post_modified_gmt":450,"post_content_filtered":8,"post_parent":13,"guid":452,"menu_order":54,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":449,"menu_item_parent":17,"object_id":453,"object":20,"type":21,"type_label":22,"url":454,"title":455,"target":8,"attr_title":8,"description":8,"classes":456,"xfn":8,"layout_type":457},1372,"2025-05-13 06:56:55","1372","https://admin.cbtw.tech/?p=1372","255","https://cbtw.tech/privacy-policy/","Privacy Policy",[8],"privacy-policy",{"ID":459,"post_author":421,"post_date":450,"post_date_gmt":423,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":460,"to_ping":8,"pinged":8,"post_modified":450,"post_modified_gmt":450,"post_content_filtered":8,"post_parent":13,"guid":461,"menu_order":63,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":459,"menu_item_parent":17,"object_id":462,"object":20,"type":21,"type_label":22,"url":463,"title":464,"target":8,"attr_title":8,"description":8,"classes":465,"xfn":8,"layout_type":466},1373,"1373","https://admin.cbtw.tech/?p=1373","403","https://cbtw.tech/whistleblowing-policy/","Whistleblowing Policy",[8],"whistleblowing-policy",{"ID":468,"post_author":421,"post_date":450,"post_date_gmt":423,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":469,"to_ping":8,"pinged":8,"post_modified":450,"post_modified_gmt":450,"post_content_filtered":8,"post_parent":13,"guid":470,"menu_order":72,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":468,"menu_item_parent":17,"object_id":471,"object":20,"type":21,"type_label":22,"url":472,"title":473,"target":8,"attr_title":8,"description":8,"classes":474,"xfn":8,"layout_type":475},1374,"1374","https://admin.cbtw.tech/?p=1374","257","https://cbtw.tech/lodge-a-complaint/","Lodge a complaint",[8],"lodge-a-complaint",{"ID":477,"post_author":6,"post_date":450,"post_date_gmt":450,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":478,"to_ping":8,"pinged":8,"post_modified":450,"post_modified_gmt":450,"post_content_filtered":8,"post_parent":13,"guid":479,"menu_order":82,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":477,"menu_item_parent":17,"object_id":480,"object":20,"type":21,"type_label":22,"url":481,"title":482,"target":8,"attr_title":8,"description":8,"classes":483,"xfn":8,"layout_type":48},6322,"6322","https://cbtw.tech/preview/post/6322?p=6322&#038;preview=true&#038;post_type=nav_menu_item","2152","https://cbtw.tech/index-egalite-femmes-hommes-de-72-100/","Index égalité femmes-hommes de 72/100",[8],{"items":485,"count":54},[486,488,490,492],{"value":487,"label":487},"EMEA",{"value":489,"label":489},"APAC",{"value":491,"label":491},"Americas",{"value":493,"label":493},"Africa",[495],{"id":496,"date":497,"date_gmt":497,"guid":498,"modified":499,"modified_gmt":499,"slug":500,"status":10,"type":501,"link":502,"title":503,"content":505,"excerpt":508,"author":510,"featured_media":511,"comment_status":512,"ping_status":512,"sticky":507,"template":8,"format":513,"meta":514,"categories":515,"tags":517,"cbtw_industries":518,"cbtw_services":519,"class_list":521,"acf":530,"yoast_head":559,"yoast_head_json":560,"lang":660,"translations":661,"cbtw_post_categories":662,"header":664,"layout_builder":665,"featured_image":675,"industries":683,"services":684,"cbtw_post_author":580,"breadcrumb":689,"primary_category_name":373,"featured_image_url":578,"primary_industry_name":8,"primary_service_name":686,"pll_sync_post":695,"_links":696,"_embedded":744},14795,"2026-05-21T07:55:27",{"rendered":189},"2026-05-21T07:55:28","dark-web-monitoring-stop-credential-exposed-early","post","https://cbtw.tech/insights/dark-web-monitoring-stop-credential-exposed-early",{"rendered":504},"Dark Web Monitoring: Are Your Employees’ Credentials Already Exposed?",{"rendered":506,"protected":507},"\n\u003Cp>Cyberattacks often begin long before a suspicious login, ransomware note, or phishing email reaches the organization. The starting point may already be outside the company’s control: an employee email, password, session token, or device record circulating through breach dumps, criminal forums, Telegram channels, or infostealer logs.\u003C/p>\n\n\n\n\u003Cp>The financial impact keeps rising. IBM reported that the global average \u003Ca href=\"https://newsroom.ibm.com/2024-07-30-ibm-report-escalating-data-breach-disruption-pushes-costs-to-new-highs\">cost of a data breach reached USD 4.88 million\u003C/a> in 2024, while Verizon’s 2025 DBIR found \u003Ca href=\"https://www.securitymagazine.com/articles/101569-verizon-2025-data-breach-investigations-report-shows-rise-in-cyberattacks\">credential abuse accounted for 22% of initial attack vectors\u003C/a> and ransomware was present in 44% of breaches. Dark web monitoring helps security teams spot exposed credentials, compromised identities, and external warning signs earlier.\u003C/p>\n\n\n\u003Ch2 class=\"wp-block-heading\" id=\"h-the-credential-risk-hiding-outside-your-perimeter\">\u003Cstrong>The credential risk hiding outside your perimeter\u003C/strong>\u003C/h2>\n\n\n\u003Cp>A single exposed password can become a working entry point when employees reuse credentials across personal and business accounts. Attackers test what works, then look for accounts that open access to email, collaboration tools, cloud platforms, finance systems, or supplier portals.\u003C/p>\n\n\n\n\u003Cp>The risk grows when leaked records include role, department, device, or session details. These signals help attackers prioritize targets with business context instead of guessing who might be useful.