{"id":327,"date":"2023-08-08T13:10:26","date_gmt":"2023-08-08T13:10:26","guid":{"rendered":"https:\/\/cxo.exrtechsolutions.com\/?p=327"},"modified":"2023-08-10T10:15:43","modified_gmt":"2023-08-10T10:15:43","slug":"cybersecurity-trends-to-keep-an-eye-on-in-2023","status":"publish","type":"post","link":"https:\/\/cxo.exrtechsolutions.com\/index.php\/2023\/08\/08\/cybersecurity-trends-to-keep-an-eye-on-in-2023\/","title":{"rendered":"Cybersecurity Trends to Keep an Eye on in 2023"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"327\" class=\"elementor elementor-327\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c172826 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"c172826\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-149c93d2\" data-id=\"149c93d2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-40336de4 elementor-widget elementor-widget-heading\" data-id=\"40336de4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.15.0 - 02-08-2023 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">cxo<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10404da6 elementor-widget elementor-widget-text-editor\" data-id=\"10404da6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.15.0 - 02-08-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>UPDATES<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-5d5c2a83\" data-id=\"5d5c2a83\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-4a7fd4d0\" data-id=\"4a7fd4d0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-120e05ae elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"120e05ae\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-24cf9c5c\" data-id=\"24cf9c5c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1f58cc1 elementor-widget elementor-widget-heading\" data-id=\"1f58cc1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Cybersecurity Trends to Keep an Eye on in 2023\n<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-437459c elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"437459c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1a3b7d01\" data-id=\"1a3b7d01\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c940c0d elementor-widget elementor-widget-text-editor\" data-id=\"c940c0d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Keeping up with cybersecurity threats has always been challenging, but today\u2019s rate of new threats is alarming. With an expanding attack surface driven by remote working and cloud adoption, the challenges facing today\u2019s security industry could be described as a perfect storm, given the sophistication of cyber attackers and the proliferation of security tools. This dynamic can result in disconnected insights and data, adding to the already existing shortage of security skills. <\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-69ac751f\" data-id=\"69ac751f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52d28d35 elementor-widget elementor-widget-image\" data-id=\"52d28d35\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.15.0 - 02-08-2023 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/cxo.exrtechsolutions.com\/wp-content\/uploads\/2023\/08\/Top-5-Edge-AI-Trends-to-Watch-in-2023-AI-EdgeTech-3-1024x576.png\" class=\"attachment-large size-large wp-image-333\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/cxo.exrtechsolutions.com\/wp-content\/uploads\/2023\/08\/Top-5-Edge-AI-Trends-to-Watch-in-2023-AI-EdgeTech-3-1024x576.png 1024w, https:\/\/cxo.exrtechsolutions.com\/wp-content\/uploads\/2023\/08\/Top-5-Edge-AI-Trends-to-Watch-in-2023-AI-EdgeTech-3-300x169.png 300w, https:\/\/cxo.exrtechsolutions.com\/wp-content\/uploads\/2023\/08\/Top-5-Edge-AI-Trends-to-Watch-in-2023-AI-EdgeTech-3-768x432.png 768w, https:\/\/cxo.exrtechsolutions.com\/wp-content\/uploads\/2023\/08\/Top-5-Edge-AI-Trends-to-Watch-in-2023-AI-EdgeTech-3-1536x864.png 1536w, https:\/\/cxo.exrtechsolutions.com\/wp-content\/uploads\/2023\/08\/Top-5-Edge-AI-Trends-to-Watch-in-2023-AI-EdgeTech-3.png 1920w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4b204e61 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"4b204e61\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2f020092\" data-id=\"2f020092\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-65f0af0b elementor-widget elementor-widget-text-editor\" data-id=\"65f0af0b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Security teams are changing how they approach threat detection and response. In order to safeguard against complex threats and navigate digital transformation safely, organisations need broad visibility, linked data, and the ability to make quick decisions.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">As per the Cost of Data Breach Report 2022, the average total cost of data breaches in India has gone up more than 3X from INR 53.5 million in 2012 to INR 176.0 million in 2022. It is taking longer to identify and contain these breaches. Moreover, 5G will enable more devices to connect at fast speeds, which will increase the pressure to update security monitoring methods. AI and hybrid clouds will also scale in a way never imagined before, and cybersecurity will play a major role in this. In a country like India undergoing exponential digital transformation, these trends signal the need for organisations to strengthen their digital defences to counter the scale and severity of cyber-attacks.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">For India to grow in the techade, it is the need of the hour for businesses to strengthen and continuously improve their digital defences. Here are a few cyber security trends to watch out for in 2023.\u00a0<\/span><\/p><p><br \/><br \/><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2c870fd8 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"2c870fd8\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-39d24009\" data-id=\"39d24009\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-48d87fe5 elementor-widget elementor-widget-heading\" data-id=\"48d87fe5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Critical Infrastructure Showing \u2018Blind Trust\u2019:<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6761fcc8 elementor-widget elementor-widget-text-editor\" data-id=\"6761fcc8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The pandemic in essence has re-shaped critical infrastructure. In the last two years, more than ever, the world relied heavily on manufacturing \u2013 there were great hurdles to overcome to keep up on production. In fact, as per the Cost of Data Breach report 2022, over 1 in 4 critical infrastructure businesses breached suffered a ransomware or destructive attack, at a time when multiple nations\u2019 cyber authorities are urging heightened vigilance to these sectors. Organisations need to change their approaches to conventional cybersecurity and implement a Zero Trust framework that only provides access to authentic and identifiable users.