{"id":62426,"date":"2020-03-12T17:31:44","date_gmt":"2020-03-12T17:31:44","guid":{"rendered":"https:\/\/\/lancement-de-breach-defense-la-nouvelle-plateforme-doperations-de-securite-de-keysight\/"},"modified":"2020-03-12T17:31:44","modified_gmt":"2020-03-12T17:31:44","slug":"lancement-de-breach-defense-la-nouvelle-plateforme-doperations-de-securite-de-keysight","status":"publish","type":"post","link":"https:\/\/www.ecinews.fr\/fr\/lancement-de-breach-defense-la-nouvelle-plateforme-doperations-de-securite-de-keysight\/","title":{"rendered":"Lancement de Breach Defense, la nouvelle plateforme d\u2019op\u00e9rations de s\u00e9curit\u00e9 de Keysight"},"content":{"rendered":"<p>Les \u00e9quipes charg\u00e9es des op\u00e9rations de s\u00e9curit\u00e9 sont confront\u00e9es \u00e0 un environnement r\u00e9seau de plus en plus&nbsp;complexe, continuellement attaqu\u00e9 par un flot de cyber-menaces g\u00e9n\u00e9r\u00e9es \u00e0 l&rsquo;int\u00e9rieur et \u00e0 l&rsquo;ext\u00e9rieur de leurs&nbsp;organisations. Selon une r\u00e9cente enqu\u00eate de Keysight sur l&rsquo;efficacit\u00e9 des op\u00e9rations de s\u00e9curit\u00e9 on constate&nbsp;que :<\/p>\n<p>\u25cf&nbsp;Les bons outils de s\u00e9curit\u00e9&nbsp;ne sont pas aussi efficaces que pr\u00e9vus :&nbsp;50 % des personnes interrog\u00e9es&nbsp;ont d\u00e9clar\u00e9 qu&rsquo;un outil de s\u00e9curit\u00e9 ne fonctionnait plus apr\u00e8s qu&rsquo;une attaque se soit produite.<\/p>\n<p>\u25cf&nbsp;La plupart des entreprises ne v\u00e9rifient pas que leurs outils de s\u00e9curit\u00e9 fonctionnent&nbsp;comme ils le&nbsp;devraient :&nbsp;seulement 35% des personnes interrog\u00e9es ont effectu\u00e9 des tests prouvant que leurs outils de&nbsp;s\u00e9curit\u00e9 sont bien configur\u00e9s et fonctionnent correctement.<\/p>\n<p>\u25cf&nbsp;La valeur du test de s\u00e9curit\u00e9 :&nbsp;86% des personnes interrog\u00e9es ont d\u00e9clar\u00e9 qu\u2019elles appr\u00e9cieraient une&nbsp;solution qui permette de trouver les failles du syst\u00e8me de s\u00e9curit\u00e9 et d\u2019y rem\u00e9dier.<\/p>\n<p>\u00ab\u00a0M\u00eame les meilleurs produits de s\u00e9curit\u00e9 ne peuvent pas vous prot\u00e9ger s&rsquo;ils ne sont pas correctement&nbsp;configur\u00e9s\u00a0\u00bb,&nbsp;a d\u00e9clar\u00e9 Doug Close, vice-pr\u00e9sident senior de la cybers\u00e9curit\u00e9 chez Sayers.&nbsp;\u00ab\u00a0Le fait de pouvoir&nbsp;simuler automatiquement des attaques, de d\u00e9tecter les failles de s\u00e9curit\u00e9 et de recevoir des recommandations&nbsp;d\u00e9taill\u00e9es donne aux clients un avantage consid\u00e9rable, tant pour combler les lacunes que pour am\u00e9liorer les&nbsp;op\u00e9rations de s\u00e9curit\u00e9 au quotidien\u00a0\u00bb.<\/p>\n<p>\u00ab\u00a0Une organisation peut \u00eatre infaillible un jour et vuln\u00e9rable le lendemain. Tester les capacit\u00e9s de s\u00e9curit\u00e9 \u00e0 un&nbsp;moment donn\u00e9 donne une visibilit\u00e9 limit\u00e9e de la posture de s\u00e9curit\u00e9 permanente d&rsquo;une organisation\u00a0\u00bb, a d\u00e9clar\u00e9<\/p>\n<p>Paula Musich,&nbsp;Directrice de recherche, s\u00e9curit\u00e9 et gestion des risques chez Enterprise Management<\/p>\n<p>Associates. \u00ab\u00a0Au fond, la s\u00e9curit\u00e9 est \u00e0 la fois une question de personnes et de processus. En testant&nbsp;r\u00e9guli\u00e8rement les d\u00e9fenses \u00e0 l&rsquo;aide de simulations d&rsquo;attaques, les \u00e9quipes charg\u00e9es des op\u00e9rations de s\u00e9curit\u00e9&nbsp;peuvent se tenir au courant des changements susceptibles de transformer une bonne hygi\u00e8ne de s\u00e9curit\u00e9 en&nbsp;une vuln\u00e9rabilit\u00e9 exploitable\u00a0\u00bb.