{"id":1976,"date":"2018-03-08T10:47:58","date_gmt":"2018-03-08T05:17:58","guid":{"rendered":"https:\/\/codelattice.com\/blog\/?p=1976"},"modified":"2021-06-09T16:08:45","modified_gmt":"2021-06-09T10:38:45","slug":"cyber-security-effectiveness-five-ways-to-assess-it","status":"publish","type":"post","link":"https:\/\/www.codelattice.com\/blog\/cyber-security-effectiveness-five-ways-to-assess-it\/","title":{"rendered":"Cyber Security Effectiveness &#038; Five Ways to Assess It"},"content":{"rendered":"<p><em>What is cyber security all about, you may ask. After all, the networks have firewalls. The browsers swear to heaven and back that your data is safe with them. And you just installed an apparently capable anti-malware in place. <\/em><\/p>\n<p><em>Well, you might want to rethink the concept of cybersecurity effectiveness. And No! Going through the cybersecurity wiki and calling it a day doesn\u2019t do the trick. <\/em><\/p>\n<p><strong>Measuring Security Efforts Is Important to Understanding the Risk Versus the Impacts<\/strong><\/p>\n<p>NSS Labs Inc. annually evaluates the cybersecurity performance of different defence system. It did so in 2017 with 11 next-gen firewall products as its test subjects; all amassed from 10 vendors.<\/p>\n<p>8 out of the 11 products were above average when tested for cost-effectiveness and performance. The average security efficiency was 68.3%. While just two products could defend all evasion attempts with a 99.9% security effectiveness, nine products couldn\u2019t pick out at least one attack, with the security effectiveness going as low as 25.8%.<\/p>\n<p>Robert J. Carey, VP at General Department IT, points out that the performance of a cybersecurity tool as a standalone entity doesn&#8217;t always reflect how it may act when it\u2019s paired up with others in a suite.<\/p>\n<p>And Carey does have a point. However, the NSS results get you thinking, what are the parameters that can help you understand cybersecurity effectiveness?<\/p>\n<p><strong>1. Grasp the Cost Versus Impact Approach<\/strong><\/p>\n<p>When a security person approaches you to talk about the cost of such and such types of cybersecurity tools, you should be able to tell them what achievable objectives are essential to you.<\/p>\n<p>That conversation can lead to revealing how the money you\u2019re spending is impacting the outcome. You can realign your end goals with the security personnel\u2019 cost estimate to reach a more fruitful accommodation.<\/p>\n<p><strong>2. Take Another Look at Your Security Metrics<\/strong><\/p>\n<p>Guessing the Key Performance Indicators which gauge reactions from your audience in the best way is a sure shot at sinking your Titanic.<\/p>\n<p>Mike Spanbauer, VP, Research Strategy, NSS, says that it\u2019s important to know exactly how a set of security tools will react when threatened by a range of current threats.<\/p>\n<p>Metrics should make the process easier by using your existing reporting sources. They should make sense in the context of your business. And they shouldn\u2019t be very time or resource consuming,<\/p>\n<p><strong>3. Understand the Influence of Cyber security Measures on the Business Unit<\/strong><\/p>\n<p>You need real-time data about every granular instance where your security system is either performing well or messing things up.<\/p>\n<p>The management needs to be informed about the overall performance of your cyber security strategy to make contextual business decisions properly.<\/p>\n<p><strong>4. Keep the End User in the Loop<\/strong><\/p>\n<p>Those who use your service expect their data to be protected as much and as efficiently as possible. A transparent unit which lets them know how well you\u2019re doing on this particular front fuels their confidence in you. It also gives your brand the advantage of trust.<\/p>\n<p><strong>5. Don\u2019t Blindly Trust Automation with Your Investment<\/strong><\/p>\n<p>Automated cybersecurity tools are just as useful as the data they are fed and intelligence they carry to make use of said data. Sure, it\u2019s great for a fast and more efficient system. But, until such a hyper-attentive AI is created, your security systems should be something you and your team can comprehend easily.<\/p>\n<p><strong>6. Build a Levelled Strategy, Says DISA CIO John Hickey <\/strong><\/p>\n<p>Hickey from the Defense Information System Agency suggests tackling threats and minimising risks in a storied approach. If you can judge where you\u2019re powerful and weak, and do it separately for the perimeter, region, and endpoint, you come out more aware of the situation. Assessing your cybersecurity effectiveness in this manner ensures that your risk is minimised.