{"id":189,"date":"2022-12-07T08:33:49","date_gmt":"2022-12-07T08:33:49","guid":{"rendered":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/?p=189"},"modified":"2025-10-17T06:28:44","modified_gmt":"2025-10-17T06:28:44","slug":"top-5-cyber-security-trends-in-australia","status":"publish","type":"post","link":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/top-5-cyber-security-trends-in-australia\/","title":{"rendered":"Top 5 Cyber Security Trends in Australia"},"content":{"rendered":"\n<p class=\"has-medium-font-size wp-block-paragraph\"><strong>Introduction<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-justify wp-block-paragraph\">Cyber Security is evolving quickly with an increase in the number of cybercrimes. Companies struggle to keep their critical data safe since cyber security threats is one of the world\u2019s most pervasive security risks today. Phishing, Ransomware, DDoS attacks and Cloud computing vulnerabilities are the most common cyber threats that large businesses face today in Australia. Criminals preying on people with Cyber Extortion, Ransomware, and Cyber Blackmail take advantage of the unknowns of the internet, which means they often make claims of having your company secret data or your search history, in order to trick you into paying them money.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\"><strong>Here are the Top 5 Cyber Security Trends for businesses in <a href=\"https:\/\/exito-e.com\/cybersecuritysummit\/australia\/\" target=\"_blank\" rel=\"noreferrer noopener\">Australia<\/a><\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\"><strong>1. Evolution of&nbsp;Internet of Things(IoT) <\/strong><\/h3>\n\n\n\n<p class=\"has-text-align-justify wp-block-paragraph\">The expansion of IoT is creating more cyber crime opportunities. Besides, experts have estimated around 64 billion IoT devices worldwide by 2026. Most IoT devices have lesser storage capabilities, making it hard to employ antivirus, firewalls, and other related security applications. As a result, IoT attacks have been appearing all over the world. For example, during the year 2020-21, Australians faced a complex cyber threat environment, where ransomware cases increased to nearly 160 percent.<\/p>\n\n\n\n<p class=\"has-text-align-justify wp-block-paragraph\">The continuous rise of such evolution has being quickly adopted by various businesses, and has been foremost in building automated security systems, automatic threat detection and related techniques. Hackers are also taking full advantage of it for automating their attacks using techniques like model stealing.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\"><strong>&nbsp;2. Cyber extortion on the rise of ransomware :<\/strong><\/h3>\n\n\n\n<p class=\"has-text-align-justify wp-block-paragraph\">&nbsp;Cyber Extortion is becoming an increasingly popular form of cybercrime. They have been around for a long time, but the methods and means are becoming more sophisticated, legit and confusing.&nbsp; Raise in ransomware, although ransomware is not new but a growing cyber threat around the world. Ransomware besides cyber extortion and cyber blackmail are the most common forms of cyber crime and perhaps can cost a lot more than the initial payment. According to the Australian Cyber Security Centre (ACSC),&nbsp; Ransomware made history in cyberattacks, contributing to the first reported death in 2020. In 2022, the rise of Bring Your Own Device (BYOD) and IoT devices will cause more cyber security issues.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\">&nbsp;<strong>3<\/strong>. <strong>Cloudsecuritychallenges :<\/strong><\/h3>\n\n\n\n<p class=\"has-text-align-justify wp-block-paragraph\">Companies across the world are now facing a huge challenge to diversify in adoption of cloud services at a rapid pace. Over 70% of the enterprises that use cloud security as service have plans to increase their investment in cloud security technology. Cloud security is a challenge not because of the technology itself, but because of the way enterprises handle security concerns.<\/p>\n\n\n\n<p class=\"has-text-align-justify wp-block-paragraph\">For businesses making the transition to the cloud, security is one of the biggest challenges. Security threats are constantly evolving and becoming more sophisticated, and cloud computing is no less at risk to its own environment. Misconfigured cloud settings are the major cause of data breaches, along with other dangerous cyber attacks. Hence, many businesses are investing in heavier password protection and other cyber security measures to keep that data from getting into the wrong hands.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\"><strong>&nbsp;4. NIST Cybersecurity Framework :<\/strong><\/h3>\n\n\n\n<p class=\"has-text-align-justify wp-block-paragraph\">The NIST cybersecurity framework is a powerful tool to organize and improve your cybersecurity program. It is a set of guidelines and best practices to help organizations build and improve their cybersecurity posture. The framework puts forth a set of recommendations and standards that enable organizations to prepare better for identifying and detecting cyber-attacks, and also provides guidelines on how to respond, prevent, and recover from cyber incidents.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\"><strong>5.