<\/p>\n<p>La solution Threat Simulator de Keysight fournit aux \u00e9quipes d&rsquo;op\u00e9rations de s\u00e9curit\u00e9 des entreprises une&nbsp;m\u00e9thode pour tester les outils de s\u00e9curit\u00e9, afin de d\u00e9terminer leur efficacit\u00e9 \u00e0 prot\u00e9ger l&rsquo;organisation. Il fournit&nbsp;une \u00e9valuation continue et automatis\u00e9e de la s\u00e9curit\u00e9 des infrastructures des r\u00e9seaux de production de bout&nbsp;en bout. Permettant ainsi aux organisations de rep\u00e9rer rapidement les lacunes des configurations de s\u00e9curit\u00e9,&nbsp;qui sont g\u00e9n\u00e9ralement le r\u00e9sultat d&rsquo;un changement effectu\u00e9 par une personne du service informatique ou un&nbsp;groupe apparent\u00e9 sans aucune intention malveillante, tandis qu&rsquo;un moteur de recommandation brevet\u00e9 fournit&nbsp;des mesures correctives claires.<\/p>\n<p><a href=\"http:\/\/www.keysight.com\">www.keysight.com<\/a><\/p>\n<h3 class=\"title\"><a href=\"https:\/\/www.electronique-eci.com\/news\/des-professionnels-de-la-securite-trop-confiants-au-detriment-de-lefficacite-de-leurs-outils\">Des professionnels de la s\u00e9curit\u00e9 trop confiants au d\u00e9triment de l\u2019efficacit\u00e9 de leurs outils<\/a><\/h3>\n","protected":false},"excerpt":{"rendered":"<p>L\u2019objectif principal de la nouvelle plateforme Breach Defense de Keysight Technologies r\u00e9side dans la simulation de br\u00e8ches et d&rsquo;attaques, s\u2019appuyant sur des failles r\u00e9centes ayant eu le plus de r\u00e9sonance, ce qui permet aux \u00e9quipes de s\u00e9curit\u00e9 et de r\u00e9seau de mesurer l&rsquo;efficacit\u00e9 des outils puis de les am\u00e9liorer.<\/p>\n","protected":false},"author":9,"featured_media":62427,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[],"tags":[],"domains":[47],"ppma_author":[1141],"class_list":["post-62426","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","domains-electronique-eci"],"acf":[],"yoast_head":"<title>Lancement de Breach Defense, la nouvelle plateforme d\u2019op\u00e9rat...<\/title>\n<meta name=\"description\" content=\"L\u2019objectif principal de la nouvelle plateforme Breach Defense de Keysight Technologies r\u00e9side dans la simulation de br\u00e8ches et d&#039;attaques, s\u2019appuyant...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/62426\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Lancement de Breach Defense, la nouvelle plateforme d\u2019op\u00e9rations de s\u00e9curit\u00e9 de Keysight\" \/>\n<meta property=\"og:description\" content=\"L\u2019objectif principal de la nouvelle plateforme Breach Defense de Keysight Technologies r\u00e9side dans la simulation de br\u00e8ches et d&#039;attaques, s\u2019appuyant sur des failles r\u00e9centes ayant eu le plus de r\u00e9sonance, ce qui permet aux \u00e9quipes de s\u00e9curit\u00e9 et de r\u00e9seau de mesurer l&#039;efficacit\u00e9 des outils puis de les am\u00e9liorer.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/62426\/\" \/>\n<meta property=\"og:site_name\" content=\"EENewsEurope\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-12T17:31:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/import\/default\/files\/sites\/default\/files\/images\/eci8483_keysight.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2520\" \/>\n\t<meta property=\"og:image:height\" content=\"2252\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alain Dieul\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alain Dieul\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/lancement-de-breach-defense-la-nouvelle-plateforme-doperations-de-securite-de-keysight\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/lancement-de-breach-defense-la-nouvelle-plateforme-doperations-de-securite-de-keysight\/\"},\"author\":{\"name\":\"Alain Dieul\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/568c789a4794bd460460501ba91f5daf\"},\"headline\":\"Lancement de Breach Defense, la nouvelle plateforme d\u2019op\u00e9rations de s\u00e9curit\u00e9 de