{"id":3132,"date":"2020-10-28T17:15:31","date_gmt":"2020-10-28T17:15:31","guid":{"rendered":"http:\/\/blueprinttheme.com\/blueprint\/?page_id=3132"},"modified":"2023-05-30T17:52:33","modified_gmt":"2023-05-30T17:52:33","slug":"homepage","status":"publish","type":"page","link":"https:\/\/nootherjake.com\/blog\/","title":{"rendered":"Homepage"},"content":{"rendered":"\t<div class=\"cnvs-block-section cnvs-block-section-1603902194239 cnvs-block-section-layout-full cnvs-block-section-fullwidth\" >\n\t\t<div class=\"cnvs-block-section-outer\" style=\"\">\n\t\t\t<div class=\"cnvs-block-section-inner\">\n\t\t\t\t\r\n\r\n\n<div class=\"cnvs-block-section-content cnvs-block-section-content-1603902196647\" >\n\t<div class=\"cnvs-block-section-content-inner\">\n\t\t\r\n\r\n\t<div class=\"cnvs-block-posts cnvs-block-posts-1603902257608 cnvs-block-posts-layout-horizontal-type-2\" data-layout=\"horizontal-type-2\" data-min-height=\"\">\n\t\t<div class=\"cs-posts-area\" data-posts-area=\"\">\n\t\t\t<div class=\"cs-posts-area__outer\">\n\t\t\t\t<div class=\"cs-posts-area__main cs-block-posts-layout-horizontal-type-2 cs-display-column cs-posts-area__image-width-half\">\n\t\t\t\t\t\n<article class=\"post-260 post type-post status-publish format-video has-post-thumbnail category-grc tag-critical-security-controls-version-8 tag-access-control tag-accesscontrol tag-account-management tag-accountmanagement tag-anti-malware tag-antimalware tag-antivirus tag-application-security tag-applicationsecurity tag-audit-log-management tag-auditlogmanagement tag-business-continuity tag-businesscontinuity tag-center-for-internet-security-cis-controls tag-cis-controls tag-cis-controls-18 tag-cis-controls-framework tag-cis-controls-list tag-cis-controls-v8 tag-ciscontrols tag-cloud-security-various-standards-like-csa-star tag-common-criteria-for-information-technology-security-evaluation tag-configuration-management tag-configurationmanagement tag-controlled-unclassified-information-cui-framework tag-cybersecurity tag-data-protection tag-data-recovery tag-data-security tag-dataprotection tag-datarecovery tag-datasecurity tag-defense-federal-acquisition-regulation-supplement-dfars-cybersecurity-requirements tag-disaster-recovery tag-disasterrecovery tag-email-protection tag-emailprotection tag-environmental-security tag-environmentalsecurity tag-etc tag-federal-information-security-management-act-fisma tag-federal-risk-and-authorization-management-program-fedramp tag-fedramp tag-general-data-protection-regulation-gdpr tag-hardware-control tag-hardware-inventory tag-hardwarecontrol tag-hardwareinventory tag-health-information-trust-alliance-hitrust-common-security-framework tag-health-insurance-portability-and-accountability-act-hipaa-security-rule tag-incident-response tag-incidentresponse tag-information-security-controls tag-international-electrotechnical-commission-iec-62443-industrial-automation-and-control-systems-security tag-international-traffic-in-arms-regulations-itar tag-intrusion-detection tag-intrusion-prevention tag-intrusiondetection tag-intrusionprevention tag-isms tag-isms-contosl tag-isms-security tag-isms-standards tag-iso-iec-270012013-information-security-management-system tag-malware-defense tag-malwaredefense tag-national-institute-of-standards-and-technology-nist-cybersecurity-framework tag-network-monitoring tag-network-security tag-networkmonitoring tag-networksecurity tag-north-american-electric-reliability-corporation-nerc-critical-infrastructure-protection-cip tag-password-management tag-password-security tag-passwordmanagement tag-patch-management tag-patchmanagement tag-payment-card-industry-data-security-standard-pci-dss tag-penetration-testing tag-phishing tag-phishing-and-social-engineering tag-physical-security tag-physicalsecurity tag-port-security tag-portsecurity tag-privilege-management tag-privilegemanagement tag-protocol-security tag-protocolsecurity tag-sarbanes-oxley-act-sox tag-secure-computing-practices tag-secure-configuration tag-secureconfiguration tag-security-awareness-training tag-security-incident-management tag-security-logging tag-securityincidentmanagement tag-securitylogging tag-soc-1-audit tag-soc-2-audit