{"id":998,"date":"2025-02-04T21:11:00","date_gmt":"2025-02-04T21:11:00","guid":{"rendered":"https:\/\/staging.mintcreative.com\/ideal-test\/?p=998"},"modified":"2025-07-14T08:58:38","modified_gmt":"2025-07-14T08:58:38","slug":"deepseek-r1","status":"publish","type":"post","link":"https:\/\/staging.mintcreative.com\/ideal-test\/deepseek-r1\/","title":{"rendered":"Why DeepSeek R1 is a \u2018Drop Everything Moment\u2019 for CEOs and CISOs."},"content":{"rendered":"\n<section class=\"container insight-container\">\n    <div class=\"row\">\n        <div class=\"col\">\n            <div class=\"insight-content__text-block\">\n                <p class=\"p-intro\">The launch of DeepSeek R1 has stunned Silicon Valley, launched global counter-intelligence initiatives and crashed tech shares on Wall Street. But that\u2019s not what CISOs should be worrying about.<\/p>\n<p><em>By Pax Zoega, Head of AI Readiness, Ideal.<\/em><\/p>\n            <\/div>\n        <\/div>\n    <\/div>\n<\/section>\n\n\n\n<section class=\"banner-image banner-image--s4\">\n    <div class=\"container\">\n        <div class=\"row\">\n            <div class=\"col\">\n                <div class=\"position-relative\">\n                    <img decoding=\"async\" src=\"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/06\/AI-Blog-01-AdobeStock_937938067.jpg\" alt=\"Banner Image\" class=\"img-fluid w-100\">\n                                    <\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n<\/section>\n\n\n<section class=\"container insight-container\">\n    <div class=\"row\">\n        <div class=\"col\">\n            <div class=\"insight-content__text-block\">\n                <div class=\"et_pb_module et_pb_text et_pb_text_1 et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>Barely two weeks after launch, the world\u2019s technology heads have been turned by a little-known 200 person company, DeepSeek, founded in 2023 in Hangzhou, China.<\/p>\n<p>You will undoubtedly have seen the hullabaloo in the world\u2019s media:<\/p>\n<ul>\n<li>How has it produced such a capable tool so quickly? Was it illegally trained on OpenAI\u2019s proprietary IP?<\/li>\n<\/ul>\n<ul>\n<li>Is it a Chinese trojan horse with in-built capability to steal the West\u2019s commercial secrets?<\/li>\n<\/ul>\n<ul>\n<li>If it doesn\u2019t need the West\u2019s advanced micro processing chips, what are the ramifications for companies like Nvidia, which had almost $600bn wiped off its market value \u2013 the biggest drop in US stock market history?<\/li>\n<\/ul>\n<ul>\n<li>Has DeepSeek quickly become the most popular free application on Apple\u2019s App Store across the US and UK because people are just curious to play with the next shiny new thing (like me) or is it set to unseat the likes of ChatGPT and Midjourney?<\/li>\n<\/ul>\n<p>I would argue, that as a Corporate CISO, whilst these questions are interesting, it isn\u2019t the one you need to be primarily concerned with.<\/p>\n<p><em>The question you need to consider, is what might bad actors start doing with it?<\/em><\/p>\n<h2 class=\"h3\">A readily usable tool of immense power for cyber attackers<\/h2>\n<p>Up until this point, in the brief history of coding assistants using GenAI-based code, the most capable models have always been closed source and available only through the APIs of frontier model developers like Open AI and Anthropic. These closed source models come with guardrails to prevent nefarious use by cyber attackers and other bad actors, preventing them from using these models to generate malicious code.<\/p>\n<p>DeepSeek R1 by contrast, has been released open source and open weights, so anyone with a modicum of coding knowledge and the hardware required can run the models privately, without the safeguards that apply when running the model via DeepSeek\u2019s API.<\/p>\n<p>Furthermore, once a model is running privately, the user has full freedom to implement jailbreaking techniques that remove all remaining restrictions. Indeed, the internet is already abuzz with multiple successful jailbreaking attacks that have already been documented to be effective on DeepSeek R1 (including by\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2025\/01\/deepseek-rise-shows-ai-security-remains-moving-target\/\">Palo Alto\u2019s Unit 42<\/a>).