Keysight\",\"datePublished\":\"2020-03-12T17:31:44+00:00\",\"dateModified\":\"2020-03-12T17:31:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/lancement-de-breach-defense-la-nouvelle-plateforme-doperations-de-securite-de-keysight\/\"},\"wordCount\":560,\"publisher\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#organization\"},\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/lancement-de-breach-defense-la-nouvelle-plateforme-doperations-de-securite-de-keysight\/\",\"url\":\"https:\/\/www.ecinews.fr\/fr\/lancement-de-breach-defense-la-nouvelle-plateforme-doperations-de-securite-de-keysight\/\",\"name\":\"Lancement de Breach Defense, la nouvelle plateforme d\u2019op\u00e9rations de s\u00e9curit\u00e9 de Keysight -\",\"isPartOf\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#website\"},\"datePublished\":\"2020-03-12T17:31:44+00:00\",\"dateModified\":\"2020-03-12T17:31:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/lancement-de-breach-defense-la-nouvelle-plateforme-doperations-de-securite-de-keysight\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ecinews.fr\/fr\/lancement-de-breach-defense-la-nouvelle-plateforme-doperations-de-securite-de-keysight\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/lancement-de-breach-defense-la-nouvelle-plateforme-doperations-de-securite-de-keysight\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ecinews.fr\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Lancement de Breach Defense, la nouvelle plateforme d\u2019op\u00e9rations de s\u00e9curit\u00e9 de Keysight\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#website\",\"url\":\"https:\/\/www.eenewseurope.com\/en\/\",\"name\":\"EENewsEurope\",\"description\":\"Just another WordPress site\",\"publisher\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.eenewseurope.com\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#organization\",\"name\":\"EENewsEurope\",\"url\":\"https:\/\/www.eenewseurope.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"contentUrl\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"width\":283,\"height\":113,\"caption\":\"EENewsEurope\"},\"image\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/568c789a4794bd460460501ba91f5daf\",\"name\":\"Alain Dieul\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/image\/6d32dc651fbcef3b338066625b118364\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/93708ec89b35deb10f4cfbfe144b4e07?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/93708ec89b35deb10f4cfbfe144b4e07?s=96&d=mm&r=g\",\"caption\":\"Alain Dieul\"}}]}<\/script>","yoast_head_json":{"title":"Lancement de Breach Defense, la nouvelle plateforme d\u2019op\u00e9rat...","description":"L\u2019objectif principal de la nouvelle plateforme Breach Defense de Keysight Technologies r\u00e9side dans la simulation de br\u00e8ches et d'attaques, s\u2019appuyant...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/62426\/","og_locale":"fr_FR","og_type":"article","og_title":"Lancement de Breach Defense, la nouvelle plateforme d\u2019op\u00e9rations de s\u00e9curit\u00e9 de Keysight","og_description":"L\u2019objectif principal de la nouvelle plateforme Breach Defense de Keysight Technologies r\u00e9side dans la simulation de br\u00e8ches et d'attaques, s\u2019appuyant sur des failles r\u00e9centes ayant eu le plus de r\u00e9sonance, ce qui permet aux \u00e9quipes de s\u00e9curit\u00e9 et de r\u00e9seau de mesurer l'efficacit\u00e9 des outils puis de les am\u00e9liorer.","og_url":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/62426\/","og_site_name":"EENewsEurope","article_published_time":"2020-03-12T17:31:44+00:00","og_image":[{"width":2520,"height":2252,"url":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/import\/default\/files\/sites\/default\/files\/images\/eci8483_keysight.jpg","type":"image\/jpeg"}],"author":"Alain Dieul","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alain Dieul","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ecinews.fr\/fr\/lancement-de-breach-defense-la-nouvelle-plateforme-doperations-de-securite-de-keysight\/#article","isPartOf":{"@id":"https:\/\/www.ecinews.fr\/fr\/lancement-de-breach-defense-la-nouvelle-plateforme-doperations-de-securite-de-keysight\/"},"author":{"name":"Alain