{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.3,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"cybersecurity-insiders.com","crawled_at":"2026-03-20T21:07:05.458695Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":57121,"rendered_text_length":57121,"ghost_ratio":0,"rendering_type":"SSR","word_count":2797,"li_count":61,"tr_count":0,"th_count":0,"structure_score":2.180000066757202,"has_org_schema":true,"has_product_schema":false,"schema_count":1,"tech_stack":"wordpress","server_header":"cloudflare","cdn":"cloudflare","http_status":200,"load_time_ms":1774,"total_html_bytes":545687,"useful_text_bytes":57121,"token_bloat_ratio":9.600000381469727,"images_total":60,"images_with_alt":59,"multimodal_pct":98,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":256482,"has_breadcrumb_schema":true,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":true,"page_title":"Cybersecurity Insiders, Independent CISO Research \u0026 Insights","meta_description":"Stay ahead in cybersecurity with insights on cyber attacks, data breaches, identity fraud, insider threats, news, reports, webinars, and security resources.","logo_url":"https://www.cybersecurity-insiders.com/wp-content/uploads/2016/06/cyberinsider-fav.png","crawl_blocked":false,"ai_readiness_score":75,"sub_bot_access":100,"sub_rendering":100,"sub_structure":27,"sub_schema":42,"sub_tech_stack":85,"extractability_score":54,"crawl_cost_score":85,"crawl_cost_label":"High","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":56,"acri_extractability":83,"acri_semantic_structure":43,"acri_content_integrity":68,"acri_retrieval_robustness":31,"acri_grade":"C","h1_text":"Cybersecurity Insiders","tranco_rank":190128,"category":"infrastructure","title_length":60,"meta_desc_length":156,"has_canonical":true,"canonical_url":"https://www.cybersecurity-insiders.com/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":0,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en-US","og_title":"News","og_description":"Stay ahead in cybersecurity with insights on cyber attacks, data breaches, identity fraud, insider threats, news, reports, webinars, and security resources.","og_image":"https://www.cybersecurity-insiders.com/wp-content/uploads/default-cybersecurity-insiders-image.jpg","twitter_card":"summary_large_image","ttfb_ms":1774,"dom_node_count":1292,"html_payload_kb":532.9,"has_hsts":false,"has_csp":false,"cf_cache_status":"HIT","sitemap_declared":true,"sitemap_url":"https://www.cybersecurity-insiders.com/sitemap_index.xml","internal_links":266,"external_links":10,"tracker_scripts":0,"tracker_token_pct":0,"global_score":72,"seo_pillar":75,"geo_pillar":80,"perf_pillar":42,"arch_pillar":83,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":240893,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":4,"llm_analyzed":true,"llm_analyzed_at":"2026-03-09T19:46:18.332129Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"Cybersecurity Insiders provides trusted insights to empower CISOs with actionable intelligence for strategic decision-making in cybersecurity.","target_audience":"Chief Information Security Officers (CISOs), cybersecurity leaders, and professionals involved in strategic cybersecurity planning.","pricing_model":"SEMANTIC VOID","integration_partners":[],"compliance_standards":[],"competitive_moat":"Decade of research and a global network of 600,000+ cybersecurity professionals providing actionable intelligence.","content_depth_score":7,"programmatic_seo_signals":["TOPICS: ZERO TRUST SASE RANSOMWARE AI SECURITY INSIDER THREAT QUANTUM OT/IoT SUPPLY CHAIN CLOUD","RELATED ARTICLES","MOST POPULAR","NEW REPORTS","EDITOR PICKS","POPULAR POSTS","RECENT POSTS"],"key_pain_points":["Lack of actionable intelligence for strategic decision-making","Need for expert guidance in navigating emerging threats","Difficulty evaluating new technologies"]}},"percentile":81,"similar_domains":[{"domain":"editors.ca","acri_score":81,"ai_readiness_score":90,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":6.400000095367432,"schema_count":1,"distance":4.710000085830688,"page_title":"Editors Canada","h1_text":"Registration for the 2026 Editors Canada conference is now open!"},{"domain":"tvseriesfinale.com","acri_score":81,"ai_readiness_score":90,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":6.199999809265137,"schema_count":1,"distance":4.770000171661377,"page_title":"Canceled TV shows HQ - TV Series Finale","h1_text":""},{"domain":"nordicwelfare.org","acri_score":81,"ai_readiness_score":90,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":4.800000190734863,"schema_count":1,"distance":5.190000057220459,"page_title":"Nordens välfärdscenter","h1_text":"Nordiskt samarbete inom välfärdsområdet"},{"domain":"tellter.com","acri_score":81,"ai_readiness_score":90,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":4.599999904632568,"schema_count":1,"distance":5.250000143051148,"page_title":"Tellter | Building the Future, One Startup at a Time","h1_text":"Let’s start a project together!"},{"domain":"w7.rajapaito.autos","acri_score":81,"ai_readiness_score":84,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":4.400000095367432,"schema_count":5,"distance":7.310000085830689,"page_title":"Rajapaito Aplikasi Paito Warna Lengkap","h1_text":"Rajapaito Aplikasi Paito Warna Lengkap"}]}
