{"id":169,"date":"2021-11-10T09:00:00","date_gmt":"2021-11-10T09:00:00","guid":{"rendered":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/?p=169"},"modified":"2024-09-26T07:00:47","modified_gmt":"2024-09-26T07:00:47","slug":"how-artificial-intelligence-used-in-fraud-detection","status":"publish","type":"post","link":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/how-artificial-intelligence-used-in-fraud-detection\/","title":{"rendered":"How Artificial Intelligence used in Fraud Detection"},"content":{"rendered":"\n<p>The days of rule-based engines and simple prediction algorithms detecting most fraud attempts are long gone. As technology is advancing, the risk of being a victim of fraud is also growing. Now fraud-based assaults have a distinct pattern, sequence, and structure that makes them impossible to identify using only rules-based reasoning and predictive models.<\/p>\n\n\n\n<p>This rapid development of complex, highly advanced fraud efforts can be countered only by AI.&nbsp;Artificial intelligence in cyber security&nbsp;can review years of transaction data in minutes to compute risk scores. As a result, AI is extremely useful in identifying fraud and other financial crime-related suspicious actions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">Here are five ways in which Artificial Intelligence is driving a new age of fraud detection.<\/h2>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\">1. <strong>Analyze data with precision<\/strong><\/h3>\n\n\n\n<p>One of the essential characteristics of machine learning is its ability to assess large volumes of transaction data in real time and identify questionable transactions with exact risk scores. This risk-based analytics technique finds complicated patterns difficult for analysts to spot, allowing banks and financial institutions to run more efficiently while identifying more fraud. The algorithms analyze various elements to fully depict each transaction, including the customer\u2019s location, the device utilized, and other contextual data points.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\">2. <strong>Detecting fraud in real-time<\/strong><\/h3>\n\n\n\n<p>Rather than needing to wait six or eight weeks for fraudulent charges, AI allows fraud attacks to be detected in real time. The potential of modern security software to detect fraud assaults in less than a second is the future of fraud control. When a digital organization depends solely on structured learning and rules, new assaults are challenging to detect. AI eliminates the need to constantly play catch-up to online fraud by balancing supervised and unsupervised learning.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\">3. <strong>Better insights for fraud analysts<\/strong><\/h3>\n\n\n\n<p>With the increasing number of new cyber threats and massive volumes of data to evaluate, fraud analysts are faced with the near-impossible challenge of quickly recognizing anything that appears suspect. As a result, financial institutions must adopt a novel strategy that allows for rapid cross-channel data analysis and extraction while identifying fraud in real time. In addition, AI provides fraud analysts with a complete overview of transactions, allowing them to examine past data in context.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\">4. <strong>Facilitates digital businesses<\/strong><\/h3>\n\n\n\n<p>To meet business goals, AI helps digital enterprises reduce chargeback rates, decline rates, and operating expenses. One of the most valuable features of an&nbsp;AI-based fraud protection<\/p>\n\n\n\n<p>technology is its capacity to personalize and adjust business results for the entire company, individual product lines, departments, and selling seasons in real time. To achieve increasing agility, speed, and time-to-market levels, digital organizations depend on a combination of supervised and unsupervised machine learning, with AI-based fraud detection solutions at the heart of the endeavour.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\">5. <strong>Accomplish Regulatory Compliance<\/strong><\/h3>\n\n\n\n<p>Today, AI-based fraud protection helps companies comply with internal corporate regulations, regulatory authorities, and agreements with distribution partners. Financial institutions require a&nbsp;fraud detection system&nbsp;that uses AI and unsupervised machine learning to stay ahead of the game. Machine learning enables businesses to examine data in context across devices, applications, and transactions with minimal human intervention. This can save banks time and money by reducing the risk of expensive fines.<\/p>\n\n\n\n<p>Given the large quantities of money at stake and the constant threat posed by criminals, firms will need to utilize cutting-edge technologies that can adapt to remain ahead. While businesses may not be able to transition to advanced data analytics right away, they should start by reviewing their existing data, determining data requirements, and creating the talent needed to get started as soon as feasible.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The days of rule-based engines and simple prediction algorithms detecting most fraud attempts are long gone. As technology is advancing, the risk of being a<\/p>\n","protected":false},"author":1,"featured_media":170,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-169","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Artificial Intelligence used in Fraud Detection.