{"id":15,"date":"2025-09-21T04:49:23","date_gmt":"2025-09-21T04:49:23","guid":{"rendered":"https:\/\/defgram.com\/PRODUCTION\/faq\/"},"modified":"2025-10-24T20:34:02","modified_gmt":"2025-10-24T20:34:02","slug":"faq","status":"publish","type":"page","link":"https:\/\/defgram.com\/PRODUCTION\/faq\/","title":{"rendered":"FAQ"},"content":{"rendered":"\n<div class=\"wp-block-group alignfull has-background-background-color has-background is-layout-constrained wp-container-core-group-is-layout-7276a2bb wp-block-group-is-layout-constrained\" id=\"faq\" style=\"border-top-width:1px;margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--60);padding-right:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--60);padding-left:var(--wp--preset--spacing--30)\">\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-714d85e9 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<h2 class=\"wp-block-heading has-large-font-size\">Cyber Warfare Insights<\/h2>\n\n\n\n<p style=\"margin-top:16px\">Explore our FAQ section for clear, concise answers to your questions about military cyber operations and digital battlefield dynamics.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"border-bottom-width:1px;padding-bottom:var(--wp--preset--spacing--30)\">\n<h4 class=\"wp-block-heading has-medium-font-size\">What types of cyber threats are covered on Defgram.com?<\/h4>\n\n\n\n<p class=\"has-small-font-size\" style=\"margin-top:12px\">We focus on global cyber events impacting military networks, including hacking, electronic warfare, and communication security.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"border-bottom-width:1px;margin-top:0;padding-top:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30)\">\n<h4 class=\"wp-block-heading has-medium-font-size\">How frequently is the cyber events heatmap updated?<\/h4>\n\n\n\n<p class=\"has-small-font-size\" style=\"margin-top:12px\">Our global heatmap refreshes in real-time to reflect the latest cyber activities across military domains worldwide.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"border-bottom-width:1px;margin-top:0;padding-top:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30)\">\n<h4 class=\"wp-block-heading has-medium-font-size\">Can I contribute articles or insights to Defgram.com?<\/h4>\n\n\n\n<p class=\"has-small-font-size\" style=\"margin-top:12px\">Yes, we welcome expert submissions that provide tactical analysis or news related to cyberspace military operations.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"border-bottom-width:1px;margin-top:0;padding-top:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30)\">\n<h4 class=\"wp-block-heading has-medium-font-size\">Does Defgram.com cover only offensive cyber tactics?<\/h4>\n\n\n\n<p class=\"has-small-font-size\" style=\"margin-top:12px\">No, we provide balanced coverage including defensive strategies, communications tech, and battlefield network innovations.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"wp-block-group alignfull has-tertiary-background-color has-background is-layout-constrained wp-container-core-group-is-layout-7276a2bb wp-block-group-is-layout-constrained\" id=\"resources\" style=\"border-top-width:1px;margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--60);padding-right:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--60);padding-left:var(--wp--preset--spacing--30)\">\n<div class=\"wp-block-group alignwide is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group alignwide is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-8b4c372c wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading\" style=\"margin-top:12px\">Global Cyber Threat Monitoring<\/h2>\n\n\n\n<p class=\"has-medium-font-size\" style=\"margin-top:16px\">Discover vital tools and insights tailored to military cyber operations and analysis.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-a88a3fd8 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-stretch is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-layout-constrained wp-container-core-group-is-layout-80fb368b wp-block-group-is-layout-constrained\" style=\"border-width:1px;min-height:100%;padding-top:var(--wp--preset--spacing--30);padding-right:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--30)\">\n<h3 class=\"wp-block-heading\" style=\"font-size:clamp(0.984rem, 0.984rem + ((1vw - 0.2rem) * 0.938), 1.5rem);line-height:1.5\">Cybersecurity Fundamentals<\/h3>\n\n\n\n<p class=\"has-small-font-size\" style=\"margin-top:8px\">Understand the core principles that govern cyber warfare and defense tactics.