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is cyber security all about, you may ask. After all, the networks have firewalls. The browsers swear to heaven and back that your data is safe with them. And you just installed an apparently capable anti-malware in place. Well, you might want to rethink the concept of cybersecurity effectiveness. And No! Going through the [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":1977,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[378],"tags":[],"class_list":["post-1976","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-security"],"acf":{"heading_txt":"","webp":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/03\/ezgif.com-gif-maker-26.webp"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Security Effectiveness &amp; Five Ways to Assess It - Codelattice Blog<\/title>\n<meta name=\"description\" content=\"What cybersecurity is about what you might ask for? When there&#039;s a firewall on every network. And obviously, you just installed yourself on the website. It was possible.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.codelattice.com\/blog\/cyber-security-effectiveness-five-ways-to-assess-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security Effectiveness &amp; Five Ways to Assess It - Codelattice Blog\" \/>\n<meta property=\"og:description\" content=\"What cybersecurity is about what you might ask for? When there&#039;s a firewall on every network. And obviously, you just installed yourself on the website. It was possible.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.codelattice.com\/blog\/cyber-security-effectiveness-five-ways-to-assess-it\/\" \/>\n<meta property=\"og:site_name\" content=\"Codelattice Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/codelattice\" \/>\n<meta property=\"article:published_time\" content=\"2018-03-08T05:17:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-09T10:38:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/03\/ezgif.com-gif-maker-26.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"344\" \/>\n<meta name=\"author\" content=\"Vijith Sivadasan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Cyber Security Effectiveness &#038; Five Ways to Assess It\" \/>\n<meta name=\"twitter:description\" content=\"What cybersecurity is about what you might ask for? When there&#039;s a firewall on every network. And obviously, you just installed yourself on the website. It was possible.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/03\/ezgif.com-gif-maker-26.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@Codelattice\" \/>\n<meta name=\"twitter:site\" content=\"@Codelattice\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vijith Sivadasan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/www.codelattice.com\/blog\/cyber-security-effectiveness-five-ways-to-assess-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/cyber-security-effectiveness-five-ways-to-assess-it\/\"},\"author\":{\"name\":\"Vijith Sivadasan\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/a9537076a7a382d4161e1a86e43384d5\"},\"headline\":\"Codelattice Blog\",\"datePublished\":\"2018-03-08T05:17:58+00:00\",\"dateModified\":\"2021-06-09T10:38:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/cyber-security-effectiveness-five-ways-to-assess-it\/\"},\"wordCount\":629,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/cyber-security-effectiveness-five-ways-to-assess-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/03\/1_wqmBDlLR8LKYboTnpPSn0A-1.jpeg\",\"articleSection\":[\"Cloud &amp; Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.codelattice.com\/blog\/cyber-security-effectiveness-five-ways-to-assess-it\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/cyber-security-effectiveness-five-ways-to-assess-it\/\",\"url\":\"https:\/\/www.codelattice.com\/blog\/cyber-security-effectiveness-five-ways-to-assess-it\/\",\"name\":\"Cyber Security Effectiveness & Five Ways to Assess It - Codelattice Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/cyber-security-effectiveness-five-ways-to-assess-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/cyber-security-effectiveness-five-ways-to-assess-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/03\/1_wqmBDlLR8LKYboTnpPSn0A-1.jpeg\",\"datePublished\":\"2018-03-08T05:17:58+00:00\",\"dateModified\":\"2021-06-09T10:38:45+00:00\",\"description\":\"What cybersecurity is about what you might ask for? When there's a firewall on every network. And obviously, you just installed yourself on the website. It was possible.