tag-software-control tag-software-inventory tag-software-security tag-softwarecontrol tag-softwareinventory tag-softwaresecurity tag-system-and-organization-controls-soc-for-cybersecurity tag-vulnerability-management tag-vulnerabilitymanagement tag-web-browser-protection tag-webbrowserprotection tag-wi-fi-security tag-wi-fisecurity tag-wifi-security tag-wireless-security tag-wirelesssecurity post_format-post-format-video cs-entry cs-video-wrap\">\n\t<div class=\"cs-entry__outer\">\n\t\t<div class=\"cs-entry__inner cs-entry__content\">\n\t\t\t<div class=\"cs-entry__content-inner\">\n\t\t\t\t<div class=\"cs-entry__post-meta\" ><div class=\"cs-meta-category\"><ul class=\"post-categories\">\n\t<li><a href=\"https:\/\/nootherjake.com\/blog\/category\/grc\/\" rel=\"category tag\">Governance, Risk &amp; Compliance<\/a><\/li><\/ul><\/div><\/div>\t\t\t\t<a href=\"https:\/\/nootherjake.com\/blog\/cis-control-1-inventory-and-control-of-enterprise-assets-critical-security-controls-version-8\/\" class=\"cs-entry__title-wrapper\">\n\t\t\t\t\t<span class=\"cs-entry__title-effect\">\n\t\t\t\t\t\t\t<h2 class=\"cs-entry__title \">\n\t\tCIS Control 1: Inventory and Control of Enterprise Assets\t<\/h2>\n\t\t\t\t<p class=\"cs-entry__excerpt\">\n\t\t\t\tA step-by-step guide for implementing Governance, Risk &amp; Compliance audits for\t\t\t<\/p>\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"cs-entry__post-meta\" ><div class=\"cs-meta-reading-time\"><span class=\"cs-meta-icon\"><i class=\"cs-icon cs-icon-clock\"><\/i><\/span>13 minute read<\/div><\/div>\t\t<\/div>\n\t\t\t\t<div class=\"cs-entry__inner cs-entry__thumbnail cs-entry__overlay cs-overlay-ratio cs-ratio-landscape-3-2\">\n\t\t\t<div class=\"cs-overlay-background cs-overlay-transparent\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"819\" height=\"557\" src=\"https:\/\/nootherjake.com\/blog\/wp-content\/uploads\/2020\/02\/Screenshot-2023-05-22-101827.png\" class=\"attachment-csco-large-uncropped size-csco-large-uncropped wp-post-image\" alt=\"@nootherjake: Cybersecurity Engineer &amp; Information Security Specialist | Penetration Testing, Governance,\u00a0Risk, and Compliance. CIS Control 1: Inventory and Control of Enterprise Assets\" srcset=\"https:\/\/nootherjake.com\/blog\/wp-content\/uploads\/2020\/02\/Screenshot-2023-05-22-101827.png 819w, https:\/\/nootherjake.com\/blog\/wp-content\/uploads\/2020\/02\/Screenshot-2023-05-22-101827-300x204.png 300w, https:\/\/nootherjake.com\/blog\/wp-content\/uploads\/2020\/02\/Screenshot-2023-05-22-101827-768x522.png 768w, https:\/\/nootherjake.com\/blog\/wp-content\/uploads\/2020\/02\/Screenshot-2023-05-22-101827-380x258.png 380w, https:\/\/nootherjake.com\/blog\/wp-content\/uploads\/2020\/02\/Screenshot-2023-05-22-101827-800x544.png 800w\" sizes=\"auto, (max-width: 819px) 100vw, 819px\" \/>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\n\t\t\t<a class=\"cs-overlay-link\" href=\"https:\/\/nootherjake.com\/blog\/cis-control-1-inventory-and-control-of-enterprise-assets-critical-security-controls-version-8\/\"><\/a>\n\t\t<\/div>\n\t\t\t<\/div>\n<\/article>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t<\/div>\n\t\t<\/div>\n<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\n\t\r\n\r\n\t<div class=\"cnvs-block-section cnvs-block-section-1603904185697 cnvs-block-section-layout-full cnvs-block-section-fullwidth\" >\n\t\t<div class=\"cnvs-block-section-outer\" style=\"\">\n\t\t\t<div class=\"cnvs-block-section-inner\">\n\t\t\t\t\r\n\r\n\n<div class=\"cnvs-block-section-content cnvs-block-section-content-1603904188007\" >\n\t<div class=\"cnvs-block-section-content-inner\">\n\t\t\r\n\r\n\t<div class=\"cnvs-block-posts cnvs-block-posts-1603904032879 cnvs-block-posts-layout-standard-type-1\" data-layout=\"standard-type-1\" data-min-height=\"\">\n\t\t<div class=\"cs-posts-area\" data-posts-area=\"\">\n\t\t\t<div class=\"cs-posts-area__outer\">\n\t\t\t\t<div class=\"cs-posts-area__main cs-block-posts-layout-standard-type-1 cs-display-borders-between-posts\">\n\t\t\t\t\t\n<article class=\"post-262 post type-post status-publish format-gallery has-post-thumbnail category-pentest tag-31 tag-breach tag-data tag-target post_format-post-format-gallery