<\/strong> <strong>Incident Response and Forensics :<\/strong><\/h3>\n\n\n\n<p class=\"has-text-align-justify wp-block-paragraph\">Digital forensics in automated sense refers to the application of science to identify, collect, examine and analyse data while preserving the integrity of information and maintaining a strict chain of custody for the data. Document evidence in digital forensics is a record of all visible data that must be created, which helps in recreating and reviewing it at times. Incident response is an organized approach to address and manage the aftermath of a security breach or cyberattack, which also requires specialized skills to ensure you are covered legally and digitally.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Conclusion<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-justify wp-block-paragraph\">Cybersecurity is a serious issue not just for businesses and governments but for individuals too. There are so many threats out there now. Some of the biggest dangers include phishing, ransomware, and viruses. We hope that our blog post has been able to provide some helpful information on the top 5 cyber security trends in Australia. Thank you for reading!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction Cyber Security is evolving quickly with an increase in the number of cybercrimes. Companies struggle to keep their critical data safe since cyber security<\/p>\n","protected":false},"author":1,"featured_media":190,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-189","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Top 5 Cyber Security Trends in Australia.<\/title>\n<meta name=\"description\" content=\"DDoS attacks and Cloud Computing Vulnerabilities are the most common Cyber Threats that large Businesses faced in Australia.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/top-5-cyber-security-trends-in-australia\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 5 Cyber Security Trends in Australia.\" \/>\n<meta property=\"og:description\" content=\"DDoS attacks and Cloud Computing Vulnerabilities are the most common Cyber Threats that large Businesses faced in Australia.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/top-5-cyber-security-trends-in-australia\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Security Summit | Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-07T08:33:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-17T06:28:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-content\/uploads\/2022\/12\/CSS-Blog-image.png\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"366\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"cyber-security-blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"cyber-security-blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/top-5-cyber-security-trends-in-australia\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/top-5-cyber-security-trends-in-australia\\\/\"},\"author\":{\"name\":\"cyber-security-blog\",\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/#\\\/schema\\\/person\\\/b577e17e4103ae2c9f712a5ea9c7e015\"},\"headline\":\"Top 5 Cyber Security Trends in Australia\",\"datePublished\":\"2022-12-07T08:33:49+00:00\",\"dateModified\":\"2025-10-17T06:28:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/top-5-cyber-security-trends-in-australia\\\/\"},\"wordCount\":728,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/top-5-cyber-security-trends-in-australia\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/CSS-Blog-image.png\",\"articleSection\":[\"cyber security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/top-5-cyber-security-trends-in-australia\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/top-5-cyber-security-trends-in-australia\\\/\",\"url\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/top-5-cyber-security-trends-in-australia\\\/\",\"name\":\"Top 5 Cyber Security Trends in Australia.\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/top-5-cyber-security-trends-in-australia\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/top-5-cyber-security-trends-in-australia\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/CSS-Blog-image.png\",\"datePublished\":\"2022-12-07T08:33:49+00:00\",\"dateModified\":\"2025-10-17T06:28:44+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/#\\\/schema\\\/person\\\/b577e17e4103ae2c9f712a5ea9c7e015\"},\"description\":\"DDoS attacks and Cloud Computing Vulnerabilities are the most common Cyber Threats that large Businesses faced in Australia.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/top-5-cyber-security-trends-in-australia\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/top-5-cyber-security-trends-in-australia\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/top-5-cyber-security-trends-in-australia\\\/#primaryimage\",\"url\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/CSS-Blog-image.png\",\"contentUrl\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/CSS-Blog-image.png\",\"width\":700,\"height\":366,\"caption\":\"Cyber Security Trends in Australia\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/top-5-cyber-security-trends-in-australia\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top 5 Cyber Security Trends in Australia\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/\",\"name\":\"Cyber Security Summit Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/#\\\/schema\\\/person\\\/b577e17e4103ae2c9f712a5ea9c7e015\",\"name\":\"cyber-security-blog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5633e03856d812007a03f225c948ee3174c854c109072c782283501ec95c5878?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5633e03856d812007a03f225c948ee3174c854c109072c782283501ec95c5878?