\u003C/p>\n\n\n\n\u003Cfigure class=\"wp-block-table\">\u003Ctable class=\"has-fixed-layout\">\u003Cthead>\u003Ctr>\u003Ctd>\u003Cstrong>Exposed signal\u003C/strong>\u003C/td>\u003Ctd>\u003Cstrong>Business risk\u003C/strong>\u003C/td>\u003C/tr>\u003C/thead>\u003Ctbody>\u003Ctr>\u003Ctd>Corporate email and password\u003C/td>\u003Ctd>Credential stuffing, account takeover, unauthorized access\u003C/td>\u003C/tr>\u003Ctr>\u003Ctd>Job title or department\u003C/td>\u003Ctd>Targeted phishing against finance, HR, IT, or executives\u003C/td>\u003C/tr>\u003Ctr>\u003Ctd>Supplier or partner account\u003C/td>\u003Ctd>Third party access risk and supply chain exposure\u003C/td>\u003C/tr>\u003Ctr>\u003Ctd>Session token or device data\u003C/td>\u003Ctd>Possible bypass of standard login controls\u003C/td>\u003C/tr>\u003C/tbody>\u003C/table>\u003C/figure>\n\n\n\n\u003Cfigure class=\"wp-block-image size-large\">\u003Cimg loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https://admin.cbtw.tech/wp-content/uploads/microsoft-authenticator-mfa-credential-security-1024x683.png\" alt=\"Microsoft Authenticator MFA prompt illustrating credential security and identity verification\" class=\"wp-image-14813\" srcset=\"https://admin.cbtw.tech/wp-content/uploads/microsoft-authenticator-mfa-credential-security-1024x683.png 1024w, https://admin.cbtw.tech/wp-content/uploads/microsoft-authenticator-mfa-credential-security-800x533.png 800w, https://admin.cbtw.tech/wp-content/uploads/microsoft-authenticator-mfa-credential-security-100x67.png 100w, https://admin.cbtw.tech/wp-content/uploads/microsoft-authenticator-mfa-credential-security.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" />\u003C/figure>\n\n\n\u003Ch2 class=\"wp-block-heading\" id=\"h-what-dark-web-monitoring-brings-into-view\">\u003Cstrong>What dark web monitoring brings into view\u003C/strong>\u003C/h2>\n\n\n\u003Cp>Dark web monitoring turns external exposure into intelligence that security teams can triage. It helps detect credential dumps, infostealer logs, company-domain mentions, executive impersonation risks, exposed customer or supplier data, and access offers linked to internal systems or IP addresses.\u003C/p>\n\n\n\n\u003Cp>The practical value is prioritization. Security teams need to know which exposed accounts are active, which ones have elevated access, which belong to high-risk departments, and which third-party identities connect to business-critical workflows.\u003C/p>\n\n\n\n\u003Cp>CBTW addresses this exposure through Visibility 360°, combining cyber threat intelligence, dark web and hacker resource monitoring, leaked credential detection, brand reputation protection, email defense, and data loss prevention. Our teams also work with CTI technologies such as Flare and SOCRadar to support dark web and hacker resource monitoring.\u003C/p>\n\n\n\u003Ch2 class=\"wp-block-heading\" id=\"h-from-leaked-login-to-business-disruption\">\u003Cstrong>From leaked login to business disruption\u003C/strong>\u003C/h2>\n\n\n\u003Cp>Credential exposure becomes dangerous when attackers turn leaked data into access. The pattern often follows four routes:\u003C/p>\n\n\n\n\u003Cul class=\"wp-block-list\">\n\u003Cli>Credential stuffing: Attackers test leaked usernames and passwords against corporate applications, VPNs, email systems, and SaaS platforms.\u003C/li>\n\n\n\n\u003Cli>Targeted phishing: Attackers use employee and business context to make messages more credible and role specific.\u003C/li>\n\n\n\n\u003Cli>Ransomware preparation: Valid credentials can help attackers enter quietly, observe systems, escalate privileges, and prepare extortion activity.\u003C/li>\n\n\n\n\u003Cli>Supply chain exposure: Supplier or partner accounts can become indirect routes into business systems.\u003C/li>\n\u003C/ul>\n\n\n\n\u003Cp>Exposed credentials affect identity security, human risk, and operational response at the same time. Our cybersecurity teams support this through Identity-First Security, including IAM, ITDR, and Zero Trust, alongside Human Risk Management capabilities such as phishing simulations, awareness training, and password security education.\u003C/p>\n\n\n\u003Ch2 class=\"wp-block-heading\" id=\"h-turning-alerts-into-response\">\u003Cstrong>Turning alerts into response\u003C/strong>\u003C/h2>\n\n\n\u003Cp>Dark web monitoring delivers stronger outcomes when it is connected to response workflows. A credential exposure alert should trigger clear action:\u003C/p>\n\n\n\n\u003Cul class=\"wp-block-list\">\n\u003Cli>Validate whether the exposed account is active.\u003C/li>\n\n\n\n\u003Cli>Force password resets where needed.\u003C/li>\n\n\n\n\u003Cli>Enforce MFA and conditional access.\u003C/li>\n\n\n\n\u003Cli>Review privileged access.\u003C/li>\n\n\n\n\u003Cli>Check suspicious login activity.\u003C/li>\n\n\n\n\u003Cli>Add affected identities to SOC monitoring.\u003C/li>\n\n\n\n\u003Cli>Run targeted awareness or phishing simulations for exposed teams.\u003C/li>\n\u003C/ul>\n\n\n\n\u003Cp>For high-risk users, security teams may also need to review mailbox rules, device posture, session activity, access logs, and recent authentication events. For suppliers and partners, the priority is to confirm whether exposed accounts connect to shared systems or sensitive workflows.\u003C/p>\n\n\n\n\u003Cp>CBTW supports this response model by connecting SOC, identity, offensive security, and human risk capabilities. This includes SOC 24/7, SIEM, EDR and NDR managed services, Identity-First Security, password evaluation, phishing simulations, awareness training, and remediation implementation.\u003C/p>\n\n\n\n\u003Cfigure class=\"wp-block-image size-large\">\u003Cimg loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https://admin.cbtw.tech/wp-content/uploads/padlock-keyboard-credential-security-response-1024x683.png\" alt=\"Metal padlock on a computer keyboard symbolizing cybersecurity credential protection and access control\" class=\"wp-image-14867\" srcset=\"https://admin.cbtw.tech/wp-content/uploads/padlock-keyboard-credential-security-response-1024x683.png 1024w, https://admin.cbtw.tech/wp-content/uploads/padlock-keyboard-credential-security-response-800x533.png 800w, https://admin.cbtw.tech/wp-content/uploads/padlock-keyboard-credential-security-response-100x67.png 100w, https://admin.cbtw.tech/wp-content/uploads/padlock-keyboard-credential-security-response.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" />\u003C/figure>\n\n\n\u003Ch2 class=\"wp-block-heading\" id=\"h-leadership-exposure-review\">\u003Cstrong>Leadership exposure review\u003C/strong>\u003C/h2>\n\n\n\u003Cp>Security leaders can use dark web monitoring as part of a broader identity and exposure review.\u003C/p>\n\n\n\n\u003Cfigure class=\"wp-block-table\">\u003Ctable class=\"has-fixed-layout\">\u003Cthead>\u003Ctr>\u003Ctd>\u003Cstrong>Leadership question\u003C/strong>\u003C/td>\u003Ctd>\u003Cstrong>Why it matters\u003C/strong>\u003C/td>\u003C/tr>\u003C/thead>\u003Ctbody>\u003Ctr>\u003Ctd>Are corporate domains monitored for leaked credentials?