{"id":24094,"date":"2026-03-26T10:40:08","date_gmt":"2026-03-26T09:40:08","guid":{"rendered":"https:\/\/coreit.se\/tjanster\/security-risk-management\/compliance-audit\/risk-and-vulnerability-assessments"},"modified":"2026-03-27T11:12:25","modified_gmt":"2026-03-27T10:12:25","slug":"risk-and-vulnerability-assessments","status":"publish","type":"tjanster","link":"https:\/\/coreit.se\/en\/services\/security-risk-management\/compliance-audit\/risk-and-vulnerability-assessments","title":{"rendered":"Risk and vulnerability assessments"},"excerpt":{"rendered":"<p>Risk &amp; vulnerability assessments One of the most flexible and powerful tools on the market The IT environment of companies is growing rapidly and constantly expanding with new systems and functions, and it can be difficult to keep up to date with what security gaps exist on your own. CoreIT offers risk and vulnerability analyses [&hellip;]<\/p>\n","protected":false},"featured_media":0,"parent":23950,"menu_order":0,"template":"","meta":{"_acf_changed":false},"utseende":[25],"class_list":["post-24094","tjanster","type-tjanster","status-publish","hentry","utseende-elementor"],"acf":[],"_links":{"self":[{"href":"https:\/\/coreit.se\/en\/wp-json\/wp\/v2\/tjanster\/24094","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coreit.se\/en\/wp-json\/wp\/v2\/tjanster"}],"about":[{"href":"https:\/\/coreit.se\/en\/wp-json\/wp\/v2\/types\/tjanster"}],"version-history":[{"count":0,"href":"https:\/\/coreit.se\/en\/wp-json\/wp\/v2\/tjanster\/24094\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/coreit.se\/en\/wp-json\/wp\/v2\/tjanster\/23950"}],"wp:attachment":[{"href":"https:\/\/coreit.se\/en\/wp-json\/wp\/v2\/media?parent=24094"}],"wp:term":[{"taxonomy":"utseende","embeddable":true,"href":"https:\/\/coreit.se\/en\/wp-json\/wp\/v2\/utseende?post=24094"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}