<\/p>\n<p><em>This means that for the first time in history \u2013 as of a few days ago \u2013 the bad actor hacking community has access to a fully usable model at the very frontier, with cutting edge of code generation capabilities.<\/em><\/p>\n<h2 class=\"h3\">How capable is it?<\/h2>\n<p>To set the scene on R1\u2019s coding capabilities, it outperforms or matches the\u00a0<a href=\"https:\/\/nodeshift.com\/blog\/a-step-by-step-guide-to-install-deepseek-r1-locally-with-ollama-vllm-or-transformers-2\">benchmark performance<\/a>\u00a0of the two most capable coding models in public release, Open AI\u2019s o1 model and Anthropic\u2019s Claude 3.5 Sonnet.<\/p>\n<p>On Codeforces, a competitive coding benchmark, R1 is more capable than 96.3% of competitive coders. In other words, this places R1 in the top 3.7% of human competitive coders.<\/p>\n<p>At the same time, it\u2019s ability to run on less technically advanced chips makes it lower cost and easily accessible. You could create an immensely powerful hacking tool based on a stack of Mac minis in the corner of a\u00a0<a href=\"https:\/\/www.threads.net\/@ammohitchaprana\/post\/DFWu89oycBo\/video-agi-at-homerunning-deepseek-r1-across-my-7-m4-pro-mac-minis-and-1-m4-max-macbook\">teenager\u2019s bedroom<\/a>.<\/p>\n<h2 class=\"h3\">Imagine what this could do for the hacker-sphere<\/h2>\n<p>Does all of this mean that DeepSeek will be used by bad actors to supercharge their cyber attacking capabilities?<\/p>\n<p>Let\u2019s reason this through. For DeepSeek R1 to be an effective tool for nefarious code generation, three things would have to hold true:<\/p>\n<p><strong>1. It would have to be true that GenAI code generators are able to be used to generate code that can be used in cyber-attacks.<\/strong><\/p>\n<p>This has already been proven time and time again to be the case. Leading cybersecurity vendors are already defending against a growing number of\u00a0<a href=\"https:\/\/threatresearch.ext.hp.com\/hp-wolf-security-threat-insights-report-september-2024\/\">AI generated, autonomous malware attacks<\/a>.<\/p>\n<p>Recently, AI-pen testing startup XBOW, founded by Oege de Moor, the creator of GitHub Copilot, the world\u2019s most used AI code generator,\u00a0<a href=\"https:\/\/www.bing.com\/videos\/riverview\/relatedvideo?q=Oege+de+Moor+interview&amp;cvid=53c2ee194b994bbeaa89174e058c4445&amp;gs_lcrp=EgRlZGdlKgYIABBFGDkyBggAEEUYOTIICAEQ6QcY_FXSAQgzNDg5ajBqNKgCALACAA&amp;PC=U531&amp;ru=%2fsearch%3fq%3dOege%2bde%2bMoor%2binterview%26cvid%3d53c2ee194b994bbeaa89174e058c4445%26gs_lcrp%3dEgRlZGdlKgYIABBFGDkyBggAEEUYOTIICAEQ6QcY_FXSAQgzNDg5ajBqNKgCALACAA%26FORM%3dANAB01%26PC%3dU531&amp;mmscn=vwrc&amp;mid=E408BE944323898FD6FBE408BE944323898FD6FB&amp;FORM=WRVORC&amp;ntb=1&amp;msockid=1571d1c2de4811ef98b6f55d3d7cd5c5\">announced<\/a>\u00a0that their AI penetration testers outperformed the average human pen testers in a number of tests (see the data on their website\u00a0<a href=\"https:\/\/xbow.com\/\">here<\/a>\u00a0along with some examples of the ingenious hacks conducted by their AI \u201chackers\u201d).<\/p>\n<p><strong>2. R1 must be usable for the purpose.<\/strong><\/p>\n<p>In other words, the model must be accessible in a jailbroken form so that it can be used to perform nefarious tasks that would normally be prohibited.<\/p>\n<p>Given that the model is open source and open weights and has already been jailbroken, this condition has also been satisfied.<\/p>\n<p><strong>3. The model must be able to be run by a bad actor on her own system in a practical and economically viable manner to avoid the restrictions that would apply when accessing the model via DeepSeek\u2019s guard-railed API.<\/strong><\/p>\n<p>This condition too has been satisfied. The smaller and mid-parameter models can be run on a powerful home computer setup.<\/p>\n<p>Even the most powerful 671 billion parameter version can be run on 18 Nvidia A100s with a capital outlay of approximately $300k. This might sound like a chunky investment, but given that there are multiple recorded ransomware payouts in the +$1M range (the highest\u00a0<a href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-10-biggest-ransomware-payouts-of-the-21st-century\">ever disclosed<\/a>\u00a0was $70M), a single successful attack on a reasonable sized enterprise would put the bad actors comfortably in profit.