{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.4,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"threatpost.com","crawled_at":"2026-03-14T03:10:42.736784Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":33303,"rendered_text_length":33303,"ghost_ratio":0,"rendering_type":"SSR","word_count":1892,"li_count":113,"tr_count":0,"th_count":0,"structure_score":5.96999979019165,"has_org_schema":false,"has_product_schema":false,"schema_count":0,"tech_stack":"wordpress","server_header":"nginx","cdn":"","http_status":200,"load_time_ms":923,"total_html_bytes":152347,"useful_text_bytes":33303,"token_bloat_ratio":4.599999904632568,"images_total":61,"images_with_alt":28,"multimodal_pct":46,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":4266,"has_breadcrumb_schema":false,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":false,"page_title":"Threatpost | The first stop for security news","meta_description":"Threatpost, is an independent news site which is a leading source of information about IT and business security for hundreds of thousands of professionals worldwide.","logo_url":"https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/favicon/apple-touch-icon.png","crawl_blocked":false,"ai_readiness_score":73,"sub_bot_access":100,"sub_rendering":100,"sub_structure":45,"sub_schema":0,"sub_tech_stack":85,"extractability_score":59,"crawl_cost_score":30,"crawl_cost_label":"Low","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":54,"acri_extractability":83,"acri_semantic_structure":46,"acri_content_integrity":64,"acri_retrieval_robustness":26,"acri_grade":"D","h1_text":"Threatpost","h2_texts":"Student Loan Breach Exposes 2.5M Records | Watering Hole Attacks Push ScanBox Keylogger | Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms | Ransomware Attacks are on the Rise | Inside the Hackers’ Toolkit – Podcast | Being Prepared for Adversarial Attacks – Podcast | The State of Secrets Sprawl – Podcast | A Blockchain Primer and a Bored Ape Headscratcher – Podcast | Security Innovation: Secure Systems Start with Foundational Hardware | Securely Access Your Machines from Anywhere – Presented by Keeper Security","tranco_rank":27917,"category":"news","title_length":45,"meta_desc_length":165,"has_canonical":true,"canonical_url":"https://threatpost.com/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":63,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en","og_title":"Threatpost | The first stop for security news","og_description":"Threatpost, is an independent news site which is a leading source of information about IT and business security for hundreds of thousands of professionals worldwide.","og_image":"https://media.threatpost.com/wp-content/uploads/sites/103/2018/04/12084846/tp_twitter.png","twitter_card":"summary_large_image","ttfb_ms":923,"dom_node_count":1491,"html_payload_kb":148.8,"has_hsts":true,"has_csp":false,"sitemap_declared":false,"internal_links":231,"external_links":27,"tracker_scripts":0,"tracker_token_pct":0,"global_score":68,"seo_pillar":49,"geo_pillar":79,"perf_pillar":65,"arch_pillar":71,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":115081,"ai_trust_percentile":0,"inbound_ai_links":2,"outbound_ai_links":0,"llm_analyzed":true,"llm_analyzed_at":"2026-03-01T19:05:58.321061Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"Forcepoint offers eBooks and whitepapers focused on cloud security, Zero Trust, and Data Loss Prevention (DLP) to help organizations secure","target_audience":"IT professionals, security professionals, cybersecurity managers, and executives involved in data security and risk management.","pricing_model":"Content-based: Free eBooks and whitepapers available for download.","integration_partners":["Zero Trust Network Access"],"compliance_standards":["GDPR","DLP"],"competitive_moat":"Combination of Zero Trust principles, behavioral analytics, and a comprehensive DLP strategy, addressing complex data security challenges in a remote work environment.","content_depth_score":8,"programmatic_seo_signals":["Download eBook"],"key_pain_points":["Cloud security confusion","Lack of clarity on data security responsibilities","High alert volumes and difficulty prioritizing security events","Complexity of DLP implementation","Data breach concerns"]}},"percentile":75,"similar_domains":[{"domain":"hrnote.jp","acri_score":78,"ai_readiness_score":90,"tech_stack":"wordpress","category":"news","token_bloat_ratio":2.9000000953674316,"schema_count":1,"distance":4.609999942779541,"page_title":"HR NOTE｜人事の成長から、企業の成長を応援するメディア","h1_text":"HR NOTE｜人事の成長から、企業の成長を応援するメディア"},{"domain":"trucknews.biz","acri_score":75,"ai_readiness_score":90,"tech_stack":"wordpress","category":"news","token_bloat_ratio":4.099999904632568,"schema_count":3,"distance":4.8,"page_title":"トラックニュース","h1_text":""},{"domain":"tradingcardjournal.com","acri_score":75,"ai_readiness_score":89,"tech_stack":"wordpress","category":"news","token_bloat_ratio":8.699999809265137,"schema_count":1,"distance":4.87999997138977,"page_title":"トレーディングカードジャーナル：スポーツ・映画・アニメなどの総合トレカメディア","h1_text":""},{"domain":"gratis-sexnoveller.dk","acri_score":75,"ai_readiness_score":84,"tech_stack":"wordpress","category":"news","token_bloat_ratio":14.100000381469727,"schema_count":1,"distance":6.500000143051148,"page_title":"Gratis sexnoveller - Sexhistorier og erotiske noveller","h1_text":""},{"domain":"gamblingbaba.com","acri_score":79,"ai_readiness_score":83,"tech_stack":"wordpress","category":"news","token_bloat_ratio":8.600000381469727,"schema_count":21,"distance":7.950000143051147,"page_title":"GamblingBaba - GamblingBaba","h1_text":"Gamblingbaba.com The No-BS Guide to Online Gambling in South Africa"}]}
