{"id":2386,"date":"2026-03-06T06:21:58","date_gmt":"2026-03-06T06:21:58","guid":{"rendered":"https:\/\/www.newevol.io\/resources\/?p=2386"},"modified":"2026-03-06T06:30:42","modified_gmt":"2026-03-06T06:30:42","slug":"future-of-global-security-newevol","status":"publish","type":"post","link":"https:\/\/www.newevol.io\/resources\/blog\/future-of-global-security-newevol\/","title":{"rendered":"Security Is Evolving Worldwide, NewEvol Is Built for What Comes Next"},"content":{"rendered":"<p>Security operations did not suddenly fail. They outgrew the structure they were built on.<\/p>\n<p>For years, organizations layered SIEM, SOAR, analytics, and threat intelligence tools, hoping that integration would create cohesion. Instead, it often created dependency between systems that were never designed to operate as one cohesive <strong><a href=\"https:\/\/www.newevol.io\/\">cybersecurity platform<\/a><\/strong>. NewEvol was built to address this structural gap through a unified platform on a Dynamic Threat Defense operating model, designed to align detection, investigation, and response within a single coordinated system that adapts to threats in real-time.<\/p>\n<p>Detection lived in one console. Investigation moved to another. Response required manual coordination across teams and tools. That structure worked when environments were smaller and threats moved more slowly.<\/p>\n<p>That era is over.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_66_1 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title ez-toc-toggle\" style=\"cursor: pointer\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #0a0a0a;color:#0a0a0a\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #0a0a0a;color:#0a0a0a\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 eztoc-toggle-hide-by-default' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.newevol.io\/resources\/blog\/future-of-global-security-newevol\/#From_Alerts_to_Living_Incidents\" title=\"From Alerts to Living Incidents\">From Alerts to Living Incidents<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.newevol.io\/resources\/blog\/future-of-global-security-newevol\/#The_Structural_Shift_Toward_the_AI_SOC\" title=\"The Structural Shift Toward the AI SOC\">The Structural Shift Toward the AI SOC<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.newevol.io\/resources\/blog\/future-of-global-security-newevol\/#Threat_Hunting_as_an_Integrated_Discipline\" title=\"Threat Hunting as an Integrated Discipline\">Threat Hunting as an Integrated Discipline<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.newevol.io\/resources\/blog\/future-of-global-security-newevol\/#Automation_and_Incident_Response\" title=\"Automation and Incident Response\">Automation and Incident Response<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.newevol.io\/resources\/blog\/future-of-global-security-newevol\/#Data_Architecture_and_Scalable_Intelligence\" title=\"Data Architecture and Scalable Intelligence\">Data Architecture and Scalable Intelligence<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.newevol.io\/resources\/blog\/future-of-global-security-newevol\/#Looking_Beyond_2026\" title=\"Looking Beyond 2026\">Looking Beyond 2026<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"From_Alerts_to_Living_Incidents\"><\/span>From Alerts to Living Incidents<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Modern threats are not isolated events. They evolve. They test boundaries. They adapt to controls and blend into legitimate activity. What begins as a signal can quickly become lateral movement, privilege escalation, or data exfiltration.<\/p>\n<p>Yet many SOCs still operate in sequence.<\/p>\n<ul>\n<li>Alert triggers investigation.<\/li>\n<li>Investigation triggers escalation.<\/li>\n<li>Escalation triggers response.<\/li>\n<\/ul>\n<p>Each transition creates delay. Each handoff introduces friction.<\/p>\n<p>The challenge is not visibility. Organizations already operate with immense telemetry.<\/p>\n<p>The challenge is structural alignment.<\/p>\n<p>Security today requires more than tooling. It requires a cybersecurity solution capable of managing incidents as living situations rather than static notifications.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Structural_Shift_Toward_the_AI_SOC\"><\/span>The Structural Shift Toward the AI SOC<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>In 2026, the AI SOC is no longer a concept under evaluation. It is becoming the operational standard.<\/p>\n<p>NewEvol&rsquo;s Dynamic Threat Defense appraoch is structured to support this shift, aligning real-time correlation, behavioral analysis, and response coordination within a unified operating model.<\/p>\n<p>The role of AI within the SOC is not to replace analysts, but to strengthen decision-making at scale. Signals are correlated in real time. Behavioral shifts are identified as they emerge. Priorities adjust as incidents evolve.