{"id":2095,"date":"2019-11-26T04:13:58","date_gmt":"2019-11-26T04:13:58","guid":{"rendered":"http:\/\/kusuaks7\/?p=1700"},"modified":"2024-02-20T18:07:35","modified_gmt":"2024-02-20T18:07:35","slug":"achieving-a-data-centric-approach-to-security-requires-homomorphic-encryption","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/bigdata-cloud\/achieving-a-data-centric-approach-to-security-requires-homomorphic-encryption\/","title":{"rendered":"Achieving a data-centric approach to security requires homomorphic encryption"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2095\" class=\"elementor elementor-2095\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-13d40608 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"13d40608\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-65dfe91d\" data-id=\"65dfe91d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3abe766e elementor-widget elementor-widget-text-editor\" data-id=\"3abe766e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIn 2019 there have been an estimated six-and-a-half billion data breaches. A data-centric approach to security and homomorphic encryption is required to solve this problem and give companies the confidence to move to the cloud\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c9b1712 elementor-widget elementor-widget-text-editor\" data-id=\"c9b1712\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThere is a market problem that only data-centric security and homomorphic encryption can solve.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e9e7f3b elementor-widget elementor-widget-text-editor\" data-id=\"e9e7f3b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIn the first six months of the year, there were\u00a0<a href=\"https:\/\/securitytoday.com\/articles\/2019\/08\/22\/with-4.1-billion-records-exposed-in-six-months-2019-is-on-course-to-be-record-year-for-data-breaches.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">4.1 billion records exposed by data breaches<\/a>, and this has risen to approximately six-and-a-half billion since then. Data breaches are becoming more frequent and damaging.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fc7cb9b elementor-widget elementor-widget-text-editor\" data-id=\"fc7cb9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThis failure to solve the growing security crisis is crippling the confidence of large enterprises in their ambition to move to the cloud, which can be a risky, but necessary venture.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a5ae056 elementor-widget elementor-widget-text-editor\" data-id=\"a5ae056\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWhy is it necessary? The legacy implications of not moving to the cloud are affecting data. Data remains the number one underutilised corporate asset, \u201cwhich is unacceptable in this data-driven environment,\u201d explained\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/ajjennings\/\" target=\"_blank\" rel=\"noopener noreferrer\">AJ Jennings<\/a>, founder and CEO at\u00a0<a href=\"https:\/\/www.shieldio.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">ShieldIO<\/a>, the specialist in real-time homomorphic encryption \u2014 we\u2019ll come to that later.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5311f81 elementor-widget elementor-widget-text-editor\" data-id=\"5311f81\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWorking on legacy frameworks is exacerbating the enterprises\u2019 inability to view and gain valuable insights from encrypted data without decrypting it (data exposure), as is disruptive regulatory data compliance restraints. KeyStores are a continuing vulnerability and outdated data protection methodologies, databases and applications leave infrastructures stressed and dissatisfied.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78e9db1 elementor-widget elementor-widget-heading\" data-id=\"78e9db1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><blockquote>\n<h3>There are a number of stress factors affecting data protection, including; regulated data compliance requirements, exponential growth of PII, PHI and PCI data, the requirement for the monetisation of dark data, a consistent barrage of external malicious attacks and accidental or internal malcontents and cloud migration demand vs cloud security.<\/h3>\n<\/blockquote><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1934426 elementor-widget elementor-widget-text-editor\" data-id=\"1934426\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tTo address the above problems, a data-centric approach is needed in the security landscape. IT security requires a blanket of protection from perimeter to network; physical to application, anti-malware to policy management and training.