Dieul","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/568c789a4794bd460460501ba91f5daf"},"headline":"Lancement de Breach Defense, la nouvelle plateforme d\u2019op\u00e9rations de s\u00e9curit\u00e9 de Keysight","datePublished":"2020-03-12T17:31:44+00:00","dateModified":"2020-03-12T17:31:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ecinews.fr\/fr\/lancement-de-breach-defense-la-nouvelle-plateforme-doperations-de-securite-de-keysight\/"},"wordCount":560,"publisher":{"@id":"https:\/\/www.eenewseurope.com\/en\/#organization"},"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.ecinews.fr\/fr\/lancement-de-breach-defense-la-nouvelle-plateforme-doperations-de-securite-de-keysight\/","url":"https:\/\/www.ecinews.fr\/fr\/lancement-de-breach-defense-la-nouvelle-plateforme-doperations-de-securite-de-keysight\/","name":"Lancement de Breach Defense, la nouvelle plateforme d\u2019op\u00e9rations de s\u00e9curit\u00e9 de Keysight -","isPartOf":{"@id":"https:\/\/www.eenewseurope.com\/en\/#website"},"datePublished":"2020-03-12T17:31:44+00:00","dateModified":"2020-03-12T17:31:44+00:00","breadcrumb":{"@id":"https:\/\/www.ecinews.fr\/fr\/lancement-de-breach-defense-la-nouvelle-plateforme-doperations-de-securite-de-keysight\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ecinews.fr\/fr\/lancement-de-breach-defense-la-nouvelle-plateforme-doperations-de-securite-de-keysight\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ecinews.fr\/fr\/lancement-de-breach-defense-la-nouvelle-plateforme-doperations-de-securite-de-keysight\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ecinews.fr\/fr\/"},{"@type":"ListItem","position":2,"name":"Lancement de Breach Defense, la nouvelle plateforme d\u2019op\u00e9rations de s\u00e9curit\u00e9 de Keysight"}]},{"@type":"WebSite","@id":"https:\/\/www.eenewseurope.com\/en\/#website","url":"https:\/\/www.eenewseurope.com\/en\/","name":"EENewsEurope","description":"Just another WordPress site","publisher":{"@id":"https:\/\/www.eenewseurope.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eenewseurope.com\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.eenewseurope.com\/en\/#organization","name":"EENewsEurope","url":"https:\/\/www.eenewseurope.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","contentUrl":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","width":283,"height":113,"caption":"EENewsEurope"},"image":{"@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/568c789a4794bd460460501ba91f5daf","name":"Alain Dieul","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/image\/6d32dc651fbcef3b338066625b118364","url":"https:\/\/secure.gravatar.com\/avatar\/93708ec89b35deb10f4cfbfe144b4e07?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93708ec89b35deb10f4cfbfe144b4e07?s=96&d=mm&r=g","caption":"Alain Dieul"}}]}},"authors":[{"term_id":1141,"user_id":9,"is_guest":0,"slug":"alaindieul","display_name":"Alain Dieul","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/93708ec89b35deb10f4cfbfe144b4e07?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/62426"}],"collection":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/comments?post=62426"}],"version-history":[{"count":0,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/62426\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media\/62427"}],"wp:attachment":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media?parent=62426"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/categories?post=62426"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/tags?post=62426"},{"taxonomy":"domains","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/domains?post=62426"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/ppma_author?post=62426"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}