<\/title>\n<meta name=\"description\" content=\"Artificial Intelligence can review years of Transaction data in minutes to compute risk scores and identifies Fraud and Financial Crime-related suspicious actions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/how-artificial-intelligence-used-in-fraud-detection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Artificial Intelligence used in Fraud Detection.\" \/>\n<meta property=\"og:description\" content=\"Artificial Intelligence can review years of Transaction data in minutes to compute risk scores and identifies Fraud and Financial Crime-related suspicious actions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/how-artificial-intelligence-used-in-fraud-detection\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Security Summit | Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-10T09:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-26T07:00:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-content\/uploads\/2022\/05\/cyber01.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"cyber-security-blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"cyber-security-blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/how-artificial-intelligence-used-in-fraud-detection\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/how-artificial-intelligence-used-in-fraud-detection\\\/\"},\"author\":{\"name\":\"cyber-security-blog\",\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/#\\\/schema\\\/person\\\/b577e17e4103ae2c9f712a5ea9c7e015\"},\"headline\":\"How Artificial Intelligence used in Fraud Detection\",\"datePublished\":\"2021-11-10T09:00:00+00:00\",\"dateModified\":\"2024-09-26T07:00:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/how-artificial-intelligence-used-in-fraud-detection\\\/\"},\"wordCount\":595,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/how-artificial-intelligence-used-in-fraud-detection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/cyber01.jpg\",\"articleSection\":[\"cyber security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/how-artificial-intelligence-used-in-fraud-detection\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/how-artificial-intelligence-used-in-fraud-detection\\\/\",\"url\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/how-artificial-intelligence-used-in-fraud-detection\\\/\",\"name\":\"How Artificial Intelligence used in Fraud Detection.\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/how-artificial-intelligence-used-in-fraud-detection\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/how-artificial-intelligence-used-in-fraud-detection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/cyber01.jpg\",\"datePublished\":\"2021-11-10T09:00:00+00:00\",\"dateModified\":\"2024-09-26T07:00:47+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/#\\\/schema\\\/person\\\/b577e17e4103ae2c9f712a5ea9c7e015\"},\"description\":\"Artificial Intelligence can review years of Transaction data in minutes to compute risk scores and identifies Fraud and Financial Crime-related suspicious actions.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/how-artificial-intelligence-used-in-fraud-detection\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/how-artificial-intelligence-used-in-fraud-detection\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/how-artificial-intelligence-used-in-fraud-detection\\\/#primaryimage\",\"url\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/cyber01.jpg\",\"contentUrl\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/cyber01.jpg\",\"width\":1000,\"height\":500,\"caption\":\"Artificial Intelligence in Fraud Detection\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/how-artificial-intelligence-used-in-fraud-detection\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Artificial Intelligence used in Fraud Detection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/\",\"name\":\"Cyber Security Summit Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/#\\\/schema\\\/person\\\/b577e17e4103ae2c9f712a5ea9c7e015\",\"name\":\"cyber-security-blog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5633e03856d812007a03f225c948ee3174c854c109072c782283501ec95c5878?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5633e03856d812007a03f225c948ee3174c854c109072c782283501ec95c5878?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5633e03856d812007a03f225c948ee3174c854c109072c782283501ec95c5878?s=96&d=mm&r=g\",\"caption\":\"cyber-security-blog\"},\"sameAs\":[\"https:\\\/\\\/www.cybersecuritysummitindia.com\\\/blogs\"],\"url\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/author\\\/cyber-security-blog\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Artificial Intelligence used in Fraud Detection.","description":"Artificial Intelligence can review years of Transaction data in minutes to compute risk scores and identifies Fraud and Financial Crime-related suspicious actions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/how-artificial-intelligence-used-in-fraud-detection\/","og_locale":"en_US","og_type":"article","og_title":"How Artificial Intelligence used in Fraud Detection.","og_description":"Artificial Intelligence can review years of Transaction