cs-entry cs-video-wrap\">\n\t<div class=\"cs-entry__outer\">\n\t\t\t\t<div class=\"cs-entry__inner cs-entry__thumbnail cs-entry__overlay cs-overlay-ratio cs-ratio-landscape-3-2\">\n\t\t\t<div class=\"cs-overlay-background cs-overlay-transparent\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"500\" src=\"https:\/\/nootherjake.com\/blog\/wp-content\/uploads\/2020\/02\/target-data-breach-800x500.jpg\" class=\"attachment-csco-medium size-csco-medium wp-post-image\" alt=\"\" \/>\n\t\t\t\t\n\t\t\t\t\t\t\t<span class=\"cs-entry-format\">\n\t\t\t\t<a class=\"cs-format-icon cs-format-gallery\" href=\"https:\/\/nootherjake.com\/blog\/target-data-breach\/\">\n\t\t\t\t\t<span class=\"cs-format-count\">3<\/span>\t\t\t\t<\/a>\n\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\n\t\t\t<a class=\"cs-overlay-link\" href=\"https:\/\/nootherjake.com\/blog\/target-data-breach\/\"><\/a>\n\t\t<\/div>\n\t\t\n\t\t<div class=\"cs-entry__inner cs-entry__content\">\n\t\t\t\t\t\t<a href=\"https:\/\/nootherjake.com\/blog\/target-data-breach\/\" class=\"cs-entry__title-wrapper\">\n\t\t\t\t<span class=\"cs-entry__title-effect\">\n\t\t\t\t\t\t<h2 class=\"cs-entry__title \">\n\t\tCase-study &#8211; Target Data Breach  2013\t<\/h2>\n\t\t\t\t<p class=\"cs-entry__excerpt\">\n\t\t\t\tHackers gained access to more than 40 million credit and debit card information\t\t\t<\/p>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t<\/a>\n\t\t\t<div class=\"cs-entry__post-meta\" ><div class=\"cs-meta-author\"><span class=\"cs-by\">by<\/span><a class=\"cs-meta-author-inner url fn n\" href=\"https:\/\/nootherjake.com\/blog\/author\/fxmafia\/\" title=\"View all posts by Jake Adebayo\"><span class=\"cs-author\">Jake Adebayo<\/span><\/a><\/div><div class=\"cs-meta-date\">October 24, 2022<\/div><\/div>\t\t<\/div>\n\t<\/div>\n<\/article>\n\n<article class=\"post-277 post type-post status-publish format-gallery has-post-thumbnail category-pentest tag-buffer-overflow-attack-real-life-example tag-buffer-overflow-c tag-buffer-overflow-c-example tag-buffer-overflow-code-injection-example tag-buffer-overflow-command-line tag-buffer-overflow-example tag-how-to-avoid-buffer-overflow-in-c tag-how-to-check-buffer-overflow-in-c post_format-post-format-gallery cs-entry cs-video-wrap\">\n\t<div class=\"cs-entry__outer\">\n\t\t\t\t<div class=\"cs-entry__inner cs-entry__thumbnail cs-entry__overlay cs-overlay-ratio cs-ratio-landscape-3-2\">\n\t\t\t<div class=\"cs-overlay-background cs-overlay-transparent\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"500\" src=\"https:\/\/nootherjake.com\/blog\/wp-content\/uploads\/2020\/02\/program-C-error-output-find-buffer-overfiow-integer-array-injection-avoid-code-example-stack-2-600x500.png\" class=\"attachment-csco-medium size-csco-medium wp-post-image\" alt=\"Buffer Overflow Attack Real-life Example, Buffer Overflow C, Buffer Overflow C Example, Buffer Overflow Code Injection Example, Buffer Overflow Command Line, Buffer Overflow Example, How To Avoid Buffer Overflow In C, How To Check Buffer Overflow In C\" \/>\n\t\t\t\t\n\t\t\t\t\t\t\t<span class=\"cs-entry-format\">\n\t\t\t\t<a class=\"cs-format-icon cs-format-gallery\" href=\"https:\/\/nootherjake.com\/blog\/buffer-overflow-stack-overflow-c-programming-lab-project\/\">\n\t\t\t\t\t<span class=\"cs-format-count\">25<\/span>\t\t\t\t<\/a>\n\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\n\t\t\t<a class=\"cs-overlay-link\" href=\"https:\/\/nootherjake.com\/blog\/buffer-overflow-stack-overflow-c-programming-lab-project\/\"><\/a>\n\t\t<\/div>\n\t\t\n\t\t<div class=\"cs-entry__inner cs-entry__content\">\n\t\t\t\t\t\t<a href=\"https:\/\/nootherjake.com\/blog\/buffer-overflow-stack-overflow-c-programming-lab-project\/\" class=\"cs-entry__title-wrapper\">\n\t\t\t\t<span class=\"cs-entry__title-effect\">\n\t\t\t\t\t\t<h2 class=\"cs-entry__title \">\n\t\tBuffer Overflow &#8211; Stack overflow &#8211; C Programming  Lab Project\t<\/h2>\n\t\t\t\t<p class=\"cs-entry__excerpt\">\n\t\t\t\tCongratulations, you have mitigated the overflow!