<\/p>\n<p>In summary, as of 20 January 2025, cybersecurity professionals now live in a world where a bad actor can deploy the world\u2019s top 3.7% of competitive coders, for only the cost of electricity, to perform large scale perpetual cyber-attacks across multiple targets simultaneously.<\/p>\n<p>We are effectively witnessing the democratisation of cybercrime; a world where smaller criminal groups can run sophisticated large-scale operations previously restricted to groups able to fund teams with this level of advanced technical expertise.<\/p>\n<p>That is why, as you read these words, multiple bad actors will be testing and deploying R1 (having downloaded it for free from\u00a0<a href=\"https:\/\/github.com\/deepseek-ai\/DeepSeek-R1\">DeepSeek\u2019s GitHub repro<\/a>).<\/p>\n<h2 class=\"h3\">How can you defend your business against real-time autonomous malware attacks?<\/h2>\n<p>Now for the good news. Impressive though R1 is, for the time being at least, bad actors don\u2019t have access to the most powerful frontier models. For instance, OpenAI\u2019s already trained and tested, but yet-to-be publicly released, o3 reasoning model scored better than 99.95% of coders in Codeforces\u2019 all-time rankings. To put that in perspective, this means there are only 175 human competitive coders on the planet who can outperform o3. Fortunately, the top model developers (including\u00a0<a href=\"https:\/\/stackdiary.com\/xbow-is-an-offensive-security-ai-created-by-github-copilot-pioneers\/\">OpenAI<\/a>\u00a0and\u00a0<a href=\"https:\/\/thehackernews.com\/2024\/11\/googles-ai-tool-big-sleep-finds-zero.html\">Google<\/a>) are already involved in cybersecurity initiatives where non-guard-railed instances of their cutting-edge models are being used to push the frontier of offensive &amp; predictive security.<\/p>\n<p>Of course, to be of any use, you need those capabilities on your side. Whether we\u2019re specifically talking about DeepSeek or the flurry of rivals\/spinoffs that will inevitably follow, now is the time to deploy real-time AI-enabled autonomous detection, prevention and remediation solutions.<\/p>\n<p>If upgrading your cyber defences was near the top of your 2025 IT to do list, (it\u2019s no.2 in\u00a0<a href=\"https:\/\/www.ideal.co.uk\/blog\/top-technology-concerns-for-business-in-2025\/\">Our Tech 2025 Predictions<\/a>, ironically right behind AI) it\u2019s time to get it right to the top.<\/p>\n<p>In my opinion, open source, open weights DeepSeek R1 is a drop everything moment. It certainly is for your opponent.<\/p>\n<\/div>\n<\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n<\/section>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The launch of DeepSeek R1 has stunned Silicon Valley, launched global counter-intelligence initiatives and crashed tech shares on Wall Street. But that\u2019s not what CISOs should be worrying about.<\/p>\n","protected":false},"author":5,"featured_media":1001,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[26],"tags":[],"class_list":["post-998","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.5 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Why DeepSeek R1 is a \u2018Drop Everything Moment\u2019 for CEOs and CISOs. - Ideal<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/staging.mintcreative.com\/ideal-test\/deepseek-r1\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why DeepSeek R1 is a \u2018Drop Everything Moment\u2019 for CEOs and CISOs.\" \/>\n<meta property=\"og:description\" content=\"The launch of DeepSeek R1 has stunned Silicon Valley, launched global counter-intelligence initiatives and crashed tech shares on Wall Street. But that\u2019s not what CISOs should be worrying about.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/staging.mintcreative.com\/ideal-test\/deepseek-r1\/\" \/>\n<meta property=\"og:site_name\" content=\"Ideal\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-04T21:11:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-14T08:58:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/06\/AI-Blog-01-AdobeStock_937938067.