data in minutes to compute risk scores and identifies Fraud and Financial Crime-related suspicious actions.","og_url":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/how-artificial-intelligence-used-in-fraud-detection\/","og_site_name":"Cyber Security Summit | Blogs","article_published_time":"2021-11-10T09:00:00+00:00","article_modified_time":"2024-09-26T07:00:47+00:00","og_image":[{"width":1000,"height":500,"url":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-content\/uploads\/2022\/05\/cyber01.jpg","type":"image\/jpeg"}],"author":"cyber-security-blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"cyber-security-blog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/how-artificial-intelligence-used-in-fraud-detection\/#article","isPartOf":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/how-artificial-intelligence-used-in-fraud-detection\/"},"author":{"name":"cyber-security-blog","@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/#\/schema\/person\/b577e17e4103ae2c9f712a5ea9c7e015"},"headline":"How Artificial Intelligence used in Fraud Detection","datePublished":"2021-11-10T09:00:00+00:00","dateModified":"2024-09-26T07:00:47+00:00","mainEntityOfPage":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/how-artificial-intelligence-used-in-fraud-detection\/"},"wordCount":595,"commentCount":0,"image":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/how-artificial-intelligence-used-in-fraud-detection\/#primaryimage"},"thumbnailUrl":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-content\/uploads\/2022\/05\/cyber01.jpg","articleSection":["cyber security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/exito-e.com\/cybersecuritysummit\/blog\/how-artificial-intelligence-used-in-fraud-detection\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/how-artificial-intelligence-used-in-fraud-detection\/","url":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/how-artificial-intelligence-used-in-fraud-detection\/","name":"How Artificial Intelligence used in Fraud Detection.","isPartOf":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/how-artificial-intelligence-used-in-fraud-detection\/#primaryimage"},"image":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/how-artificial-intelligence-used-in-fraud-detection\/#primaryimage"},"thumbnailUrl":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-content\/uploads\/2022\/05\/cyber01.jpg","datePublished":"2021-11-10T09:00:00+00:00","dateModified":"2024-09-26T07:00:47+00:00","author":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/#\/schema\/person\/b577e17e4103ae2c9f712a5ea9c7e015"},"description":"Artificial Intelligence can review years of Transaction data in minutes to compute risk scores and identifies Fraud and Financial Crime-related suspicious actions.","breadcrumb":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/how-artificial-intelligence-used-in-fraud-detection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/exito-e.com\/cybersecuritysummit\/blog\/how-artificial-intelligence-used-in-fraud-detection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/how-artificial-intelligence-used-in-fraud-detection\/#primaryimage","url":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-content\/uploads\/2022\/05\/cyber01.jpg","contentUrl":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-content\/uploads\/2022\/05\/cyber01.jpg","width":1000,"height":500,"caption":"Artificial Intelligence in Fraud Detection"},{"@type":"BreadcrumbList","@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/how-artificial-intelligence-used-in-fraud-detection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/"},{"@type":"ListItem","position":2,"name":"How Artificial Intelligence used in Fraud Detection"}]},{"@type":"WebSite","@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/#website","url":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/","name":"Cyber Security Summit Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/#\/schema\/person\/b577e17e4103ae2c9f712a5ea9c7e015","name":"cyber-security-blog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5633e03856d812007a03f225c948ee3174c854c109072c782283501ec95c5878?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5633e03856d812007a03f225c948ee3174c854c109072c782283501ec95c5878?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5633e03856d812007a03f225c948ee3174c854c109072c782283501ec95c5878?s=96&d=mm&r=g","caption":"cyber-security-blog"},"sameAs":["https:\/\/www.cybersecuritysummitindia.com\/blogs"],"url":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/author\/cyber-security-blog\/"}]}},"_links":{"self":[{"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/posts\/169","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/comments?post=169"}],"version-history":[{"count":1,"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/posts\/169\/revisions"}],"predecessor-version":[{"id":410,"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/posts\/169\/revisions\/410"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/media\/170"}],"wp:attachment":[{"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/media?parent=169"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/categories?post=169"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/tags?post=169"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}