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/cyber-security-effectiveness-five-ways-to-assess-it\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.codelattice.com\/blog\/cyber-security-effectiveness-five-ways-to-assess-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/cyber-security-effectiveness-five-ways-to-assess-it\/#primaryimage\",\"url\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/03\/ezgif.com-gif-maker-26.webp\",\"contentUrl\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/03\/ezgif.com-gif-maker-26.webp\",\"width\":600,\"height\":344,\"thumbnailUrl\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/03\/ezgif.com-gif-maker-26.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/cyber-security-effectiveness-five-ways-to-assess-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.codelattice.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Codelattice Blog\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#website\",\"url\":\"https:\/\/www.codelattice.com\/blog\/\",\"name\":\"Codelattice Blog\",\"description\":\"Home\",\"publisher\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.codelattice.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#organization\",\"name\":\"Codelattice\",\"url\":\"https:\/\/www.codelattice.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2024\/12\/cl-logo-icon.png\",\"contentUrl\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2024\/12\/cl-logo-icon.png\",\"width\":366,\"height\":366,\"caption\":\"Codelattice\"},\"image\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/codelattice\",\"https:\/\/x.com\/Codelattice\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/a9537076a7a382d4161e1a86e43384d5\",\"name\":\"Vijith Sivadasan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2024\/03\/Vijith-Sivadasan-150x150.jpg\",\"contentUrl\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2024\/03\/Vijith-Sivadasan-150x150.jpg\",\"caption\":\"Vijith Sivadasan\"},\"description\":\"An enterprising visionary and a serial entrepreneur, Vijith is driven by instinct in his pursuit for creative excellence. Passionate about transformational marketing strategies, he enunciates the critical need of analytic skills to maximize business potential. To know more on how he can add value to your business, drop him a line at vijith@codelattice.com\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security Effectiveness & Five Ways to Assess It - Codelattice Blog","description":"What cybersecurity is about what you might ask for? When there's a firewall on every network. And obviously, you just installed yourself on the website. It was possible.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.codelattice.com\/blog\/cyber-security-effectiveness-five-ways-to-assess-it\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security Effectiveness & Five Ways to Assess It - Codelattice Blog","og_description":"What cybersecurity is about what you might ask for? When there's a firewall on every network. And obviously, you just installed yourself on the website. It was possible.","og_url":"https:\/\/www.codelattice.com\/blog\/cyber-security-effectiveness-five-ways-to-assess-it\/","og_site_name":"Codelattice Blog","article_publisher":"https:\/\/www.facebook.com\/codelattice","article_published_time":"2018-03-08T05:17:58+00:00","article_modified_time":"2021-06-09T10:38:45+00:00","og_image":[{"width":600,"height":344,"url":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/03\/ezgif.com-gif-maker-26.webp","type":""}],"author":"Vijith Sivadasan","twitter_card":"summary_large_image","twitter_title":"Cyber Security Effectiveness &#038; Five Ways to Assess It","twitter_description":"What cybersecurity is about what you might ask for? When there's a firewall on every network. And obviously, you just installed yourself on the website. It was possible.","twitter_image":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/03\/ezgif.com-gif-maker-26.webp","twitter_creator":"@Codelattice","twitter_site":"@Codelattice","twitter_misc":{"Written by":"Vijith Sivadasan","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.codelattice.com\/blog\/cyber-security-effectiveness-five-ways-to-assess-it\/#article","isPartOf":{"@id":"https:\/\/www.codelattice.com\/blog\/cyber-security-effectiveness-five-ways-to-assess-it\/"},"author":{"name":"Vijith Sivadasan","@id":"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/a9537076a7a382d4161e1a86e43384d5"},"headline":"Codelattice Blog","datePublished":"2018-03-08T05:17:58+00:00","dateModified":"2021-06-09T10:38:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.codelattice.com\/blog\/cyber-security-effectiveness-five-ways-to-assess-it\/"},"wordCount":629,"commentCount":0,"publisher":{"@id":"https:\/\/www.codelattice.