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1888\" \/>\n\t<meta property=\"og:image:height\" content=\"965\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ant Bullock\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ant Bullock\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/deepseek-r1\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/deepseek-r1\\\/\"},\"author\":{\"name\":\"Ant Bullock\",\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/#\\\/schema\\\/person\\\/7e3d69c4d07d8cbcc231ed76db349c6b\"},\"headline\":\"Why DeepSeek R1 is a \u2018Drop Everything Moment\u2019 for CEOs and CISOs.\",\"datePublished\":\"2025-02-04T21:11:00+00:00\",\"dateModified\":\"2025-07-14T08:58:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/deepseek-r1\\\/\"},\"wordCount\":12,\"image\":{\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/deepseek-r1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/AI-Blog-01-AdobeStock_937938067.jpg\",\"articleSection\":[\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/deepseek-r1\\\/\",\"url\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/deepseek-r1\\\/\",\"name\":\"Why DeepSeek R1 is a \u2018Drop Everything Moment\u2019 for CEOs and CISOs. - Ideal\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/deepseek-r1\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/deepseek-r1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/AI-Blog-01-AdobeStock_937938067.jpg\",\"datePublished\":\"2025-02-04T21:11:00+00:00\",\"dateModified\":\"2025-07-14T08:58:38+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/#\\\/schema\\\/person\\\/7e3d69c4d07d8cbcc231ed76db349c6b\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/deepseek-r1\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/deepseek-r1\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/deepseek-r1\\\/#primaryimage\",\"url\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/AI-Blog-01-AdobeStock_937938067.jpg\",\"contentUrl\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/AI-Blog-01-AdobeStock_937938067.jpg\",\"width\":1888,\"height\":965},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/deepseek-r1\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why DeepSeek R1 is a \u2018Drop Everything Moment\u2019 for CEOs and CISOs.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/#website\",\"url\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/\",\"name\":\"Ideal\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/#\\\/schema\\\/person\\\/7e3d69c4d07d8cbcc231ed76db349c6b\",\"name\":\"Ant Bullock\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/wp-content\\\/litespeed\\\/avatar\\\/b924b7f5b4943a3541331e1200c0bb38.jpg?ver=1778695534\",\"url\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/wp-content\\\/litespeed\\\/avatar\\\/b924b7f5b4943a3541331e1200c0bb38.jpg?ver=1778695534\",\"contentUrl\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/wp-content\\\/litespeed\\\/avatar\\\/b924b7f5b4943a3541331e1200c0bb38.jpg?ver=1778695534\",\"caption\":\"Ant Bullock\"},\"url\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/author\\\/ant\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Why DeepSeek R1 is a \u2018Drop Everything Moment\u2019 for CEOs and CISOs. - Ideal","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/staging.mintcreative.com\/ideal-test\/deepseek-r1\/","og_locale":"en_US","og_type":"article","og_title":"Why DeepSeek R1 is a \u2018Drop Everything Moment\u2019 for CEOs and CISOs.","og_description":"The launch of DeepSeek R1 has stunned Silicon Valley, launched global counter-intelligence initiatives and crashed tech shares on Wall Street. But that\u2019s not what CISOs should be worrying about.","og_url":"https:\/\/staging.mintcreative.com\/ideal-test\/deepseek-r1\/","og_site_name":"Ideal","article_published_time":"2025-02-04T21:11:00+00:00","article_modified_time":"2025-07-14T08:58:38+00:00","og_image":[{"width":1888,"height":965,"url":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/06\/AI-Blog-01-AdobeStock_937938067.jpg","type":"image\/jpeg"}],"author":"Ant Bullock","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ant