<\/p>\n<p><strong><a href=\"https:\/\/www.newevol.io\/solutions\/insider-threat-user-behavior-analytics.php\">Advanced analytics<\/a><\/strong> must sit at the center of operations, connecting detection, enrichment, investigation, and containment within a single coordinated workflow. When intelligence and human judgment operate within the same structure, responses becomes deliberate rather than reactive.<\/p>\n<p>An AI SOC is not defined by automation alone. It is defined by how effectively intelligence shapes action in real time.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Threat_Hunting_as_an_Integrated_Discipline\"><\/span>Threat Hunting as an Integrated Discipline<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Threat hunting cannot remain a side activity separated from daily SOC operations.<\/p>\n<p>A <strong><a href=\"https:\/\/www.newevol.io\/solutions\/advanced-threat-detection-hunting.php\">modern threat-hunting platform<\/a><\/strong> must integrate directly with investigation and response workflows. Hunting should not require exporting data or rebuilding context in another console. It should operate inside the same operational framework that manages incidents.<\/p>\n<p>When hunting, detection, and response align structurally, proactive defense becomes consistent rather than occasional.<\/p>\n<p>A modern threat intelligence platform must also extend beyond alert enrichment. It should continuously contextualize signals as incidents unfold and inform real-time response decisions. Intelligence matters most when it influences action.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Automation_and_Incident_Response\"><\/span>Automation and Incident Response<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Automation without structure creates noise. Automation within structure creates control.<\/p>\n<p><strong><a href=\"https:\/\/www.newevol.io\/solutions\/incident-investigation-response.php\">Incident Response<\/a><\/strong> must be embedded into daily operations rather than activated as a separate stage. Automated playbooks can accelerate containment, but they must preserve investigative continuity.<\/p>\n<p>Coordinated automation reduces dwell time. It shortens containment cycles. It strengthens consistency across distributed environments.<\/p>\n<p>The goal is not speed alone. It is disciplined speed supported by structure.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Data_Architecture_and_Scalable_Intelligence\"><\/span>Data Architecture and Scalable Intelligence<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>As organizations expand across cloud, hybrid, and distributed environments, operational consistency becomes more important than tool variety.<\/p>\n<p>A unified data architecture allows teams to apply analytics at scale, reduce integration overhead, accelerate investigations, and manage total cost of ownership. More importantly, it ensures that detection, hunting, IR, and automation operate within one adaptive structure.<\/p>\n<p>Security strength is no longer defined by the number of deployed technologies. It is defined by how coherently intelligence flows across them.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Looking_Beyond_2026\"><\/span>Looking Beyond 2026<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The threat landscape will continue to accelerate. AI-assisted attacks, distributed infrastructure, and increasingly sophisticated adversaries will reshape how incidents unfold.<\/p>\n<p>Security operations must evolve accordingly.<\/p>\n<p>NewEvol reflects a broader shift toward coordinated, adaptive defense models built for this reality. This is not about adding more tools or capabilities, but about evolving the structure of security operations to meet how threats actually behave.<\/p>\n<p>Security operations should function as an integrated system capable of learning, adapting, hunting, and responding in real time.<\/p>\n<p>In 2026 and beyond, adaptability is no longer a luxury.<\/p>\n<p>It is a necessity.<\/p>\n<p>To explore Dynamic Threat Defense and the NewEvol platform, visit <a href=\"https:\/\/www.newevol.io\/\">https:\/\/www.newevol.io\/<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security operations did not suddenly fail. They outgrew the structure they were built on. For years, organizations layered SIEM, SOAR, analytics, and threat intelligence tools, hoping that integration would create cohesion. Instead, it often created dependency between systems that were never designed to operate as one cohesive cybersecurity platform. NewEvol was built to address this&hellip; <a class=\"more-link\" href=\"https:\/\/www.newevol.io\/resources\/blog\/future-of-global-security-newevol\/\">Continue reading <span class=\"screen-reader-text\">Security Is Evolving Worldwide, NewEvol Is Built for What Comes Next<\/span><\/a><\/p>\n","protected":false},"author":6,"featured_media":2387,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,9,87],"tags":[],"class_list":["post-2386","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-analytics","category-blog","category-cyber-security","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security Is Evolving Worldwide \u2013 NewEvol Is Ready for the Future<\/title>\n<meta name=\"description\" content=\"Explore how NewEvol is expanding globally with an adaptive cybersecurity platform built for real-time monitoring and coordinated response.