\u003C/td>\u003Ctd>Confirms whether credential exposure is visible before attackers use it.\u003C/td>\u003C/tr>\u003Ctr>\u003Ctd>Are exposed accounts matched against active users?\u003C/td>\u003Ctd>Helps prioritize accounts that still create access risk.\u003C/td>\u003C/tr>\u003Ctr>\u003Ctd>Are privileged, executive, finance, and IT accounts prioritized?\u003C/td>\u003Ctd>Focuses response on identities with higher business impact.\u003C/td>\u003C/tr>\u003Ctr>\u003Ctd>Are supplier and third party identities included?\u003C/td>\u003Ctd>Reduces indirect access risk through external relationships.\u003C/td>\u003C/tr>\u003Ctr>\u003Ctd>Are alerts connected to SOC playbooks?\u003C/td>\u003Ctd>Turns exposure intelligence into investigation and response.\u003C/td>\u003C/tr>\u003Ctr>\u003Ctd>Are password reset, MFA, and access review processes clearly owned?\u003C/td>\u003Ctd>Reduces remediation delays after exposure is detected.\u003C/td>\u003C/tr>\u003Ctr>\u003Ctd>Are exposure trends reported to leadership?\u003C/td>\u003Ctd>Supports better decisions on identity, awareness, and risk investment.\u003C/td>\u003C/tr>\u003C/tbody>\u003C/table>\u003C/figure>\n\n\n\u003Ch2 class=\"wp-block-heading\" id=\"h-from-exposure-to-action\">\u003Cstrong>From exposure to action\u003C/strong>\u003C/h2>\n\n\n\u003Cp>Dark web monitoring gives organizations a clearer view of risk developing outside their perimeter. The next step is operational discipline: validating the exposure, prioritizing affected identities, connecting alerts to SOC workflows, enforcing identity controls, and guiding users away from risky behaviors before attackers take advantage.\u003C/p>\n\n\n\n\u003Cp>At CBTW, we help organizations turn exposed credential intelligence into practical response. Through Visibility 360°, SOC 360°, Identity-First Security, and Human Risk Management, our teams connect cyber threat intelligence with monitoring, identity controls, incident response, awareness, and remediation. This gives security teams a coordinated way to act on external exposure signals across SOC, identity, and user risk workflows.\u003C/p>\n",false,{"rendered":509,"protected":507},"\u003Cp>yberattacks often begin long before a suspicious login, ransomware note, or phishing email reaches the organization. The starting point may already be outside the company’s control: an employee email, password, session token, or device record circulating through breach dumps, criminal forums, Telegram channels, or infostealer logs&#8230;\u003C/p>\n",39,14867,"open","standard",{"_acf_changed":507,"content-type":8,"inline_featured_image":507,"footnotes":8},[516],46,[],[],[520],201,[522,501,523,524,525,526,527,528,529],"post-14795","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights","cbtw_services-cyber-security",{"authors":8,"article_authors":531,"direct_external_link":8,"short_name":8,"short_description":8,"layout_builder":537},[532],{"author_avatar":533,"author_name":534,"author_url":535,"author_position":536},"https://admin.cbtw.tech/wp-content/uploads/Collaboration-Betters-The-World-CBTW-logo-secondary-Black.jpg","Quang Luu","https://www.linkedin.com/in/quangluu/","Marketing & Communications Director APAC",[538,551],{"acf_fc_layout":539,"title":190,"ui_v2":540,"short_description":541,"cbtw_related_group_filters":542,"items":507,"link":547,"hubspot_form_id":8,"mainPostId":496},"block_insights",true,"Access related expert insights",{"cbtw_related_category_filter":543,"cbtw_related_tag_filter":544,"cbtw_related_industry_filter":545,"cbtw_related_service_filter":546},[192,379],[],[],[],{"title":548,"url":549,"target":550},"View all insights","https://cbtw.tech/insights","_self",{"acf_fc_layout":552,"tag_name":553,"section_title":554,"description":8,"image":507,"cta_link":555,"hubspot_form_id":558,"align_center":507},"block_lets_connect","Know your exposure before attackers do.","Your next breach may start with a password already on the dark web. Let's find it first.",{"title":556,"url":557,"target":248},"Talk to our experts","https://cbtw.tech/apac/contact/","2b771724-6b01-4d7b-aeaa-591dfb86a794","\u003C!-- This site is optimized with the Yoast SEO Premium plugin v25.4 (Yoast SEO v25.4) - https://yoast.com/wordpress/plugins/seo/ -->\n\u003Ctitle>Dark Web Monitoring: Stop Credential Exposure Early - CBTW\u003C/title>\n\u003Cmeta name=\"description\" content=\"Learn how dark web monitoring detects exposed credentials and turns external threat signals into faster incident response.\" />\n\u003Cmeta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" />\n\u003Clink rel=\"canonical\" href=\"https://cbtw.tech/insights/dark-web-monitoring-stop-credential-exposed-early\" />\n\u003Cmeta property=\"og:locale\" content=\"en_US\" />\n\u003Cmeta property=\"og:type\" content=\"article\" />\n\u003Cmeta property=\"og:title\" content=\"Dark Web Monitoring: Are Your Employees’ Credentials Already Exposed?\" />\n\u003Cmeta property=\"og:description\" content=\"Learn how dark web monitoring detects exposed credentials and turns external threat signals into faster incident response.\" />\n\u003Cmeta property=\"og:url\" content=\"https://cbtw.tech/insights/dark-web-monitoring-stop-credential-exposed-early\" />\n\u003Cmeta property=\"og:site_name\" content=\"CBTW\" />\n\u003Cmeta property=\"article:published_time\" content=\"2026-05-21T07:55:27+00:00\" />\n\u003Cmeta property=\"article:modified_time\" content=\"2026-05-21T07:55:28+00:00\" />\n\u003Cmeta property=\"og:image\" content=\"https://admin.cbtw.tech/wp-content/uploads/padlock-keyboard-credential-security-response.png\" />\n\t\u003Cmeta property=\"og:image:width\" content=\"1200\" />\n\t\u003Cmeta property=\"og:image:height\" content=\"800\" />\n\t\u003Cmeta property=\"og:image:type\" content=\"image/png\" />\n\u003Cmeta name=\"author\" content=\"Nhu Nguyen\" />\n\u003Cmeta name=\"twitter:card\" content=\"summary_large_image\" />\n\u003Cmeta name=\"twitter:label1\" content=\"Written by\" />\n\t\u003Cmeta name=\"twitter:data1\" content=\"Nhu Nguyen\" />\n\t\u003Cmeta name=\"twitter:label2\" content=\"Est. reading time\" />\n\t\u003Cmeta name=\"twitter:data2\" content=\"5 minutes\" />\n\u003Cscript type=\"application/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https://schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https://cbtw.tech/insights/dark-web-monitoring-stop-credential-exposed-early#article\",\"isPartOf\":{\"@id\":\"https://cbtw.tech/insights/dark-web-monitoring-stop-credential-exposed-early\"},\"author\":{\"name\":\"Nhu Nguyen\",\"@id\":\"https://cbtw.tech/#/schema/person/263ae347c7c3f45529b7e02660585171\"},\"headline\":\"Dark Web Monitoring: Are Your Employees’ Credentials Already Exposed?