\t\t\t<\/p>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t<\/a>\n\t\t\t<div class=\"cs-entry__post-meta\" ><div class=\"cs-meta-author\"><span class=\"cs-by\">by<\/span><a class=\"cs-meta-author-inner url fn n\" href=\"https:\/\/nootherjake.com\/blog\/author\/fxmafia\/\" title=\"View all posts by Jake Adebayo\"><span class=\"cs-author\">Jake Adebayo<\/span><\/a><\/div><div class=\"cs-meta-date\">February 24, 2020<\/div><\/div>\t\t<\/div>\n\t<\/div>\n<\/article>\n\n<article class=\"post-281 post type-post status-publish format-standard has-post-thumbnail category-incident-response tag-buffer-overflow-attack-real-life-example tag-buffer-overflow-c tag-buffer-overflow-c-example tag-buffer-overflow-code-injection-example tag-buffer-overflow-command-line tag-buffer-overflow-example tag-how-to-avoid-buffer-overflow-in-c tag-how-to-check-buffer-overflow-in-c cs-entry cs-video-wrap\">\n\t<div class=\"cs-entry__outer\">\n\t\t\t\t<div class=\"cs-entry__inner cs-entry__thumbnail cs-entry__overlay cs-overlay-ratio cs-ratio-landscape-3-2\">\n\t\t\t<div class=\"cs-overlay-background cs-overlay-transparent\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"500\" src=\"https:\/\/nootherjake.com\/blog\/wp-content\/uploads\/2020\/02\/c-pogramming-language-800x500.jpeg\" class=\"attachment-csco-medium size-csco-medium wp-post-image\" alt=\"Buffer Overflow Attack Real-life Example, Buffer Overflow C, Buffer Overflow C Example, Buffer Overflow Code Injection Example, Buffer Overflow Command Line, Buffer Overflow Example, How To Avoid Buffer Overflow In C, How To Check Buffer Overflow In C\" \/>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\n\t\t\t<a class=\"cs-overlay-link\" href=\"https:\/\/nootherjake.com\/blog\/c-program-to-compare-the-two-strings\/\"><\/a>\n\t\t<\/div>\n\t\t\n\t\t<div class=\"cs-entry__inner cs-entry__content\">\n\t\t\t\t\t\t<a href=\"https:\/\/nootherjake.com\/blog\/c-program-to-compare-the-two-strings\/\" class=\"cs-entry__title-wrapper\">\n\t\t\t\t<span class=\"cs-entry__title-effect\">\n\t\t\t\t\t\t<h2 class=\"cs-entry__title \">\n\t\tC Program to Compare the Two Strings\t<\/h2>\n\t\t\t\t<p class=\"cs-entry__excerpt\">\n\t\t\t\tWrite a program to compare two strings by passing them to a function\t\t\t<\/p>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t<\/a>\n\t\t\t<div class=\"cs-entry__post-meta\" ><div class=\"cs-meta-author\"><span class=\"cs-by\">by<\/span><a class=\"cs-meta-author-inner url fn n\" href=\"https:\/\/nootherjake.com\/blog\/author\/fxmafia\/\" title=\"View all posts by Jake Adebayo\"><span class=\"cs-author\">Jake Adebayo<\/span><\/a><\/div><div class=\"cs-meta-date\">February 23, 2020<\/div><\/div>\t\t<\/div>\n\t<\/div>\n<\/article>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t<\/div>\n\t\r\n\r\n\t<div class=\"cnvs-block-posts cnvs-block-posts-1603903192616 cnvs-block-posts-layout-horizontal-type-1\" data-layout=\"horizontal-type-1\" data-min-height=\"\">\n\t\t<div class=\"cs-posts-area\" data-posts-area=\"\">\n\t\t\t<div class=\"cs-posts-area__outer\">\n\t\t\t\t<div class=\"cs-posts-area__main cs-block-posts-layout-horizontal-type-1 cs-display-column cs-posts-area__image-width-one-half-more\">\n\t\t\t\t\t\n<article class=\"post-273 post type-post status-publish format-gallery has-post-thumbnail category-cloud-security post_format-post-format-gallery cs-entry cs-video-wrap\">\n\t<div class=\"cs-entry__outer\">\n\t\t\t\t<div class=\"cs-entry__inner cs-entry__thumbnail cs-entry__overlay cs-overlay-ratio cs-ratio-landscape-3-2\">\n\t\t\t<div class=\"cs-overlay-background cs-overlay-transparent\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1160\" height=\"725\" src=\"https:\/\/nootherjake.com\/blog\/wp-content\/uploads\/2020\/02\/hashing-salting-How-to-store-passwords-securely-PBKDF2-1160x725.png\" class=\"attachment-csco-large-uncropped size-csco-large-uncropped wp-post-image\" alt=\"hashing-salting-How-to-store-passwords-securely-PBKDF2\" srcset=\"https:\/\/nootherjake.com\/blog\/wp-content\/uploads\/2020\/02\/hashing-salting-How-to-store-passwords-securely-PBKDF2-1160x725.png 1160w, https:\/\/nootherjake.com\/blog\/wp-content\/uploads\/2020\/02\/hashing-salting-How-to-store-passwords-securely-PBKDF2-300x188.png 300w, https:\/\/nootherjake.com\/blog\/wp-content\/uploads\/2020\/02\/hashing-salting-How-to-store-passwords-securely-PBKDF2-1024x640.png 