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.newevol.io\/resources\/blog\/future-of-global-security-newevol\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Is Evolving Worldwide \u2013 NewEvol Is Ready for the Future\" \/>\n<meta property=\"og:description\" content=\"Explore how NewEvol is expanding globally with an adaptive cybersecurity platform built for real-time monitoring and coordinated response.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.newevol.io\/resources\/blog\/future-of-global-security-newevol\/\" \/>\n<meta property=\"og:site_name\" content=\"NewEvol\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NewEvolPlatform\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-06T06:21:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-06T06:30:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2026\/03\/6-march.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Krunal Medapara\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@krunalpatel17\" \/>\n<meta name=\"twitter:site\" content=\"@NewEvolPlatform\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Krunal Medapara\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.newevol.io\/resources\/blog\/future-of-global-security-newevol\/\",\"url\":\"https:\/\/www.newevol.io\/resources\/blog\/future-of-global-security-newevol\/\",\"name\":\"Security Is Evolving Worldwide \u2013 NewEvol Is Ready for the Future\",\"isPartOf\":{\"@id\":\"https:\/\/www.newevol.io\/resources\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.newevol.io\/resources\/blog\/future-of-global-security-newevol\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.newevol.io\/resources\/blog\/future-of-global-security-newevol\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2026\/03\/6-march.jpg\",\"datePublished\":\"2026-03-06T06:21:58+00:00\",\"dateModified\":\"2026-03-06T06:30:42+00:00\",\"author\":{\"@id\":\"https:\/\/www.newevol.io\/resources\/#\/schema\/person\/7929a2b0ea108d69f18541bb94a98680\"},\"description\":\"Explore how NewEvol is expanding globally with an adaptive cybersecurity platform built for real-time monitoring and coordinated response.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.newevol.io\/resources\/blog\/future-of-global-security-newevol\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.newevol.io\/resources\/blog\/future-of-global-security-newevol\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.newevol.io\/resources\/blog\/future-of-global-security-newevol\/#primaryimage\",\"url\":\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2026\/03\/6-march.jpg\",\"contentUrl\":\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2026\/03\/6-march.jpg\",\"width\":1920,\"height\":900,\"caption\":\"Cybersecurity platform\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.newevol.io\/resources\/blog\/future-of-global-security-newevol\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.newevol.io\/resources\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Is Evolving Worldwide, NewEvol Is Built for What Comes Next\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.newevol.io\/resources\/#website\",\"url\":\"https:\/\/www.newevol.io\/resources\/\",\"name\":\"NewEvol\",\"description\":\"Innovation in Motion\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.newevol.io\/resources\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.newevol.io\/resources\/#\/schema\/person\/7929a2b0ea108d69f18541bb94a98680\",\"name\":\"Krunal Medapara\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.newevol.io\/resources\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2022\/03\/krunal-mendapara-1-scaled.jpg\",\"contentUrl\":\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2022\/03\/krunal-mendapara-1-scaled.jpg\",\"caption\":\"Krunal Medapara\"},\"description\":\"Krunal Mendapara is the Chief Technology Officer, responsible for creating product roadmaps from conception to launch, driving the product vision, defining go-to-market strategy, and leading design discussions.\",\"sameAs\":[\"https:\/\/www.newevol.io\/\",\"https:\/\/x.com\/krunalpatel17\"],\"url\":\"https:\/\/www.newevol.io\/resources\/author\/krunal-medapara\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Is Evolving Worldwide \u2013 NewEvol Is Ready for the Future","description":"Explore how NewEvol is expanding globally with an adaptive cybersecurity platform built for real-time monitoring and coordinated response.