\",\"datePublished\":\"2026-05-21T07:55:27+00:00\",\"dateModified\":\"2026-05-21T07:55:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https://cbtw.tech/insights/dark-web-monitoring-stop-credential-exposed-early\"},\"wordCount\":872,\"commentCount\":0,\"publisher\":{\"@id\":\"https://cbtw.tech/#organization\"},\"image\":{\"@id\":\"https://cbtw.tech/insights/dark-web-monitoring-stop-credential-exposed-early#primaryimage\"},\"thumbnailUrl\":\"https://admin.cbtw.tech/wp-content/uploads/padlock-keyboard-credential-security-response.png\",\"articleSection\":[\"Expert Articles\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https://cbtw.tech/insights/dark-web-monitoring-stop-credential-exposed-early#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https://cbtw.tech/insights/dark-web-monitoring-stop-credential-exposed-early\",\"url\":\"https://cbtw.tech/insights/dark-web-monitoring-stop-credential-exposed-early\",\"name\":\"Dark Web Monitoring: Stop Credential Exposure Early - CBTW\",\"isPartOf\":{\"@id\":\"https://cbtw.tech/#website\"},\"primaryImageOfPage\":{\"@id\":\"https://cbtw.tech/insights/dark-web-monitoring-stop-credential-exposed-early#primaryimage\"},\"image\":{\"@id\":\"https://cbtw.tech/insights/dark-web-monitoring-stop-credential-exposed-early#primaryimage\"},\"thumbnailUrl\":\"https://admin.cbtw.tech/wp-content/uploads/padlock-keyboard-credential-security-response.png\",\"datePublished\":\"2026-05-21T07:55:27+00:00\",\"dateModified\":\"2026-05-21T07:55:28+00:00\",\"description\":\"Learn how dark web monitoring detects exposed credentials and turns external threat signals into faster incident response.\",\"breadcrumb\":{\"@id\":\"https://cbtw.tech/insights/dark-web-monitoring-stop-credential-exposed-early#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https://cbtw.tech/insights/dark-web-monitoring-stop-credential-exposed-early\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https://cbtw.tech/insights/dark-web-monitoring-stop-credential-exposed-early#primaryimage\",\"url\":\"https://admin.cbtw.tech/wp-content/uploads/padlock-keyboard-credential-security-response.png\",\"contentUrl\":\"https://admin.cbtw.tech/wp-content/uploads/padlock-keyboard-credential-security-response.png\",\"width\":1200,\"height\":800,\"caption\":\"Metal padlock on a computer keyboard symbolizing cybersecurity credential protection and access control\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https://cbtw.tech/insights/dark-web-monitoring-stop-credential-exposed-early#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https://cbtw.tech/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Dark Web Monitoring: Are Your Employees’ Credentials Already Exposed?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https://cbtw.tech/#website\",\"url\":\"https://cbtw.tech/\",\"name\":\"CBTW\",\"description\":\"Collaboration Betters The World\",\"publisher\":{\"@id\":\"https://cbtw.tech/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https://cbtw.tech/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https://cbtw.tech/#organization\",\"name\":\"CBTW\",\"url\":\"https://cbtw.tech/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https://cbtw.tech/#/schema/logo/image/\",\"url\":\"https://admin.cbtw.tech/wp-content/uploads/Primary_Classic.png\",\"contentUrl\":\"https://admin.cbtw.tech/wp-content/uploads/Primary_Classic.png\",\"width\":1001,\"height\":538,\"caption\":\"CBTW\"},\"image\":{\"@id\":\"https://cbtw.tech/#/schema/logo/image/\"},\"sameAs\":[\"https://www.linkedin.com/company/collaboration-betters-the-world\",\"https://www.linkedin.com/company/cbtw-it-and-technology/\"]},{\"@type\":\"Person\",\"@id\":\"https://cbtw.tech/#/schema/person/263ae347c7c3f45529b7e02660585171\",\"name\":\"Nhu Nguyen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https://cbtw.tech/#/schema/person/image/\",\"url\":\"https://secure.gravatar.com/avatar/718c2d118149f2d0be7d9ee7c0e58424?s=96&d=mm&r=g\",\"contentUrl\":\"https://secure.gravatar.com/avatar/718c2d118149f2d0be7d9ee7c0e58424?s=96&d=mm&r=g\",\"caption\":\"Nhu Nguyen\"},\"url\":\"https://cbtw.tech/author/nhu-nguyenhoangthaocbtw-tech/\"}]}\u003C/script>\n\u003C!-- / Yoast SEO Premium plugin. -->",{"title":561,"description":562,"robots":563,"canonical":502,"og_locale":569,"og_type":570,"og_title":504,"og_description":562,"og_url":502,"og_site_name":571,"article_published_time":572,"article_modified_time":573,"og_image":574,"author":580,"twitter_card":581,"twitter_misc":582,"schema":584},"Dark Web Monitoring: Stop Credential Exposure Early - CBTW","Learn how dark web monitoring detects exposed credentials and turns external threat signals into faster incident response.",{"index":564,"follow":565,"max-snippet":566,"max-image-preview":567,"max-video-preview":568},"index","follow","max-snippet:-1","max-image-preview:large","max-video-preview:-1","en_US","article","CBTW","2026-05-21T07:55:27+00:00","2026-05-21T07:55:28+00:00",[575],{"width":576,"height":577,"url":578,"type":579},1200,800,"https://admin.cbtw.tech/wp-content/uploads/padlock-keyboard-credential-security-response.png","image/png","Nhu Nguyen","summary_large_image",{"Written by":580,"Est. reading time":583},"5 