Bullock"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/staging.mintcreative.com\/ideal-test\/deepseek-r1\/#article","isPartOf":{"@id":"https:\/\/staging.mintcreative.com\/ideal-test\/deepseek-r1\/"},"author":{"name":"Ant Bullock","@id":"https:\/\/staging.mintcreative.com\/ideal-test\/#\/schema\/person\/7e3d69c4d07d8cbcc231ed76db349c6b"},"headline":"Why DeepSeek R1 is a \u2018Drop Everything Moment\u2019 for CEOs and CISOs.","datePublished":"2025-02-04T21:11:00+00:00","dateModified":"2025-07-14T08:58:38+00:00","mainEntityOfPage":{"@id":"https:\/\/staging.mintcreative.com\/ideal-test\/deepseek-r1\/"},"wordCount":12,"image":{"@id":"https:\/\/staging.mintcreative.com\/ideal-test\/deepseek-r1\/#primaryimage"},"thumbnailUrl":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/06\/AI-Blog-01-AdobeStock_937938067.jpg","articleSection":["Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/staging.mintcreative.com\/ideal-test\/deepseek-r1\/","url":"https:\/\/staging.mintcreative.com\/ideal-test\/deepseek-r1\/","name":"Why DeepSeek R1 is a \u2018Drop Everything Moment\u2019 for CEOs and CISOs. - Ideal","isPartOf":{"@id":"https:\/\/staging.mintcreative.com\/ideal-test\/#website"},"primaryImageOfPage":{"@id":"https:\/\/staging.mintcreative.com\/ideal-test\/deepseek-r1\/#primaryimage"},"image":{"@id":"https:\/\/staging.mintcreative.com\/ideal-test\/deepseek-r1\/#primaryimage"},"thumbnailUrl":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/06\/AI-Blog-01-AdobeStock_937938067.jpg","datePublished":"2025-02-04T21:11:00+00:00","dateModified":"2025-07-14T08:58:38+00:00","author":{"@id":"https:\/\/staging.mintcreative.com\/ideal-test\/#\/schema\/person\/7e3d69c4d07d8cbcc231ed76db349c6b"},"breadcrumb":{"@id":"https:\/\/staging.mintcreative.com\/ideal-test\/deepseek-r1\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/staging.mintcreative.com\/ideal-test\/deepseek-r1\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/staging.mintcreative.com\/ideal-test\/deepseek-r1\/#primaryimage","url":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/06\/AI-Blog-01-AdobeStock_937938067.jpg","contentUrl":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/06\/AI-Blog-01-AdobeStock_937938067.jpg","width":1888,"height":965},{"@type":"BreadcrumbList","@id":"https:\/\/staging.mintcreative.com\/ideal-test\/deepseek-r1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/staging.mintcreative.com\/ideal-test\/"},{"@type":"ListItem","position":2,"name":"Why DeepSeek R1 is a \u2018Drop Everything Moment\u2019 for CEOs and CISOs."}]},{"@type":"WebSite","@id":"https:\/\/staging.mintcreative.com\/ideal-test\/#website","url":"https:\/\/staging.mintcreative.com\/ideal-test\/","name":"Ideal","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/staging.mintcreative.com\/ideal-test\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/staging.mintcreative.com\/ideal-test\/#\/schema\/person\/7e3d69c4d07d8cbcc231ed76db349c6b","name":"Ant Bullock","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/litespeed\/avatar\/b924b7f5b4943a3541331e1200c0bb38.jpg?ver=1778695534","url":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/litespeed\/avatar\/b924b7f5b4943a3541331e1200c0bb38.jpg?ver=1778695534","contentUrl":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/litespeed\/avatar\/b924b7f5b4943a3541331e1200c0bb38.jpg?ver=1778695534","caption":"Ant Bullock"},"url":"https:\/\/staging.mintcreative.com\/ideal-test\/author\/ant\/"}]}},"_links":{"self":[{"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/posts\/998","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/comments?post=998"}],"version-history":[{"count":5,"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/posts\/998\/revisions"}],"predecessor-version":[{"id":1004,"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/posts\/998\/revisions\/1004"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/media\/1001"}],"wp:attachment":[{"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/media?parent=998"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/categories?post=998"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/tags?post=998"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}