1024w, https:\/\/nootherjake.com\/blog\/wp-content\/uploads\/2020\/02\/hashing-salting-How-to-store-passwords-securely-PBKDF2-768x480.png 768w, https:\/\/nootherjake.com\/blog\/wp-content\/uploads\/2020\/02\/hashing-salting-How-to-store-passwords-securely-PBKDF2-1536x960.png 1536w, https:\/\/nootherjake.com\/blog\/wp-content\/uploads\/2020\/02\/hashing-salting-How-to-store-passwords-securely-PBKDF2-2048x1280.png 2048w, https:\/\/nootherjake.com\/blog\/wp-content\/uploads\/2020\/02\/hashing-salting-How-to-store-passwords-securely-PBKDF2-380x238.png 380w, https:\/\/nootherjake.com\/blog\/wp-content\/uploads\/2020\/02\/hashing-salting-How-to-store-passwords-securely-PBKDF2-800x500.png 800w, https:\/\/nootherjake.com\/blog\/wp-content\/uploads\/2020\/02\/hashing-salting-How-to-store-passwords-securely-PBKDF2.png 3360w\" sizes=\"auto, (max-width: 1160px) 100vw, 1160px\" \/>\n\t\t\t\t\n\t\t\t\t\t\t\t<span class=\"cs-entry-format\">\n\t\t\t\t<a class=\"cs-format-icon cs-format-gallery\" href=\"https:\/\/nootherjake.com\/blog\/how-to-store-passwords-securely-with-pbkdf2\/\">\n\t\t\t\t\t<span class=\"cs-format-count\">5<\/span>\t\t\t\t<\/a>\n\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\n\t\t\t<a class=\"cs-overlay-link\" href=\"https:\/\/nootherjake.com\/blog\/how-to-store-passwords-securely-with-pbkdf2\/\"><\/a>\n\t\t<\/div>\n\t\t\n\t\t<div class=\"cs-entry__inner cs-entry__content\">\n\t\t\t<div class=\"cs-entry__content-inner\">\n\t\t\t\t<div class=\"cs-entry__post-meta\" ><div class=\"cs-meta-category\"><ul class=\"post-categories\">\n\t<li><a href=\"https:\/\/nootherjake.com\/blog\/category\/cloud-security\/\" rel=\"category tag\">Cloud Security<\/a><\/li><\/ul><\/div><\/div>\t\t\t\t<a href=\"https:\/\/nootherjake.com\/blog\/how-to-store-passwords-securely-with-pbkdf2\/\" class=\"cs-entry__title-wrapper\">\n\t\t\t\t\t<span class=\"cs-entry__title-effect\">\n\t\t\t\t\t\t\t<h2 class=\"cs-entry__title \">\n\t\tHow to store passwords securely with PBKDF2\t<\/h2>\n\t\t\t\t<p class=\"cs-entry__excerpt\">\n\t\t\t\tHow to store passwords securely with PBKDF2\t\t\t<\/p>\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"cs-entry__post-meta\" ><div class=\"cs-meta-author\"><span class=\"cs-by\">by<\/span><a class=\"cs-meta-author-inner url fn n\" href=\"https:\/\/nootherjake.com\/blog\/author\/fxmafia\/\" title=\"View all posts by Jake Adebayo\"><span class=\"cs-author\">Jake Adebayo<\/span><\/a><\/div><div class=\"cs-meta-date\">February 20, 2020<\/div><div class=\"cs-meta-reading-time\"><span class=\"cs-meta-icon\"><i class=\"cs-icon cs-icon-clock\"><\/i><\/span>6 minute read<\/div><\/div>\t\t<\/div>\n\t<\/div>\n<\/article>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t<\/div>\n\t\t<\/div>\n<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\n\t\r\n\r\n\t<div class=\"cnvs-block-section cnvs-block-section-1603903618719 cnvs-block-section-layout-full cnvs-block-section-fullwidth\" >\n\t\t<div class=\"cnvs-block-section-outer\" style=\"\">\n\t\t\t<div class=\"cnvs-block-section-inner\">\n\t\t\t\t\r\n\r\n\n<div class=\"cnvs-block-section-content cnvs-block-section-content-1603903621006\" >\n\t<div class=\"cnvs-block-section-content-inner\">\n\t\t\r\n\r\n\n<div class=\"cnvs-block-row cnvs-block-row-1603903637348 cnvs-block-row-columns-2\" >\n\t<div class=\"cnvs-block-row-inner\">\n\t\t\r\n\r\n\n<div class=\"cnvs-block-column cnvs-block-column-1603903637510\" >\n\t<div class=\"cnvs-block-column-inner\">\n\t\t<div>\n\t\t\t\r\n\r\n\r\n<h5 id=\"graphic-design\" class=\"wp-block-heading\"><strong>Graphic Design<\/strong><\/h5>\r\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\r\n\r\n\n<div class=\"cnvs-block-column cnvs-block-column-1603903637539\" >\n\t<div class=\"cnvs-block-column-inner\">\n\t\t<div>\n\t\t\t\r\n\r\n<div class=\"cnvs-block-custom-link cnvs-block-custom-link-1603903730501 has-text-align-right\">\n\t<a class=\"cs-custom-link\" target=\"_self\" href=\"\/\">\n\t\tView All\t<\/a>\n<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\t<\/div>\n<\/div>\n\r\n\r\n\t<\/div>\n<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\n\t\r\n\r\n\t<div class=\"cnvs-block-section cnvs-block-section-1603904261646 