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-34babe8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"34babe8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f76ecbd\" data-id=\"f76ecbd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-18d386e elementor-widget elementor-widget-text-editor\" data-id=\"18d386e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<blockquote>\n<div style=\"text-align: center;\">\u00a0<a href=\"https:\/\/www.information-age.com\/combating-cyber-attacks-data-centric-defence-123466380\/\" rel=\"noopener\">Companies must take a more data-centric approach to cyber security as the number of endpoints continues to proliferate. Read here<\/a><\/div><\/blockquote>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c0ce0ef elementor-widget elementor-widget-heading\" data-id=\"c0ce0ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3><strong>Real-time homomorphic encryption<\/strong><\/h3><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eafdb86 elementor-widget elementor-widget-text-editor\" data-id=\"eafdb86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tReal-time\u00a0<a href=\"https:\/\/www.cyberscoop.com\/homomorphic-encryption-nsa-silicon-valley-commercial\/\" target=\"_blank\" rel=\"noopener noreferrer\">homomorphic encryption<\/a>\u00a0\u2014 the ability to perform mathematical functions on data and get search queries back without decrypting it \u2014 is a solution that fosters a data-centric approach to security.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b14f9d3 elementor-widget elementor-widget-text-editor\" data-id=\"b14f9d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWith this technology, where ShieldIO is a pioneer, \u201cprivileged and non-privileged users can get value from the encrypted data in real-time, without seeing, exposing or decrypting the actual data,\u201d said Jennings.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-76f3b05 elementor-widget elementor-widget-text-editor\" data-id=\"76f3b05\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe company\u2019s solution can be deployed as a standard JDBC, OBDC, .NET and EF database driver. It sits next to these existing databases and this eliminates the latency issues associated with encrypted data and the complexities of deployment \u2014 to examine encrypted data used to take too much compute power.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6333819 elementor-widget elementor-widget-text-editor\" data-id=\"6333819\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThere is faith in this product as Oracle, and a number of other cloud service and large database providers, are bringing ShieldIO into its cloud ecosystem, to help customers in their moves to the cloud.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6958fe5 elementor-widget elementor-widget-text-editor\" data-id=\"6958fe5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p id=\"caption-attachment-123485798\">AJ Jennings explains the term real-time homomorphic encryption to the members of the 32nd\u00a0<a href=\"https:\/\/www.itpresstour.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">IT Press Tour<\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59a3b6a elementor-widget elementor-widget-heading\" data-id=\"59a3b6a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><blockquote>\n<h4 style=\"text-align: center\"><a href=\"https:\/\/www.information-age.com\/responsible-companys-encryption-keys-123465042\/\" rel=\"noopener\">Businesses today are finding the privacy of their data to be increasingly at risk from a growing variety of security threats. Read here<\/a><\/h4>\n<\/blockquote><\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2706a82 elementor-widget elementor-widget-heading\" data-id=\"2706a82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3><strong>Removing the KeyStore<\/strong><\/h3><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f29b4e elementor-widget elementor-widget-text-editor\" data-id=\"0f29b4e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tEliminating the vulnerability of the KeyStore \u2014 the repository of security certificates \u2014 is fundamental to reducing the available attack footprint of a hacker.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da2ca5e elementor-widget elementor-widget-text-editor\" data-id=\"da2ca5e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\u201cHackers steal encryption keys, they very rarely break the encryption,\u201d said\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/simon-bain-389233\/\" target=\"_blank\" rel=\"noopener noreferrer\">Simon Bain<\/a>, CTO, ShieldIO. \u201cKeyStores are vulnerable because someone hasn\u2019t taken enough notice of their data and secured it correctly, because they haven\u2019t looked at the value of that data.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3185bbc elementor-widget elementor-widget-text-editor\" data-id=\"3185bbc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\u201cData is king and money, and people need to be trained to appreciate this. They need to look at how that data is stored and what\u2019s vulnerable \u2014 organisations think if they go to AWS it will be fine, which is what Capital One did, and\u00a0<a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2019-07-29\/capital-one-data-systems-breached-by-seattle-woman-u-s-says\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"broken_link\">it was breached<\/a>.\u201d\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b4d8ccb elementor-widget elementor-widget-text-editor\" data-id=\"b4d8ccb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tHow does ShieldIO overcome this problem? According to Jennings, the solution encrypts down to the database subfield level, utilising standard AES-256 encryption. \u201cWe then generate ephemeral keys for each encrypted bit utilising our propriety AI algorithms at random cryptographic combinations.