minutes",{"@context":585,"@graph":586},"https://schema.org",[587,607,619,622,630,643,654],{"@type":588,"@id":589,"isPartOf":590,"author":591,"headline":504,"datePublished":572,"dateModified":573,"mainEntityOfPage":593,"wordCount":594,"commentCount":13,"publisher":595,"image":597,"thumbnailUrl":578,"articleSection":599,"inLanguage":600,"potentialAction":601},"Article","https://cbtw.tech/insights/dark-web-monitoring-stop-credential-exposed-early#article",{"@id":502},{"name":580,"@id":592},"https://cbtw.tech/#/schema/person/263ae347c7c3f45529b7e02660585171",{"@id":502},872,{"@id":596},"https://cbtw.tech/#organization",{"@id":598},"https://cbtw.tech/insights/dark-web-monitoring-stop-credential-exposed-early#primaryimage",[373],"en-US",[602],{"@type":603,"name":604,"target":605},"CommentAction","Comment",[606],"https://cbtw.tech/insights/dark-web-monitoring-stop-credential-exposed-early#respond",{"@type":608,"@id":502,"url":502,"name":561,"isPartOf":609,"primaryImageOfPage":611,"image":612,"thumbnailUrl":578,"datePublished":572,"dateModified":573,"description":562,"breadcrumb":613,"inLanguage":600,"potentialAction":615},"WebPage",{"@id":610},"https://cbtw.tech/#website",{"@id":598},{"@id":598},{"@id":614},"https://cbtw.tech/insights/dark-web-monitoring-stop-credential-exposed-early#breadcrumb",[616],{"@type":617,"target":618},"ReadAction",[502],{"@type":620,"inLanguage":600,"@id":598,"url":578,"contentUrl":578,"width":576,"height":577,"caption":621},"ImageObject","Metal padlock on a computer keyboard symbolizing cybersecurity credential protection and access control",{"@type":623,"@id":614,"itemListElement":624},"BreadcrumbList",[625,629],{"@type":626,"position":15,"name":627,"item":628},"ListItem","Home","https://cbtw.tech/",{"@type":626,"position":32,"name":504},{"@type":631,"@id":610,"url":628,"name":571,"description":632,"publisher":633,"potentialAction":634,"inLanguage":600},"WebSite","Collaboration Betters The World",{"@id":596},[635],{"@type":636,"target":637,"query-input":640},"SearchAction",{"@type":638,"urlTemplate":639},"EntryPoint","https://cbtw.tech/?s={search_term_string}",{"@type":641,"valueRequired":540,"valueName":642},"PropertyValueSpecification","search_term_string",{"@type":644,"@id":596,"name":571,"url":628,"logo":645,"image":650,"sameAs":651},"Organization",{"@type":620,"inLanguage":600,"@id":646,"url":647,"contentUrl":647,"width":648,"height":649,"caption":571},"https://cbtw.tech/#/schema/logo/image/","https://admin.cbtw.tech/wp-content/uploads/Primary_Classic.png",1001,538,{"@id":646},[652,653],"https://www.linkedin.com/company/collaboration-betters-the-world","https://www.linkedin.com/company/cbtw-it-and-technology/",{"@type":655,"@id":592,"name":580,"image":656,"url":659},"Person",{"@type":620,"inLanguage":600,"@id":657,"url":658,"contentUrl":658,"caption":580},"https://cbtw.tech/#/schema/person/image/","https://secure.gravatar.com/avatar/718c2d118149f2d0be7d9ee7c0e58424?s=96&d=mm&r=g","https://cbtw.tech/author/nhu-nguyenhoangthaocbtw-tech/","en",{"en":496},[663],{"name":373,"slug":192,"term_id":516},{"title":8,"image":507},[666,673],{"acf_fc_layout":539,"title":190,"ui_v2":540,"short_description":541,"cbtw_related_group_filters":667,"items":507,"link":672,"hubspot_form_id":8},{"cbtw_related_category_filter":668,"cbtw_related_tag_filter":669,"cbtw_related_industry_filter":670,"cbtw_related_service_filter":671},[192,379],[],[],[],{"title":548,"url":549,"target":550},{"acf_fc_layout":552,"tag_name":553,"section_title":554,"description":8,"image":507,"cta_link":674,"hubspot_form_id":558,"align_center":507},{"title":556,"url":557,"target":248},{"alt":621,"caption":676,"description":677,"id":511,"sizes":678,"title":682},"The Merlion and Singapore’s financial district skyline highlight the city’s leadership in mobile app development and digital solutions.\n","This image captures the iconic Merlion fountain with Singapore’s modern financial district in the background, representing the country’s strong position as a global technology and innovation hub. It reflects the growing demand for mobile app development Singapore businesses rely on to build scalable, user-friendly, and high-performance applications. The blend of advanced infrastructure and urban development emphasizes Singapore’s role in driving digital transformation across industries such as fintech, e-commerce, and smart city solutions.\n",{"full":578,"thumbnail":679,"medium":680,"medium_large":578,"large":681,"1536x1536":578,"2048x2048":578},"https://admin.cbtw.tech/wp-content/uploads/padlock-keyboard-credential-security-response-100x67.png","https://admin.cbtw.tech/wp-content/uploads/padlock-keyboard-credential-security-response-800x533.png","https://admin.cbtw.tech/wp-content/uploads/padlock-keyboard-credential-security-response-1024x683.png","Mobile App Development Singapore – Digital Innovation in a Smart City",[],[685],{"term_id":520,"name":686,"slug":687,"term_group":13,"term_taxonomy_id":520,"taxonomy":688,"description":8,"parent":13,"count":245,"filter":18,"term_order":17},"Cyber Security","cyber-security","cbtw_services",[690,692,694],{"title":627,"url":628,"id":13,"type":691},"home",{"title":190,"url":189,"id":693,"type":20},74,{"title":504,"url":502,"id":496,"type":501},[],{"self":697,"collection":703,"about":706,"author":709,"replies":712,"version-history":715,"predecessor-version":718,"wp:featuredmedia":722,"wp:attachment":725,"wp:term":728,"curies":740},[698],{"href":699,"targetHints":700},"https://admin.cbtw.tech/wp-json/wp/v2/posts/14795",{"allow":701},[702],"GET",[704],{"href":705},"https://admin.cbtw.tech/wp-json/wp/v2/posts",[707],{"href":708},"https://admin.cbtw.tech/wp-json/wp/v2/types/post",[710],{"embeddable":540,"href":711},"https://admin.cbtw.tech/wp-json/wp/v2/users/39",[713],{"embeddable":540,"href":714},"https://admin.cbtw.tech/wp-json/wp/v2/comments?post=14795",[716],{"count":63,"href":717},"https://admin.cbtw.tech/wp-json/wp/v2/posts/14795/revisions",[719],{"id":720,"href":721},14894,"https://admin.cbtw.tech/wp-json/wp/v2/posts/14795/revisions/14894",[723],{"embeddable":540,"href":724},"https://admin.cbtw.tech/wp-json/wp/v2/media/14867",[726],{"href":727},"https://admin.cbtw.tech/wp-json/wp/v2/media?parent=14795",[729,732,735,738],{"taxonomy":730,"embeddable":540,"href":731},"category","https://admin.cbtw.tech/wp-json/wp/v2/categories?post=14795",{"taxonomy":733,"embeddable":540,"href":734},"post_tag","https://admin.cbtw.tech/wp-json/wp/v2/tags?post=14795",{"taxonomy":736,"embeddable":540,"href":737},"cbtw_industries","https://admin.cbtw.tech/wp-json/wp/v2/cbtw_industries?post=14795",{"taxonomy":688,"embeddable":540,"href":739},"https://admin.cbtw.tech/wp-json/wp/v2/cbtw_services?post=14795",[741],{"name":742,"href":743,"templated":540},"wp","https://api.w.org/{rel}",{"author":745,"wp:featuredmedia":796,"wp:term":844},[746],{"id":510,"name":580,"url":8,"description":8,"link":659,"slug":747,"avatar_urls":748,"pll_duplicate_content":507,"yoast_head":751,"yoast_head_json":752,"acf":787,"_links":788},"nhu-nguyenhoangthaocbtw-tech",{"24":749,"48":750,"96":658},"https://secure.gravatar.com/avatar/718c2d118149f2d0be7d9ee7c0e58424?s=24&d=mm&r=g","https://secure.gravatar.com/avatar/718c2d118149f2d0be7d9ee7c0e58424?s=48&d=mm&r=g","\u003C!