<\/span><\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7fe55298 elementor-widget elementor-widget-heading\" data-id=\"7fe55298\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Securing Hybrid Cloud: <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23864415 elementor-widget elementor-widget-text-editor\" data-id=\"23864415\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul><li><span style=\"font-weight: 400;\">Whether the data lives on-prem, in public or private clouds, or at the edge, organisations must implement holistic security strategies to ensure data protection in 2023. Security must be considered at every step of the hybrid multi cloud journey to be successful. As part of hybrid cloud architecture, key concerns such as adapting security strategies for multi-clouds, introducing new tools and unfamiliar technologies, sharing responsibility and third party risks, an expanding threat landscape, dissolved perimeters, siloed visibility of threats, securing critical data and managing access, and increased risks of misconfigurations and compliance monitoring need to be addressed.<\/span><\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e03c46b elementor-widget elementor-widget-heading\" data-id=\"1e03c46b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Quantum-safety needs to be taken seriously:\n<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-278bce7f elementor-widget elementor-widget-text-editor\" data-id=\"278bce7f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Increasingly, enterprises will become interested in quantum-safe cryptography and security to protect their data from being tampered with, hacked, or manipulated as quantum computing becomes more sophisticated and poses potential risks, including the ability to break encryption algorithms quickly and access sensitive data.<\/span><\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61684de6 elementor-widget elementor-widget-heading\" data-id=\"61684de6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Artificial Intelligence and Automation Are Boosting Defenders:<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-194ae33e elementor-widget elementor-widget-text-editor\" data-id=\"194ae33e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">According to IBM\u2019s most recent Cost of a Data Breach Report, organisations with fully implemented security AI and automation save $3.05 million per data breach. It\u2019s a 65.2% difference in average breach costs. An increasing number of organisations are adopting AI-powered automation to improve insights, productivity, and economies of scale in threat management. AI and automation will be a critical component of this new security landscape as we progress into India\u2019s techade.\u00a0<\/span><\/li><\/ul><p><br \/><br \/><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3db0a9b2 elementor-widget elementor-widget-heading\" data-id=\"3db0a9b2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">XDR and Zero Trust Strategies must be integrated:<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-34ff0562 elementor-widget elementor-widget-text-editor\" data-id=\"34ff0562\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">By integrating Zero Trust and XDR strategies, organisations can modernise security operations and adopt digital transformation, making security a business enabler by adapting dynamically to users, datasets, and workloads across the organisation, no matter where they are.\u00a0<\/span><\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e6b4cbe elementor-widget elementor-widget-heading\" data-id=\"7e6b4cbe\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Attack surface management and offensive security will perform the role of a trusted adversary for customers:\n<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-45ea5849 elementor-widget elementor-widget-text-editor\" data-id=\"45ea5849\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Given the exponential growth in exposure points in the hybrid cloud operating environments due to the remote and hybrid working models, the continuous discovery, inventory, classification and monitoring of an enterprise\u2019s IT infrastructure is mission critical. In fact, ESG data suggests 67% of companies saw the external attack surface expand over the past two years with 69% of them being compromised. It is important to bring attackers&#8217; point-of-view into the security operation centre and continuously identify external facing assets, both on-premises or in the cloud, that are visible to attackers and prioritise exposures which pose the greatest risk.\u00a0<\/span><\/li><\/ul><p>\u00a0<\/p><ul><li><span style=\"font-weight: 400;\">Gain Visibility into Insider threats as it will be on rise: It is widely believed that the impact of insider threat is more expensive than external threats. The fact that it takes time to detect and contain an insider threat has severe implications on the cost of an insider threat incident.\u00a0<\/span><\/li><\/ul><p><br \/><br \/><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4e204103 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"4e204103\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-779b2baf\" data-id=\"779b2baf\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>cxo UPDATES Cybersecurity Trends to Keep an Eye on in 2023 Keeping up with cybersecurity threats has always been challenging, but today\u2019s rate of new threats is alarming. With an expanding attack surface driven by remote working and cloud adoption, the challenges facing today\u2019s security industry could be described as a perfect storm, given the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":373,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_canvas","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/posts\/327"}],"collection":[{"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/comments?post=327"}],"version-history":[{"count":11,"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/posts\/327\/revisions"}],"predecessor-version":[{"id":493,"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/posts\/327\/revisions\/493"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/media\/373"}],"wp:attachment":[{"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/media?parent=327"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/categories?post=327"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/tags?post=327"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}