{"id":8033,"date":"2022-08-22T10:02:52","date_gmt":"2022-08-22T15:02:52","guid":{"rendered":"https:\/\/texascyber.com\/?post_type=sponsor_post&p=8033"},"modified":"2023-09-03T14:18:00","modified_gmt":"2023-09-03T19:18:00","slug":"redknight","status":"publish","type":"sponsor_post","link":"https:\/\/texascyber.org\/sponsor\/redknight\/","title":{"rendered":"RedKnight"},"content":{"rendered":"

RedKnight Specializes in IT security. Though the adage may be old, it has never been clearer that \u201cfreedom isn\u2019t free.\u201d RedKnight\u2019s mission is to provide security solutions that will work to preserve the American way of life. Our devotion to both discretion and improvement by calculated adaptation is integral as we provide innovative solutions to the Department of Defense.<\/p>\n","protected":false},"featured_media":8035,"template":"","sponsor_level":[13],"sponsored_year":[],"acf":[],"yoast_head":"\nRedKnight - Texas Cyber<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/texascyber.org\/sponsor\/redknight\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"RedKnight - Texas Cyber\" \/>\n<meta property=\"og:description\" content=\"RedKnight Specializes in IT security. Though the adage may be old, it has never been clearer that \u201cfreedom isn\u2019t free.\u201d RedKnight\u2019s mission is to provide security solutions that will work to preserve the American way of life. Our devotion to both discretion and improvement by calculated adaptation is integral as we provide innovative solutions to […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/texascyber.org\/sponsor\/redknight\/\" \/>\n<meta property=\"og:site_name\" content=\"Texas Cyber\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/texascyber\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-03T19:18:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/texascyber.org\/wp-content\/uploads\/2022\/08\/ext-750.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"483\" \/>\n\t<meta property=\"og:image:height\" content=\"342\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@texascyber\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/texascyber.org\/sponsor\/redknight\/\",\"url\":\"https:\/\/texascyber.org\/sponsor\/redknight\/\",\"name\":\"RedKnight - Texas Cyber\",\"isPartOf\":{\"@id\":\"https:\/\/texascyber.org\/#website\"},\"datePublished\":\"2022-08-22T15:02:52+00:00\",\"dateModified\":\"2023-09-03T19:18:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/texascyber.org\/sponsor\/redknight\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/texascyber.org\/sponsor\/redknight\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/texascyber.org\/sponsor\/redknight\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/texascyber.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"RedKnight\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/texascyber.org\/#website\",\"url\":\"https:\/\/texascyber.org\/\",\"name\":\"Texas Cyber\",\"description\":\"Texas Cyber Summit\",\"publisher\":{\"@id\":\"https:\/\/texascyber.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/texascyber.org\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/texascyber.org\/#organization\",\"name\":\"Texascyber\",\"url\":\"https:\/\/texascyber.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/texascyber.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/texascyber.org\/wp-content\/uploads\/2021\/03\/Cyber-Summit-Logo1-e1620316415785.png\",\"contentUrl\":\"https:\/\/texascyber.org\/wp-content\/uploads\/2021\/03\/Cyber-Summit-Logo1-e1620316415785.png\",\"width\":150,\"height\":150,\"caption\":\"Texascyber\"},\"image\":{\"@id\":\"https:\/\/texascyber.org\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/texascyber\",\"https:\/\/twitter.com\/texascyber\",\"https:\/\/www.instagram.com\/texascybersummit\/\",\"https:\/\/www.linkedin.com\/company\/texas-cyber\",\"https:\/\/www.youtube.com\/texascybersummit\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"RedKnight - Texas Cyber","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/texascyber.org\/sponsor\/redknight\/","og_locale":"en_US","og_type":"article","og_title":"RedKnight - Texas Cyber","og_description":"RedKnight Specializes in IT security. Though the adage may be old, it has never been clearer that \u201cfreedom isn\u2019t free.\u201d RedKnight\u2019s mission is to provide security solutions that will work to preserve the American way of life. Our devotion to both discretion and improvement by calculated adaptation is integral as we provide innovative solutions to […]","og_url":"https:\/\/texascyber.org\/sponsor\/redknight\/","og_site_name":"Texas Cyber","article_publisher":"https:\/\/facebook.com\/texascyber","article_modified_time":"2023-09-03T19:18:00+00:00","og_image":[{"width":483,"height":342,"url":"https:\/\/texascyber.org\/wp-content\/uploads\/2022\/08\/ext-750.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@texascyber","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/texascyber.org\/sponsor\/redknight\/","url":"https:\/\/texascyber.org\/sponsor\/redknight\/","name":"RedKnight - Texas Cyber","isPartOf":{"@id":"https:\/\/texascyber.org\/#website"},"datePublished":"2022-08-22T15:02:52+00:00","dateModified":"2023-09-03T19:18:00+00:00","breadcrumb":{"@id":"https:\/\/texascyber.org\/sponsor\/redknight\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/texascyber.org\/sponsor\/redknight\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/texascyber.org\/sponsor\/redknight\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/texascyber.org\/"},{"@type":"ListItem","position":2,"name":"RedKnight"}]},{"@type":"WebSite","@id":"https:\/\/texascyber.org\/#website","url":"https:\/\/texascyber.org\/","name":"Texas Cyber","description":"Texas Cyber Summit","publisher":{"@id":"https:\/\/texascyber.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/texascyber.org\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/texascyber.org\/#organization","name":"Texascyber","url":"https:\/\/texascyber.org\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/texascyber.org\/#\/schema\/logo\/image\/","url":"https:\/\/texascyber.org\/wp-content\/uploads\/2021\/03\/Cyber-Summit-Logo1-e1620316415785.png","contentUrl":"https:\/\/texascyber.org\/wp-content\/uploads\/2021\/03\/Cyber-Summit-Logo1-e1620316415785.png","width":150,"height":150,"caption":"Texascyber"},"image":{"@id":"https:\/\/texascyber.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/texascyber","https:\/\/twitter.com\/texascyber","https:\/\/www.instagram.com\/texascybersummit\/","https:\/\/www.linkedin.com\/company\/texas-cyber","https:\/\/www.youtube.com\/texascybersummit"]}]}},"_links":{"self":[{"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/sponsor_post\/8033"}],"collection":[{"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/sponsor_post"}],"about":[{"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/types\/sponsor_post"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/media\/8035"}],"wp:attachment":[{"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/media?parent=8033"}],"wp:term":[{"taxonomy":"sponsor_level","embeddable":true,"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/sponsor_level?post=8033"},{"taxonomy":"sponsored_year","embeddable":true,"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/sponsored_year?post=8033"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}