-- This site is optimized with the Yoast SEO Premium plugin v25.4 (Yoast SEO v25.4) - https://yoast.com/wordpress/plugins/seo/ -->\n\u003Ctitle>Nhu NguyenCBTW\u003C/title>\n\u003Cmeta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" />\n\u003Clink rel=\"canonical\" href=\"https://cbtw.tech/author/nhu-nguyenhoangthaocbtw-tech/\" />\n\u003Cmeta property=\"og:locale\" content=\"en_US\" />\n\u003Cmeta property=\"og:type\" content=\"profile\" />\n\u003Cmeta property=\"og:title\" content=\"Nhu Nguyen\" />\n\u003Cmeta property=\"og:url\" content=\"https://cbtw.tech/author/nhu-nguyenhoangthaocbtw-tech/\" />\n\u003Cmeta property=\"og:site_name\" content=\"CBTW\" />\n\u003Cmeta property=\"og:image\" content=\"https://secure.gravatar.com/avatar/718c2d118149f2d0be7d9ee7c0e58424?s=500&d=mm&r=g\" />\n\u003Cmeta name=\"twitter:card\" content=\"summary_large_image\" />\n\u003Cscript type=\"application/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https://schema.org\",\"@graph\":[{\"@type\":\"ProfilePage\",\"@id\":\"https://cbtw.tech/author/nhu-nguyenhoangthaocbtw-tech/\",\"url\":\"https://cbtw.tech/author/nhu-nguyenhoangthaocbtw-tech/\",\"name\":\"Nhu NguyenCBTW\",\"isPartOf\":{\"@id\":\"https://cbtw.tech/#website\"},\"breadcrumb\":{\"@id\":\"https://cbtw.tech/author/nhu-nguyenhoangthaocbtw-tech/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https://cbtw.tech/author/nhu-nguyenhoangthaocbtw-tech/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https://cbtw.tech/author/nhu-nguyenhoangthaocbtw-tech/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https://cbtw.tech/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Archives for Nhu Nguyen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https://cbtw.tech/#website\",\"url\":\"https://cbtw.tech/\",\"name\":\"CBTW\",\"description\":\"Collaboration Betters The World\",\"publisher\":{\"@id\":\"https://cbtw.tech/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https://cbtw.tech/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https://cbtw.tech/#organization\",\"name\":\"CBTW\",\"url\":\"https://cbtw.tech/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https://cbtw.tech/#/schema/logo/image/\",\"url\":\"https://admin.cbtw.tech/wp-content/uploads/Primary_Classic.png\",\"contentUrl\":\"https://admin.cbtw.tech/wp-content/uploads/Primary_Classic.png\",\"width\":1001,\"height\":538,\"caption\":\"CBTW\"},\"image\":{\"@id\":\"https://cbtw.tech/#/schema/logo/image/\"},\"sameAs\":[\"https://www.linkedin.com/company/collaboration-betters-the-world\",\"https://www.linkedin.com/company/cbtw-it-and-technology/\"]},{\"@type\":\"Person\",\"@id\":\"https://cbtw.tech/#/schema/person/263ae347c7c3f45529b7e02660585171\",\"name\":\"Nhu Nguyen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https://cbtw.tech/#/schema/person/image/\",\"url\":\"https://secure.gravatar.com/avatar/718c2d118149f2d0be7d9ee7c0e58424?s=96&d=mm&r=g\",\"contentUrl\":\"https://secure.gravatar.com/avatar/718c2d118149f2d0be7d9ee7c0e58424?s=96&d=mm&r=g\",\"caption\":\"Nhu Nguyen\"},\"mainEntityOfPage\":{\"@id\":\"https://cbtw.tech/author/nhu-nguyenhoangthaocbtw-tech/\"}}]}\u003C/script>\n\u003C!-- / Yoast SEO Premium plugin. -->",{"title":753,"robots":754,"canonical":659,"og_locale":569,"og_type":755,"og_title":580,"og_url":659,"og_site_name":571,"og_image":756,"twitter_card":581,"schema":759},"Nhu NguyenCBTW",{"index":564,"follow":565,"max-snippet":566,"max-image-preview":567,"max-video-preview":568},"profile",[757],{"url":758,"type":8,"width":8,"height":8},"https://secure.gravatar.com/avatar/718c2d118149f2d0be7d9ee7c0e58424?s=500&d=mm&r=g",{"@context":585,"@graph":760},[761,769,774,780,784],{"@type":762,"@id":659,"url":659,"name":753,"isPartOf":763,"breadcrumb":764,"inLanguage":600,"potentialAction":766},"ProfilePage",{"@id":610},{"@id":765},"https://cbtw.tech/author/nhu-nguyenhoangthaocbtw-tech/#breadcrumb",[767],{"@type":617,"target":768},[659],{"@type":623,"@id":765,"itemListElement":770},[771,772],{"@type":626,"position":15,"name":627,"item":628},{"@type":626,"position":32,"name":773},"Archives for Nhu Nguyen",{"@type":631,"@id":610,"url":628,"name":571,"description":632,"publisher":775,"potentialAction":776,"inLanguage":600},{"@id":596},[777],{"@type":636,"target":778,"query-input":779},{"@type":638,"urlTemplate":639},{"@type":641,"valueRequired":540,"valueName":642},{"@type":644,"@id":596,"name":571,"url":628,"logo":781,"image":782,"sameAs":783},{"@type":620,"inLanguage":600,"@id":646,"url":647,"contentUrl":647,"width":648,"height":649,"caption":571},{"@id":646},[652,653],{"@type":655,"@id":592,"name":580,"image":785,"mainEntityOfPage":786},{"@type":620,"inLanguage":600,"@id":657,"url":658,"contentUrl":658,"caption":580},{"@id":659},[],{"self":789,"collection":793},[790],{"href":711,"targetHints":791},{"allow":792},[702],[794],{"href":795},"https://admin.cbtw.tech/wp-json/wp/v2/users",[797],{"id":511,"date":798,"slug":799,"type":800,"link":801,"title":802,"author":510,"featured_media":13,"acf":803,"caption":804,"alt_text":621,"media_type":806,"mime_type":579,"media_details":807,"source_url":578,"_links":828},"2026-05-21T02:54:01","padlock-keyboard-credential-security-response","attachment","https://cbtw.tech/insights/dark-web-monitoring-stop-credential-exposed-early/padlock-keyboard-credential-security-response/",{"rendered":799},{"layout_builder":507},{"rendered":805},"\u003Cp>A metal padlock on a computer keyboard, illustrating how security teams enforce access controls and respond to dark web credential exposure