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5633e03856d812007a03f225c948ee3174c854c109072c782283501ec95c5878?s=96&d=mm&r=g\",\"caption\":\"cyber-security-blog\"},\"sameAs\":[\"https:\\\/\\\/www.cybersecuritysummitindia.com\\\/blogs\"],\"url\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/author\\\/cyber-security-blog\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top 5 Cyber Security Trends in Australia.","description":"DDoS attacks and Cloud Computing Vulnerabilities are the most common Cyber Threats that large Businesses faced in Australia.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/top-5-cyber-security-trends-in-australia\/","og_locale":"en_US","og_type":"article","og_title":"Top 5 Cyber Security Trends in Australia.","og_description":"DDoS attacks and Cloud Computing Vulnerabilities are the most common Cyber Threats that large Businesses faced in Australia.","og_url":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/top-5-cyber-security-trends-in-australia\/","og_site_name":"Cyber Security Summit | Blogs","article_published_time":"2022-12-07T08:33:49+00:00","article_modified_time":"2025-10-17T06:28:44+00:00","og_image":[{"width":700,"height":366,"url":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-content\/uploads\/2022\/12\/CSS-Blog-image.png","type":"image\/png"}],"author":"cyber-security-blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"cyber-security-blog","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/top-5-cyber-security-trends-in-australia\/#article","isPartOf":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/top-5-cyber-security-trends-in-australia\/"},"author":{"name":"cyber-security-blog","@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/#\/schema\/person\/b577e17e4103ae2c9f712a5ea9c7e015"},"headline":"Top 5 Cyber Security Trends in Australia","datePublished":"2022-12-07T08:33:49+00:00","dateModified":"2025-10-17T06:28:44+00:00","mainEntityOfPage":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/top-5-cyber-security-trends-in-australia\/"},"wordCount":728,"commentCount":0,"image":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/top-5-cyber-security-trends-in-australia\/#primaryimage"},"thumbnailUrl":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-content\/uploads\/2022\/12\/CSS-Blog-image.png","articleSection":["cyber security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/exito-e.com\/cybersecuritysummit\/blog\/top-5-cyber-security-trends-in-australia\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/top-5-cyber-security-trends-in-australia\/","url":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/top-5-cyber-security-trends-in-australia\/","name":"Top 5 Cyber Security Trends in Australia.","isPartOf":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/top-5-cyber-security-trends-in-australia\/#primaryimage"},"image":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/top-5-cyber-security-trends-in-australia\/#primaryimage"},"thumbnailUrl":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-content\/uploads\/2022\/12\/CSS-Blog-image.png","datePublished":"2022-12-07T08:33:49+00:00","dateModified":"2025-10-17T06:28:44+00:00","author":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/#\/schema\/person\/b577e17e4103ae2c9f712a5ea9c7e015"},"description":"DDoS attacks and Cloud Computing Vulnerabilities are the most common Cyber Threats that large Businesses faced in Australia.","breadcrumb":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/top-5-cyber-security-trends-in-australia\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/exito-e.com\/cybersecuritysummit\/blog\/top-5-cyber-security-trends-in-australia\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/top-5-cyber-security-trends-in-australia\/#primaryimage","url":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-content\/uploads\/2022\/12\/CSS-Blog-image.png","contentUrl":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-content\/uploads\/2022\/12\/CSS-Blog-image.png","width":700,"height":366,"caption":"Cyber Security Trends in Australia"},{"@type":"BreadcrumbList","@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/top-5-cyber-security-trends-in-australia\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/"},{"@type":"ListItem","position":2,"name":"Top 5 Cyber Security Trends in Australia"}]},{"@type":"WebSite","@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/#website","url":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/","name":"Cyber Security Summit Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/#\/schema\/person\/b577e17e4103ae2c9f712a5ea9c7e015","name":"cyber-security-blog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5633e03856d812007a03f225c948ee3174c854c109072c782283501ec95c5878?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5633e03856d812007a03f225c948ee3174c854c109072c782283501ec95c5878?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5633e03856d812007a03f225c948ee3174c854c109072c782283501ec95c5878?s=96&d=mm&r=g","caption":"cyber-security-blog"},"sameAs":["https:\/\/www.cybersecuritysummitindia.com\/blogs"],"url":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/author\/cyber-security-blog\/"}]}},"_links":{"self":[{"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/posts\/189","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/comments?post=189"}],"version-history":[{"count":2,"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/posts\/189\/revisions"}],"predecessor-version":[{"id":441,"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/posts\/189\/revisions\/441"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/media\/190"}],"wp:attachment":[{"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/media?parent=189"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/categories?post=189"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/tags?post=189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}