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-small-font-size has-custom-font-size wp-element-button\" href=\"#extendify-kb-resource-1\">Explore Details<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-layout-constrained wp-container-core-group-is-layout-80fb368b wp-block-group-is-layout-constrained\" style=\"border-width:1px;min-height:100%;padding-top:var(--wp--preset--spacing--30);padding-right:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--30)\">\n<h3 class=\"wp-block-heading\" style=\"font-size:clamp(0.984rem, 0.984rem + ((1vw - 0.2rem) * 0.938), 1.5rem);line-height:1.5\">Battlefield Network Insights<\/h3>\n\n\n\n<p class=\"has-small-font-size\" style=\"margin-top:8px\">Gain knowledge of cutting-edge communication strategies on digital battlefields.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-small-font-size has-custom-font-size wp-element-button\" href=\"#extendify-kb-resource-2\">Explore Details<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-layout-constrained wp-container-core-group-is-layout-80fb368b wp-block-group-is-layout-constrained\" style=\"border-width:1px;min-height:100%;padding-top:var(--wp--preset--spacing--30);padding-right:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--30)\">\n<h3 class=\"wp-block-heading\" style=\"font-size:clamp(0.984rem, 0.984rem + ((1vw - 0.2rem) * 0.938), 1.5rem);line-height:1.5\">Cyber Event Analysis<\/h3>\n\n\n\n<p class=\"has-small-font-size\" style=\"margin-top:8px\">Dive into comprehensive reviews of recent global military cyber incidents.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-small-font-size has-custom-font-size wp-element-button\" href=\"#extendify-kb-resource-3\">Explore Details<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"wp-block-group alignfull has-background-background-color has-background is-layout-constrained wp-container-core-group-is-layout-fb85e995 wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--60);padding-right:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--60);padding-left:var(--wp--preset--spacing--30)\">\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-08c01c1c wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group alignwide is-content-justification-center is-layout-constrained wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading has-large-font-size\">Trusted Source for Military Cyber Intelligence<\/h2>\n\n\n\n<p style=\"margin-top:16px\">Showcasing our dedication to accurate, up-to-date military cyber news verified by expert analysts and global cybersecurity partnerships. Our platform stands for authenticity and informed insights.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--40)\">\n<div class=\"wp-block-button is-style-fill\"><a class=\"wp-block-button__link wp-element-button\" href=\"#extendify-trust-badges-cta\">Discover Insights<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-layout-constrained wp-container-core-group-is-layout-f90d3be4 wp-block-group-is-layout-constrained\" style=\"border-width:1px;padding-top:var(--wp--preset--spacing--40);padding-right:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--40);padding-left:var(--wp--preset--spacing--30)\">\n<div class=\"wp-block-group is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-23441af8 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group has-background-background-color has-background wp-container-content-487bf011 is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-cf138b5d wp-block-group-is-layout-flex\" style=\"border-width:1px;border-radius:100px;min-height:96px;padding-top:var(--wp--preset--spacing--20);padding-right:var(--wp--preset--spacing--20);padding-bottom:var(--wp--preset--spacing--20);padding-left:var(--wp--preset--spacing--20)\">\n<figure class=\"wp-block-image aligncenter size-large wp-duotone-varpresetduotonesecondary-and-primary-1\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\"\/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\" style=\"margin-top:var(--wp--preset--spacing--30);font-size:clamp(0.875rem, 0.875rem + ((1vw - 0.2rem) * 0.682), 1.25rem);\">Certified Cybersecurity Reporting<\/h3>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-layout-constrained wp-container-core-group-is-layout-f90d3be4 wp-block-group-is-layout-constrained\" style=\"border-width:1px;padding-top:var(--wp--preset--spacing--40);padding-right:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--40);padding-left:var(--wp--preset--spacing--30)\">\n<div class=\"wp-block-group is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-23441af8 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group has-background-background-color has-background wp-container-content-487bf011 is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-cf138b5d wp-block-group-is-layout-flex\" style=\"border-width:1px;border-radius:100px;min-height:96px;padding-top:var(--wp--preset--spacing--20);padding-right:var(--wp--preset--spacing--20);padding-bottom:var(--wp--preset--spacing--20);padding-left:var(--wp--preset--spacing--20)\">\n<figure class=\"wp-block-image aligncenter size-large