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.newevol.io\/resources\/blog\/future-of-global-security-newevol\/","og_locale":"en_US","og_type":"article","og_title":"Security Is Evolving Worldwide \u2013 NewEvol Is Ready for the Future","og_description":"Explore how NewEvol is expanding globally with an adaptive cybersecurity platform built for real-time monitoring and coordinated response.","og_url":"https:\/\/www.newevol.io\/resources\/blog\/future-of-global-security-newevol\/","og_site_name":"NewEvol","article_publisher":"https:\/\/www.facebook.com\/NewEvolPlatform\/","article_published_time":"2026-03-06T06:21:58+00:00","article_modified_time":"2026-03-06T06:30:42+00:00","og_image":[{"width":1920,"height":900,"url":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2026\/03\/6-march.jpg","type":"image\/jpeg"}],"author":"Krunal Medapara","twitter_card":"summary_large_image","twitter_creator":"@krunalpatel17","twitter_site":"@NewEvolPlatform","twitter_misc":{"Written by":"Krunal Medapara","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.newevol.io\/resources\/blog\/future-of-global-security-newevol\/","url":"https:\/\/www.newevol.io\/resources\/blog\/future-of-global-security-newevol\/","name":"Security Is Evolving Worldwide \u2013 NewEvol Is Ready for the Future","isPartOf":{"@id":"https:\/\/www.newevol.io\/resources\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.newevol.io\/resources\/blog\/future-of-global-security-newevol\/#primaryimage"},"image":{"@id":"https:\/\/www.newevol.io\/resources\/blog\/future-of-global-security-newevol\/#primaryimage"},"thumbnailUrl":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2026\/03\/6-march.jpg","datePublished":"2026-03-06T06:21:58+00:00","dateModified":"2026-03-06T06:30:42+00:00","author":{"@id":"https:\/\/www.newevol.io\/resources\/#\/schema\/person\/7929a2b0ea108d69f18541bb94a98680"},"description":"Explore how NewEvol is expanding globally with an adaptive cybersecurity platform built for real-time monitoring and coordinated response.","breadcrumb":{"@id":"https:\/\/www.newevol.io\/resources\/blog\/future-of-global-security-newevol\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.newevol.io\/resources\/blog\/future-of-global-security-newevol\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.newevol.io\/resources\/blog\/future-of-global-security-newevol\/#primaryimage","url":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2026\/03\/6-march.jpg","contentUrl":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2026\/03\/6-march.jpg","width":1920,"height":900,"caption":"Cybersecurity platform"},{"@type":"BreadcrumbList","@id":"https:\/\/www.newevol.io\/resources\/blog\/future-of-global-security-newevol\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.newevol.io\/resources\/"},{"@type":"ListItem","position":2,"name":"Security Is Evolving Worldwide, NewEvol Is Built for What Comes Next"}]},{"@type":"WebSite","@id":"https:\/\/www.newevol.io\/resources\/#website","url":"https:\/\/www.newevol.io\/resources\/","name":"NewEvol","description":"Innovation in Motion","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.newevol.io\/resources\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.newevol.io\/resources\/#\/schema\/person\/7929a2b0ea108d69f18541bb94a98680","name":"Krunal Medapara","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.newevol.io\/resources\/#\/schema\/person\/image\/","url":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2022\/03\/krunal-mendapara-1-scaled.jpg","contentUrl":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2022\/03\/krunal-mendapara-1-scaled.jpg","caption":"Krunal Medapara"},"description":"Krunal Mendapara is the Chief Technology Officer, responsible for creating product roadmaps from conception to launch, driving the product vision, defining go-to-market strategy, and leading design discussions.","sameAs":["https:\/\/www.newevol.io\/","https:\/\/x.com\/krunalpatel17"],"url":"https:\/\/www.newevol.io\/resources\/author\/krunal-medapara\/"}]}},"_links":{"self":[{"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/posts\/2386","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/comments?post=2386"}],"version-history":[{"count":3,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/posts\/2386\/revisions"}],"predecessor-version":[{"id":2391,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/posts\/2386\/revisions\/2391"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/media\/2387"}],"wp:attachment":[{"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/media?parent=2386"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/categories?post=2386"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/tags?post=2386"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}