\u201d The key is then destroyed, which eliminates the ability for a hacker to access decrypted data by stealing the KeyStore.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-88eeb74 elementor-widget elementor-widget-heading\" data-id=\"88eeb74\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3><strong>Use cases<\/strong><\/h3><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd82f02 elementor-widget elementor-widget-text-editor\" data-id=\"cd82f02\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWhen moving from on-premise to cloud migration, security is an issue. \u201cShieldIO has acted as a catalyst to helping Oracle move its customers to the cloud, securely, across several verticals,\u201d continued Jennings.\n<p id=\"caption-attachment-123485774\">Deployed customer use cases.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-63c7984 elementor-widget elementor-widget-heading\" data-id=\"63c7984\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3><strong>Make security easy<\/strong><\/h3><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-abadaa0 elementor-widget elementor-widget-text-editor\" data-id=\"abadaa0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tUsers need to do their job, but it\u2019s important that blockers don\u2019t get in the way, in the name of security. Security needs to be efficient, but it should run in the background and not interfere with users doing their job.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12ba1db elementor-widget elementor-widget-text-editor\" data-id=\"12ba1db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n\u201cOur job is to make security as easy and secure as possible and not get in the way of people\u2019s jobs,\u201d confirmed Jennings.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-82a9ba7 elementor-widget elementor-widget-text-editor\" data-id=\"82a9ba7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThis can be achieved by enabling; access to encrypted data in-use, development test environments to use real data without exposing live data, real-time speed of query on a fully encrypted dataset and, a simple, fast and transparent data security implementation through standard database drivers.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e7c938e elementor-widget elementor-widget-text-editor\" data-id=\"e7c938e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t*Bain explained that the regulation coming into play is a \u201ckneejerk reaction by governments. It is needed, but isn\u2019t responding to the problem,\u201d he said. \u201cOn the face of it, the regulations look good, but actually it\u2019s not \u2014 they don\u2019t understand the situation. They don\u2019t like big tech companies in the US and regulations like the CCPA are impacting the consumer negatively. Regulation needs to be there, but governments need to look at the ecosystem more carefully \u2014 it shouldn\u2019t be politicians designing it.\u201d\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Data breaches are becoming more frequent and damaging. This failure to solve the growing security crisis is crippling the confidence of large enterprises in their ambition to move to the cloud, which can be a risky, but necessary venture. Why is it necessary? The legacy implications of not moving to the cloud are affecting data. A data-centric approach to security and homomorphic encryption is required to solve this problem and give companies the confidence to move to the cloud.<\/p>\n","protected":false},"author":635,"featured_media":2871,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[187],"tags":[95],"ppma_author":[3361],"class_list":["post-2095","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bigdata-cloud","tag-big-data-amp-technology"],"authors":[{"term_id":3361,"user_id":635,"is_guest":0,"slug":"nicholas-ismail","display_name":"Nicholas Ismail","avatar_url":"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/04\/medium_7846d3d9-9e57-4968-8d69-64a8c8947899-150x150.jpg","user_url":"https:\/\/www.information-age.com\/","last_name":"Ismail","first_name":"Nicholas","job_title":"","description":"Nicholas Ismail is Editor at <a href=\"https:\/\/www.information-age.com\/\">Information Age<\/a>.\u00a0 He writes original articles for the magazine and website, interviewing business leaders both on and off-camera while providing analysis for IT and business leaders on the latest technology trends disrupting the industry."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2095","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/635"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=2095"}],"version-history":[{"count":6,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2095\/revisions"}],"predecessor-version":[{"id":36066,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2095\/revisions\/36066"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/2871"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=2095"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=2095"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=2095"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=2095"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}