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.codelattice.com\/blog\/cyber-security-effectiveness-five-ways-to-assess-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/03\/1_wqmBDlLR8LKYboTnpPSn0A-1.jpeg","articleSection":["Cloud &amp; Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.codelattice.com\/blog\/cyber-security-effectiveness-five-ways-to-assess-it\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.codelattice.com\/blog\/cyber-security-effectiveness-five-ways-to-assess-it\/","url":"https:\/\/www.codelattice.com\/blog\/cyber-security-effectiveness-five-ways-to-assess-it\/","name":"Cyber Security Effectiveness & Five Ways to Assess It - Codelattice Blog","isPartOf":{"@id":"https:\/\/www.codelattice.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.codelattice.com\/blog\/cyber-security-effectiveness-five-ways-to-assess-it\/#primaryimage"},"image":{"@id":"https:\/\/www.codelattice.com\/blog\/cyber-security-effectiveness-five-ways-to-assess-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/03\/1_wqmBDlLR8LKYboTnpPSn0A-1.jpeg","datePublished":"2018-03-08T05:17:58+00:00","dateModified":"2021-06-09T10:38:45+00:00","description":"What cybersecurity is about what you might ask for? When there's a firewall on every network. And obviously, you just installed yourself on the website. It was possible.","breadcrumb":{"@id":"https:\/\/www.codelattice.com\/blog\/cyber-security-effectiveness-five-ways-to-assess-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.codelattice.com\/blog\/cyber-security-effectiveness-five-ways-to-assess-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codelattice.com\/blog\/cyber-security-effectiveness-five-ways-to-assess-it\/#primaryimage","url":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/03\/ezgif.com-gif-maker-26.webp","contentUrl":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/03\/ezgif.com-gif-maker-26.webp","width":600,"height":344,"thumbnailUrl":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/03\/ezgif.com-gif-maker-26.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.codelattice.com\/blog\/cyber-security-effectiveness-five-ways-to-assess-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.codelattice.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Codelattice Blog"}]},{"@type":"WebSite","@id":"https:\/\/www.codelattice.com\/blog\/#website","url":"https:\/\/www.codelattice.com\/blog\/","name":"Codelattice Blog","description":"Home","publisher":{"@id":"https:\/\/www.codelattice.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.codelattice.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.codelattice.com\/blog\/#organization","name":"Codelattice","url":"https:\/\/www.codelattice.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codelattice.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2024\/12\/cl-logo-icon.png","contentUrl":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2024\/12\/cl-logo-icon.png","width":366,"height":366,"caption":"Codelattice"},"image":{"@id":"https:\/\/www.codelattice.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/codelattice","https:\/\/x.com\/Codelattice"]},{"@type":"Person","@id":"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/a9537076a7a382d4161e1a86e43384d5","name":"Vijith Sivadasan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2024\/03\/Vijith-Sivadasan-150x150.jpg","contentUrl":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2024\/03\/Vijith-Sivadasan-150x150.jpg","caption":"Vijith Sivadasan"},"description":"An enterprising visionary and a serial entrepreneur, Vijith is driven by instinct in his pursuit for creative excellence. Passionate about transformational marketing strategies, he enunciates the critical need of analytic skills to maximize business potential. To know more on how he can add value to your business, drop him a line at vijith@codelattice.com"}]}},"_links":{"self":[{"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/posts\/1976","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/comments?post=1976"}],"version-history":[{"count":3,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/posts\/1976\/revisions"}],"predecessor-version":[{"id":3700,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/posts\/1976\/revisions\/3700"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/media\/1977"}],"wp:attachment":[{"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/media?parent=1976"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/categories?post=1976"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/tags?post=1976"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}