cnvs-block-section-layout-full cnvs-block-section-fullwidth\" >\n\t\t<div class=\"cnvs-block-section-outer\" style=\"\">\n\t\t\t<div class=\"cnvs-block-section-inner\">\n\t\t\t\t\r\n\r\n\n<div class=\"cnvs-block-section-content cnvs-block-section-content-1603904261603\" >\n\t<div class=\"cnvs-block-section-content-inner\">\n\t\t\r\n\r\n\n<div class=\"cnvs-block-row cnvs-block-row-1603904261393 cnvs-block-row-columns-2\" >\n\t<div class=\"cnvs-block-row-inner\">\n\t\t\r\n\r\n\n<div class=\"cnvs-block-column cnvs-block-column-1603904261079\" >\n\t<div class=\"cnvs-block-column-inner\">\n\t\t<div>\n\t\t\t\r\n\r\n\r\n<h5 id=\"typography\" class=\"wp-block-heading\"><strong>Typography<\/strong><\/h5>\r\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\r\n\r\n\n<div class=\"cnvs-block-column cnvs-block-column-1603904261275\" >\n\t<div class=\"cnvs-block-column-inner\">\n\t\t<div>\n\t\t\t\r\n\r\n<div class=\"cnvs-block-custom-link cnvs-block-custom-link-1603904261168 has-text-align-right\">\n\t<a class=\"cs-custom-link\" target=\"_self\" href=\"\/\">\n\t\tView All\t<\/a>\n<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\t<\/div>\n<\/div>\n\r\n\r\n\t<\/div>\n<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\n\t\r\n\r\n\t<div class=\"cnvs-block-section cnvs-block-section-1603904356812 cnvs-block-section-layout-full cnvs-block-section-fullwidth\" >\n\t\t<div class=\"cnvs-block-section-outer\" style=\"\">\n\t\t\t<div class=\"cnvs-block-section-inner\">\n\t\t\t\t\r\n\r\n\n<div class=\"cnvs-block-section-content cnvs-block-section-content-1603904356769\" >\n\t<div class=\"cnvs-block-section-content-inner\">\n\t\t\r\n\r\n\n<div class=\"cnvs-block-row cnvs-block-row-1603904356705 cnvs-block-row-columns-2\" >\n\t<div class=\"cnvs-block-row-inner\">\n\t\t\r\n\r\n\n<div class=\"cnvs-block-column cnvs-block-column-1603904356597\" >\n\t<div class=\"cnvs-block-column-inner\">\n\t\t<div>\n\t\t\t\r\n\r\n\r\n<h5 id=\"illustration\" class=\"wp-block-heading\"><strong>Illustration<\/strong><\/h5>\r\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\r\n\r\n\n<div class=\"cnvs-block-column cnvs-block-column-1603904356667\" >\n\t<div class=\"cnvs-block-column-inner\">\n\t\t<div>\n\t\t\t\r\n\r\n<div class=\"cnvs-block-custom-link cnvs-block-custom-link-1603904356640 has-text-align-right\">\n\t<a class=\"cs-custom-link\" target=\"_self\" href=\"\/\">\n\t\tView All\t<\/a>\n<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\t<\/div>\n<\/div>\n\r\n\r\n\t<\/div>\n<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\n\t\r\n\r\n\t<div class=\"cnvs-block-section cnvs-block-section-1603904549499 cnvs-block-section-layout-full cnvs-block-section-fullwidth\" >\n\t\t<div class=\"cnvs-block-section-outer\" style=\"\">\n\t\t\t<div class=\"cnvs-block-section-inner\">\n\t\t\t\t\r\n\r\n\n<div class=\"cnvs-block-section-content cnvs-block-section-content-1603904551086\" >\n\t<div class=\"cnvs-block-section-content-inner\">\n\t\t\r\n\r\n\t<\/div>\n<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\n\t\r\n\r\n\t<div class=\"cnvs-block-section cnvs-block-section-1603904715708 cnvs-block-section-layout-full cnvs-block-section-fullwidth\" >\n\t\t<div class=\"cnvs-block-section-outer\" style=\"\">\n\t\t\t<div class=\"cnvs-block-section-inner\">\n\t\t\t\t\r\n\r\n\n<div class=\"cnvs-block-section-content cnvs-block-section-content-1603904715682\" >\n\t<div class=\"cnvs-block-section-content-inner\">\n\t\t\r\n\r\n\n<div class=\"cnvs-block-row cnvs-block-row-1603904715636 cnvs-block-row-columns-2\" >\n\t<div class=\"cnvs-block-row-inner\">\n\t\t\r\n\r\n\n<div class=\"cnvs-block-column cnvs-block-column-1603904715521\" >\n\t<div class=\"cnvs-block-column-inner\">\n\t\t<div>\n\t\t\t\r\n\r\n\r\n<h5 id=\"news-feed\" class=\"wp-block-heading\"><strong>News Feed<\/strong><\/h5>\r\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\r\n\r\n\n<div class=\"cnvs-block-column cnvs-block-column-1603904715602\" >\n\t<div class=\"cnvs-block-column-inner\">\n\t\t<div>\n\t\t\t\r\n\r\n<div class=\"cnvs-block-custom-link cnvs-block-custom-link-1603904715572 has-text-align-right\">\n\t<a class=\"cs-custom-link\" target=\"_self\" href=\"\/\">\n\t\tView