alerts\u003C/p>\n","image",{"width":576,"height":577,"file":808,"filesize":809,"sizes":810,"image_meta":826},"padlock-keyboard-credential-security-response.png",431134,{"medium":811,"large":815,"thumbnail":820,"full":825},{"file":812,"width":577,"height":813,"filesize":814,"mime_type":579,"source_url":680},"padlock-keyboard-credential-security-response-800x533.png",533,471902,{"file":816,"width":817,"height":818,"filesize":819,"mime_type":579,"source_url":681},"padlock-keyboard-credential-security-response-1024x683.png",1024,683,707020,{"file":821,"width":822,"height":823,"filesize":824,"mime_type":579,"source_url":679},"padlock-keyboard-credential-security-response-100x67.png",100,67,13940,{"file":808,"width":576,"height":577,"mime_type":579,"source_url":578},{"aperture":17,"credit":8,"camera":8,"caption":8,"created_timestamp":17,"copyright":8,"focal_length":17,"iso":17,"shutter_speed":17,"title":8,"orientation":17,"keywords":827},[],{"self":829,"collection":833,"about":836,"author":839,"replies":841},[830],{"href":724,"targetHints":831},{"allow":832},[702],[834],{"href":835},"https://admin.cbtw.tech/wp-json/wp/v2/media",[837],{"href":838},"https://admin.cbtw.tech/wp-json/wp/v2/types/attachment",[840],{"embeddable":540,"href":711},[842],{"embeddable":540,"href":843},"https://admin.cbtw.tech/wp-json/wp/v2/comments?post=14867",[845,895,896,897],[846],{"id":516,"link":847,"name":373,"slug":192,"taxonomy":730,"yoast_head":848,"yoast_head_json":849,"lang":660,"translations":874,"acf":877,"_links":878},"https://cbtw.tech/category/insights/","\u003C!-- This site is optimized with the Yoast SEO Premium plugin v25.4 (Yoast SEO v25.4) - https://yoast.com/wordpress/plugins/seo/ -->\n\u003Ctitle>Expert Articles - CBTW\u003C/title>\n\u003Cmeta name=\"robots\" content=\"noindex, follow\" />\n\u003Cmeta property=\"og:locale\" content=\"en_US\" />\n\u003Cmeta property=\"og:type\" content=\"article\" />\n\u003Cmeta property=\"og:title\" content=\"Expert Articles\" />\n\u003Cmeta property=\"og:url\" content=\"https://cbtw.tech/category/insights/\" />\n\u003Cmeta property=\"og:site_name\" content=\"CBTW\" />\n\u003Cmeta name=\"twitter:card\" content=\"summary_large_image\" />\n\u003Cscript type=\"application/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https://schema.org\",\"@graph\":[{\"@type\":\"CollectionPage\",\"@id\":\"https://cbtw.tech/category/insights/\",\"url\":\"https://cbtw.tech/category/insights/\",\"name\":\"Expert Articles - CBTW\",\"isPartOf\":{\"@id\":\"https://cbtw.tech/#website\"},\"breadcrumb\":{\"@id\":\"https://cbtw.tech/category/insights/#breadcrumb\"},\"inLanguage\":\"en-US\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https://cbtw.tech/category/insights/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https://cbtw.tech/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Expert Articles\"}]},{\"@type\":\"WebSite\",\"@id\":\"https://cbtw.tech/#website\",\"url\":\"https://cbtw.tech/\",\"name\":\"CBTW\",\"description\":\"Collaboration Betters The World\",\"publisher\":{\"@id\":\"https://cbtw.tech/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https://cbtw.tech/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https://cbtw.tech/#organization\",\"name\":\"CBTW\",\"url\":\"https://cbtw.tech/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https://cbtw.tech/#/schema/logo/image/\",\"url\":\"https://admin.cbtw.tech/wp-content/uploads/Primary_Classic.png\",\"contentUrl\":\"https://admin.cbtw.tech/wp-content/uploads/Primary_Classic.png\",\"width\":1001,\"height\":538,\"caption\":\"CBTW\"},\"image\":{\"@id\":\"https://cbtw.tech/#/schema/logo/image/\"},\"sameAs\":[\"https://www.linkedin.com/company/collaboration-betters-the-world\",\"https://www.linkedin.com/company/cbtw-it-and-technology/\"]}]}\u003C/script>\n\u003C!-- / Yoast SEO Premium plugin. -->",{"title":850,"robots":851,"og_locale":569,"og_type":570,"og_title":373,"og_url":847,"og_site_name":571,"twitter_card":581,"schema":853},"Expert Articles - CBTW",{"index":852,"follow":565},"noindex",{"@context":585,"@graph":854},[855,860,864,870],{"@type":856,"@id":847,"url":847,"name":850,"isPartOf":857,"breadcrumb":858,"inLanguage":600},"CollectionPage",{"@id":610},{"@id":859},"https://cbtw.tech/category/insights/#breadcrumb",{"@type":623,"@id":859,"itemListElement":861},[862,863],{"@type":626,"position":15,"name":627,"item":628},{"@type":626,"position":32,"name":373},{"@type":631,"@id":610,"url":628,"name":571,"description":632,"publisher":865,"potentialAction":866,"inLanguage":600},{"@id":596},[867],{"@type":636,"target":868,"query-input":869},{"@type":638,"urlTemplate":639},{"@type":641,"valueRequired":540,"valueName":642},{"@type":644,"@id":596,"name":571,"url":628,"logo":871,"image":872,"sameAs":873},{"@type":620,"inLanguage":600,"@id":646,"url":647,"contentUrl":647,"width":648,"height":649,"caption":571},{"@id":646},[652,653],{"en":516,"de":875,"fr":876},48,460,[],{"self":879,"collection":884,"about":887,"wp:post_type":890,"curies":893},[880],{"href":881,"targetHints":882},"https://admin.cbtw.tech/wp-json/wp/v2/categories/46",{"allow":883},[702],[885],{"href":886},"https://admin.cbtw.tech/wp-json/wp/v2/categories",[888],{"href":889},"https://admin.cbtw.tech/wp-json/wp/v2/taxonomies/category",[891],{"href":892},"https://admin.cbtw.tech/wp-json/wp/v2/posts?categories=46",[894],{"name":742,"href":743,"templated":540},[],[],[898],{"id":520,"link":899,"name":686,"slug":687,"taxonomy":688,"yoast_head":900,"yoast_head_json":901,"acf":924,"_links":925},"https://cbtw.tech/cbtw_services/cyber-security/","\u003C!-- This site is optimized with the Yoast SEO Premium plugin v25.4 (Yoast SEO v25.4) - https://yoast.com/wordpress/plugins/seo/ -->\n\u003Ctitle>Cyber Security - CBTW\u003C/title>\n\u003Cmeta name=\"robots\" content=\"noindex, follow\" />\n\u003Cmeta property=\"og:locale\" content=\"en_US\" />\n\u003Cmeta property=\"og:type\" content=\"article\" />\n\u003Cmeta property=\"og:title\" content=\"Cyber Security\" />\n\u003Cmeta property=\"og:url\" content=\"https://cbtw.tech/cbtw_services/cyber-security/\" />\n\u003Cmeta property=\"og:site_name\" content=\"CBTW\" />\n\u003Cmeta name=\"twitter:card\" content=\"summary_large_image\" />\n\u003Cscript type=\"application/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https://schema.org\",\"@graph\":[{\"@type\":\"CollectionPage\",\"@id\":\"https://cbtw.tech/cbtw_services/cyber-security/\",\"url\":\"https://cbtw.tech/cbtw_services/cyber-security/\",\"name\":\"Cyber Security - CBTW\",\"isPartOf\":{\"@id\":\"https://cbtw.tech/#website\"},\"breadcrumb\":{\"@id\":\"https://cbtw.tech/cbtw_services/cyber-security/#breadcrumb\"},\"inLanguage\":\"en-US\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https://cbtw.tech/cbtw_services/cyber-security/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https://cbtw.tech/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https://cbtw.tech/#website\",\"url\":\"https://cbtw.tech/\",\"name\":\"CBTW\",\"description\":\"Collaboration