wp-duotone-varpresetduotonesecondary-and-primary-2\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIGhlaWdodD0iNDhweCIgdmlld0JveD0iMCAtOTYwIDk2MCA5NjAiIHdpZHRoPSI0OHB4IiBmaWxsPSIjMWUxZTFlIj48cGF0aCBkPSJtNDM2LTM0NyAyMjgtMjI4LTQyLTQxLTE4MyAxODMtMTAxLTEwMS00NCA0NCAxNDIgMTQzWm00NCAyNjZxLTE0MC0zNS0yMzAtMTYyLjVUMTYwLTUyM3YtMjM4bDMyMC0xMjAgMzIwIDEyMHYyMzhxMCAxNTItOTAgMjc5LjVUNDgwLTgxWm0wLTYycTExNS0zOCAxODcuNS0xNDMuNVQ3NDAtNTIzdi0xOTZsLTI2MC05OC0yNjAgOTh2MTk2cTAgMTMxIDcyLjUgMjM2LjVUNDgwLTE0M1ptMC0zMzdaIi8+PC9zdmc+\" alt=\"\"\/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\" style=\"margin-top:var(--wp--preset--spacing--30);font-size:clamp(0.875rem, 0.875rem + ((1vw - 0.2rem) * 0.682), 1.25rem);\">Global Military Network Access<\/h3>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-layout-constrained wp-container-core-group-is-layout-f90d3be4 wp-block-group-is-layout-constrained\" style=\"border-width:1px;padding-top:var(--wp--preset--spacing--40);padding-right:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--40);padding-left:var(--wp--preset--spacing--30)\">\n<div class=\"wp-block-group is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-23441af8 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group has-background-background-color has-background wp-container-content-487bf011 is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-cf138b5d wp-block-group-is-layout-flex\" style=\"border-width:1px;border-radius:100px;min-height:96px;padding-top:var(--wp--preset--spacing--20);padding-right:var(--wp--preset--spacing--20);padding-bottom:var(--wp--preset--spacing--20);padding-left:var(--wp--preset--spacing--20)\">\n<figure class=\"wp-block-image aligncenter size-large wp-duotone-varpresetduotonesecondary-and-primary-3\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\"\/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\" style=\"margin-top:var(--wp--preset--spacing--30);font-size:clamp(0.875rem, 0.875rem + ((1vw - 0.2rem) * 0.682), 1.25rem);\">Real-Time Cyber Event Mapping<\/h3>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-layout-constrained wp-container-core-group-is-layout-f90d3be4 wp-block-group-is-layout-constrained\" style=\"border-width:1px;padding-top:var(--wp--preset--spacing--40);padding-right:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--40);padding-left:var(--wp--preset--spacing--30)\">\n<div class=\"wp-block-group is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-23441af8 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group has-background-background-color has-background wp-container-content-487bf011 is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-cf138b5d wp-block-group-is-layout-flex\" style=\"border-width:1px;border-radius:100px;min-height:96px;padding-top:var(--wp--preset--spacing--20);padding-right:var(--wp--preset--spacing--20);padding-bottom:var(--wp--preset--spacing--20);padding-left:var(--wp--preset--spacing--20)\">\n<figure class=\"wp-block-image aligncenter size-large wp-duotone-varpresetduotonesecondary-and-primary-4\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIGhlaWdodD0iNDhweCIgdmlld0JveD0iMCAtOTYwIDk2MCA5NjAiIHdpZHRoPSI0OHB4IiBmaWxsPSIjMWUxZTFlIj48cGF0aCBkPSJtMzIzLTI0NSAxNTctOTQgMTU3IDk1LTQyLTE3OCAxMzgtMTIwLTE4Mi0xNi03MS0xNjgtNzEgMTY3LTE4MiAxNiAxMzggMTIwLTQyIDE3OFptLTkwIDEyNSA2NS0yODFMODAtNTkwbDI4OC0yNSAxMTItMjY1IDExMiAyNjUgMjg4IDI1LTIxOCAxODkgNjUgMjgxLTI0Ny0xNDktMjQ3IDE0OVptNDU3LTU2MCAyMS04OS03MS01OSA5NC04IDM2LTg0IDM2IDg0IDk0IDgtNzEgNTkgMjEgODktODAtNDctODAgNDdaTTQ4MC00ODVaIi8+PC9zdmc+\" alt=\"\"\/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\" style=\"margin-top:var(--wp--preset--spacing--30);font-size:clamp(0.875rem, 0.875rem + ((1vw - 0.2rem) * 0.682), 1.25rem);\">Expert Tactical Analysis<\/h3>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Warfare Insights Explore our FAQ section for clear, concise answers to your questions about military cyber operations and digital battlefield dynamics. What types of cyber threats are covered on Defgram.com? We focus on global cyber events impacting military networks, including hacking, electronic warfare, and communication security. How frequently is the cyber events heatmap updated? [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-with-title","meta":{"footnotes":""},"class_list":["post-15","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/defgram.com\/PRODUCTION\/wp-json\/wp\/v2\/pages\/15","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/defgram.com\/PRODUCTION\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/defgram.com\/PRODUCTION\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/defgram.com\/PRODUCTION\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/defgram.com\/PRODUCTION\/wp-json\/wp\/v2\/comments?post=15"}],"version-history":[{"count":1,"href":"https:\/\/defgram.com\/PRODUCTION\/wp-json\/wp\/v2\/pages\/15\/revisions"}],"predecessor-version":[{"id":38,"href":"https:\/\/defgram.com\/PRODUCTION\/wp-json\/wp\/v2\/pages\/15\/revisions\/38"}],"wp:attachment":[{"href":"https:\/\/defgram.com\/PRODUCTION\/wp-json\/wp\/v2\/media?parent=15"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}