All\t<\/a>\n<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\t<\/div>\n<\/div>\n\r\n\r\n\t<\/div>\n<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\n\t\r\n\r\n\t<div class=\"cnvs-block-section cnvs-block-section-1603904798249 cnvs-block-section-layout-full cnvs-block-section-fullwidth cnvs-block-section-layout-align-full\" >\n\t\t<div class=\"cnvs-block-section-outer\" style=\"\">\n\t\t\t<div class=\"cnvs-block-section-inner\">\n\t\t\t\t\r\n\r\n\n<div class=\"cnvs-block-section-content cnvs-block-section-content-1603904800764\" >\n\t<div class=\"cnvs-block-section-content-inner\">\n\t\t\r\n\r\n\n<div class=\"cnvs-block-row cnvs-block-row-1603904830139 cnvs-block-row-max-width cnvs-block-row-columns-2\" >\n\t<div class=\"cnvs-block-row-inner\">\n\t\t\r\n\r\n\n<div class=\"cnvs-block-column cnvs-block-column-1603904830434\" >\n\t<div class=\"cnvs-block-column-inner\">\n\t\t<div>\n\t\t\t\r\n\r\n\r\n<div class=\"wp-block-cover is-position-center-center is-cnvs-vert-align-bottom cnvs-block-core-cover-1603904846406\" style=\"min-height: 640px;aspect-ratio:unset;\"><img decoding=\"async\" class=\"wp-block-cover__image-background wp-image-3455\" src=\"http:\/\/blueprinttheme.com\/blueprint\/wp-content\/uploads\/sites\/2\/2020\/11\/block-background.jpg\" alt=\"\" data-object-fit=\"cover\" \/>\r\n<div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\r\n<div class=\"wp-block-group cnvs-block-width\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\r\n<div class=\"wp-block-group cs-site-subscribe__title-wrapper\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\r\n<h2 id=\"lets-work-build\" class=\"cs-site-subscribe__title wp-block-heading\" style=\"font-size: 44px;\">Let\u2019s work &amp; build<\/h2>\r\n\r\n\r\n\r\n<p class=\"cs-site-subscribe__excerpt\" style=\"font-size: 44px;\">something great together.<\/p>\r\n<\/div><\/div>\r\n\r\n\r\n\r\n<p style=\"font-size: 15px;\">Create a High Performed UI\/UX Design from a Silicon Valley.<\/p>\r\n\r\n\r\n\r\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\r\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-text-color has-background\" style=\"border-radius: 0px; background-color: #ffffff; color: #292929;\" rel=\"\/\">Find More<\/a><\/div>\r\n<\/div>\r\n<\/div><\/div>\r\n<\/div>\r\n<\/div>\r\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\r\n\r\n\n<div class=\"cnvs-block-column cnvs-block-column-1603904830461\" >\n\t<div class=\"cnvs-block-column-inner\">\n\t\t<div>\n\t\t\t\r\n\r\n\r\n<div class=\"wp-block-group cnvs-block-core-group-1603906077484\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\r\n<div class=\"wp-block-group cnvs-block-core-group-1607177787978\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\r\n<h3 id=\"blueprint\" class=\"wp-block-heading\">Blueprint<\/h3>\r\n<\/div><\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-group cnvs-block-width\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\r\n<div class=\"wp-block-group cs-site-subscribe__title-wrapper\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\r\n<h4 id=\"sign-up-for-our-newsletters\" class=\"cs-site-subscribe__title wp-block-heading\">Sign Up for Our Newsletters<\/h4>\r\n\r\n\r\n\r\n<p class=\"cs-site-subscribe__excerpt has-primary-color has-text-color\">Get notified of the best deals on our WordPress themes.<\/p>\r\n<\/div><\/div>\r\n\r\n\r\n<div class=\"cnvs-block-opt-in-form cnvs-block-opt-in-form-1603905792694 cnvs-block-opt-in-form-large\" ><\/div><\/div><\/div>\r\n<\/div><\/div>\r\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\t<\/div>\n<\/div>\n\t<\/div>\n<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\n\t\r\n\r\n\t<div class=\"cnvs-block-section cnvs-block-section-1603906487807 cnvs-block-section-layout-full cnvs-block-section-fullwidth\" >\n\t\t<div class=\"cnvs-block-section-outer\" style=\"\">\n\t\t\t<div class=\"cnvs-block-section-inner\">\n\t\t\t\t\r\n\r\n\n<div class=\"cnvs-block-section-content cnvs-block-section-content-1603906489623\" >\n\t<div class=\"cnvs-block-section-content-inner\">\n\t\t\r\n\r\n\n<div class=\"cnvs-block-row cnvs-block-row-1603906523989 cnvs-block-row-columns-6\" >\n\t<div class=\"cnvs-block-row-inner\">\n\t\t\r\n\r\n\n<div