Betters The World\",\"publisher\":{\"@id\":\"https://cbtw.tech/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https://cbtw.tech/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https://cbtw.tech/#organization\",\"name\":\"CBTW\",\"url\":\"https://cbtw.tech/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https://cbtw.tech/#/schema/logo/image/\",\"url\":\"https://admin.cbtw.tech/wp-content/uploads/Primary_Classic.png\",\"contentUrl\":\"https://admin.cbtw.tech/wp-content/uploads/Primary_Classic.png\",\"width\":1001,\"height\":538,\"caption\":\"CBTW\"},\"image\":{\"@id\":\"https://cbtw.tech/#/schema/logo/image/\"},\"sameAs\":[\"https://www.linkedin.com/company/collaboration-betters-the-world\",\"https://www.linkedin.com/company/cbtw-it-and-technology/\"]}]}\u003C/script>\n\u003C!-- / Yoast SEO Premium plugin. -->",{"title":902,"robots":903,"og_locale":569,"og_type":570,"og_title":686,"og_url":899,"og_site_name":571,"twitter_card":581,"schema":904},"Cyber Security - CBTW",{"index":852,"follow":565},{"@context":585,"@graph":905},[906,910,914,920],{"@type":856,"@id":899,"url":899,"name":902,"isPartOf":907,"breadcrumb":908,"inLanguage":600},{"@id":610},{"@id":909},"https://cbtw.tech/cbtw_services/cyber-security/#breadcrumb",{"@type":623,"@id":909,"itemListElement":911},[912,913],{"@type":626,"position":15,"name":627,"item":628},{"@type":626,"position":32,"name":686},{"@type":631,"@id":610,"url":628,"name":571,"description":632,"publisher":915,"potentialAction":916,"inLanguage":600},{"@id":596},[917],{"@type":636,"target":918,"query-input":919},{"@type":638,"urlTemplate":639},{"@type":641,"valueRequired":540,"valueName":642},{"@type":644,"@id":596,"name":571,"url":628,"logo":921,"image":922,"sameAs":923},{"@type":620,"inLanguage":600,"@id":646,"url":647,"contentUrl":647,"width":648,"height":649,"caption":571},{"@id":646},[652,653],[],{"self":926,"collection":931,"about":934,"wp:post_type":937,"curies":940},[927],{"href":928,"targetHints":929},"https://admin.cbtw.tech/wp-json/wp/v2/cbtw_services/201",{"allow":930},[702],[932],{"href":933},"https://admin.cbtw.tech/wp-json/wp/v2/cbtw_services",[935],{"href":936},"https://admin.cbtw.tech/wp-json/wp/v2/taxonomies/cbtw_services",[938],{"href":939},"https://admin.cbtw.tech/wp-json/wp/v2/posts?cbtw_services=201",[941],{"name":742,"href":743,"templated":540},[943,957,959],{"region_name":944,"social_list":945},"Global",[946,950,953],{"title":947,"link":948,"icon":949},"Instagram","https://www.instagram.com/collaborationbetterstheworld/","https://admin.cbtw.tech/wp-content/uploads/insAsset-1@2x.png",{"title":951,"link":652,"icon":952},"LinkedIn","https://admin.cbtw.tech/wp-content/uploads/lkAsset-2@2x.png",{"title":954,"link":955,"icon":956},"Youtube","https://www.youtube.com/@collaborationbetterstheworld","https://admin.cbtw.tech/wp-content/uploads/youtubeAsset-3@2x.png",{"region_name":8,"social_list":958},[],{"region_name":8,"social_list":960},[],{"related_title":8,"posts":962},[963,974,985],{"id":964,"title":965,"description":8,"excerpt":966,"date":968,"categories":373,"link":969,"image":970,"images":971},14769,"Build-Operate-Transfer Model: Why Fintech’s Future Depends on Owning Your Tech",{"rendered":967},"For the past decade, fintechs scaled fast by renting capability - cloud infrastructure, engineering talent, and core systems. It worked. Until it didn’t.\n\nThe regulatory environment of 2026 has fundamentally closed that window. With the Digital Operational Resilience Act (DORA) now in full force and the EU AI Act raising the bar on AI transparency, the \"our vendor handles that\" defense is no longer viable. Regulators don't accept it. Auditors don't accept it. And increasingly, your board shouldn't either.","2026-05-21","https://cbtw.tech/insights/build-operate-transfer-model-for-fintech-engineering-ownership","https://admin.cbtw.tech/wp-content/uploads/fintech-cybersecurity-compliance-trading-floor.png",{"medium":972,"large":973,"full":970},"https://admin.cbtw.tech/wp-content/uploads/fintech-cybersecurity-compliance-trading-floor-800x533.png","https://admin.cbtw.tech/wp-content/uploads/fintech-cybersecurity-compliance-trading-floor-1024x683.png",{"id":975,"title":976,"description":8,"excerpt":977,"date":979,"categories":373,"link":980,"image":981,"images":982},14684,"What is an Offshore Development Center?",{"rendered":978},"Most engineering leaders searching for offshore delivery options start with the same term: offshore development center. It is the right instinct. But the organizations that scale fastest, protect their IP most effectively, and reduce vendor dependency over time tend to take the model further. Understanding&nbsp;what&nbsp;is an offshore development center&nbsp;is the starting point. Understanding why the [&hellip;]","2026-05-18","https://cbtw.tech/insights/what-is-an-offshore-development-center","https://admin.cbtw.tech/wp-content/uploads/l-intro-1760706512.jpg",{"medium":983,"large":984,"full":981},"https://admin.cbtw.tech/wp-content/uploads/l-intro-1760706512-800x450.jpg","https://admin.cbtw.tech/wp-content/uploads/l-intro-1760706512-1024x575.jpg",{"id":986,"title":987,"description":8,"excerpt":988,"date":990,"categories":373,"link":991,"image":992,"images":993},14658,"Your CS team is stuck and it’s not a people problem",{"rendered":989},"When a “people problem” isn’t one If you manage customer service through numbers on a dashboard, it’s easy to draw the wrong conclusion. On paper, it looks like a performance issue: “The team isn’t efficient enough.”In practice, what I see in most organizations is different: the team is stuck inside a system that makes good [&hellip;]","2026-05-13","https://cbtw.tech/insights/fix-customer-service-team-performance","https://admin.cbtw.tech/wp-content/uploads/customer-service-team-performance-overloaded.jpg",{"medium":994,"large":995,"full":992},"https://admin.cbtw.tech/wp-content/uploads/customer-service-team-performance-overloaded-800x534.jpg","https://admin.cbtw.tech/wp-content/uploads/customer-service-team-performance-overloaded-1024x683.jpg",1779377729765]