class=\"cnvs-block-column cnvs-block-column-1603906524583\" >\n\t<div class=\"cnvs-block-column-inner\">\n\t\t<div>\n\t\t\t\r\n\r\n\r\n<div class=\"wp-block-image cnvs-block-core-image-1606408528042\">\r\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3464\" src=\"https:\/\/blueprinttheme.com\/blueprint\/wp-content\/uploads\/sites\/2\/2020\/11\/brand-logo-1@2x.png\" alt=\"\" width=\"165\" height=\"41\" \/><\/figure>\r\n<\/div>\r\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\r\n\r\n\n<div class=\"cnvs-block-column cnvs-block-column-1603906524628\" >\n\t<div class=\"cnvs-block-column-inner\">\n\t\t<div>\n\t\t\t\r\n\r\n\r\n<div class=\"wp-block-image\">\r\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3469\" src=\"https:\/\/blueprinttheme.com\/blueprint\/wp-content\/uploads\/sites\/2\/2020\/11\/brand-logo-2@2x.png\" alt=\"\" width=\"125\" height=\"49\" \/><\/figure>\r\n<\/div>\r\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\r\n\r\n\n<div class=\"cnvs-block-column cnvs-block-column-1603906534457\" >\n\t<div class=\"cnvs-block-column-inner\">\n\t\t<div>\n\t\t\t\r\n\r\n\r\n<div class=\"wp-block-image\">\r\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3470\" src=\"https:\/\/blueprinttheme.com\/blueprint\/wp-content\/uploads\/sites\/2\/2020\/11\/brand-logo-3@2x.png\" alt=\"\" width=\"175\" height=\"52\" \/><\/figure>\r\n<\/div>\r\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\r\n\r\n\n<div class=\"cnvs-block-column cnvs-block-column-1603906535513\" >\n\t<div class=\"cnvs-block-column-inner\">\n\t\t<div>\n\t\t\t\r\n\r\n\r\n<div class=\"wp-block-image\">\r\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3467\" src=\"https:\/\/blueprinttheme.com\/blueprint\/wp-content\/uploads\/sites\/2\/2020\/11\/brand-logo-6@2x.png\" alt=\"\" width=\"153\" height=\"59\" \/><\/figure>\r\n<\/div>\r\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\r\n\r\n\n<div class=\"cnvs-block-column cnvs-block-column-1603906536256\" >\n\t<div class=\"cnvs-block-column-inner\">\n\t\t<div>\n\t\t\t\r\n\r\n\r\n<div class=\"wp-block-image\">\r\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3468\" src=\"https:\/\/blueprinttheme.com\/blueprint\/wp-content\/uploads\/sites\/2\/2020\/11\/brand-logo-4@2x.png\" alt=\"\" width=\"190\" height=\"60\" \/><\/figure>\r\n<\/div>\r\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\r\n\r\n\n<div class=\"cnvs-block-column cnvs-block-column-1603906537095\" >\n\t<div class=\"cnvs-block-column-inner\">\n\t\t<div>\n\t\t\t\r\n\r\n\r\n<div class=\"wp-block-image\">\r\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3471\" src=\"https:\/\/blueprinttheme.com\/blueprint\/wp-content\/uploads\/sites\/2\/2020\/11\/brand-logo-5@2x.png\" alt=\"\" width=\"99\" height=\"54\" \/><\/figure>\r\n<\/div>\r\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\t<\/div>\n<\/div>\n\t<\/div>\n<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\n\t","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-canvas-fullwidth.php","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"csco_singular_sidebar":"default","csco_page_header_type":"none","csco_page_load_nextpost":"","csco_post_video_location":[],"csco_post_video_url":"","csco_post_video_bg_start_time":0,"csco_post_video_bg_end_time":0,"footnotes":""},"class_list":{"0":"post-3132","1":"page","2":"type-page","3":"status-publish","5":"cs-entry","6":"cs-video-wrap"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/nootherjake.com\/blog\/wp-json\/wp\/v2\/pages\/3132","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nootherjake.com\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/nootherjake.com\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/nootherjake.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nootherjake.com\/blog\/wp-json\/wp\/v2\/comments?post=3132"}],"version-history":[{"count":1,"href":"https:\/\/nootherjake.com\/blog\/wp-json\/wp\/v2\/pages\/3132\/revisions"}],"predecessor-version":[{"id":4431,"href":"https:\/\/nootherjake.com\/blog\/wp-json\/wp\/v2\/pages\/3132\/revisions\/4431"}],"wp:attachment":[{"href":"https:\/\/nootherjake.com\/blog\/wp-json\/wp\/v2\/media?parent=3132"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}