{"id":1913,"date":"2015-08-19T00:00:00","date_gmt":"2015-08-19T00:00:00","guid":{"rendered":"https:\/\/abes.org.br\/?p=1913"},"modified":"2015-08-19T00:00:00","modified_gmt":"2015-08-19T00:00:00","slug":"cibercrimes-exigem-melhor-dominio-no-uso-de-big-data-e-analises-preditivas","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/cibercrimes-exigem-melhor-dominio-no-uso-de-big-data-e-analises-preditivas\/","title":{"rendered":"Cybercrimes Require Better Mastery in Using Big Data and Predictive Analytics"},"content":{"rendered":"<div style=\"text-align: justify;\">\n\t<\/div>\n<div style=\"text-align: center;\">\n\t<img decoding=\"async\" alt=\"\" src=\"\/wp-content\/uploads\/anterior\/Imagens\/cyberseguranca%20maio15-2%20jpg.jpg\" style=\"width: 300px; height: 300px;\" \/><\/div>\n<div style=\"text-align: justify;\">\n\tAbout 35% of cyberattacks go unnoticed, according to the study Big Data and Predictive Analytics: On the Cybersecurity Frontline, promoted by IDC and sponsored by SAS. The finding demonstrates that organizations need to take a proactive stance to understand threats before the &#039;attacker&#039; causes any kind of damage. This requires constant monitoring of network behavior so that irregular activity can be distinguished from normal activity. &nbsp;<\/div>\n<div style=\"text-align: justify;\">\n\t&nbsp;<\/div>\n<div style=\"text-align: justify;\">\n\tFor this change to take place, companies need a new set of security solutions to deal with the increasing sophistication of attacks. By applying predictive and behavioral analytics to all available enterprise data, you can estimate threat potential, detect potential attacks, and achieve advanced intelligence. These analyzes need to be performed in real time so that threats are proactively minimized before a significant loss occurs.<\/div>\n<div style=\"text-align: justify;\">\n\t&nbsp;<\/div>\n<div style=\"text-align: justify;\">\n\tAccording to Stu Bradley, senior director of fraud prevention practice at SAS, network security can be the most critical area in organizations. \u201cBig Data becomes a barrier for them to understand the true threat landscape. However, if optimized, the sheer volume of data offers significant opportunities to contextualize more accurate and faster threat detection,\u201d he says.<\/div>\n<div style=\"text-align: justify;\">\n\t&nbsp;<\/div>\n<div style=\"text-align: justify;\">\n\tAlan Webber, research director at IDC, said that after a thorough research of the challenges and gaps in the market, it was realized that companies need to be more strategic about network threats, enhancing their existing security systems with advanced behavior analysis. &quot;Software vendors that have integrated the Analytics for Big Data platform at their core are well positioned to provide the market with an additional layer of security and detention.&quot; &nbsp;<\/div>\n<div style=\"text-align: justify;\">\n\t&nbsp;<\/div>\n<div style=\"text-align: justify;\">\n\tIDC interviewed Information Security executives, users and industry experts in three industries: Federal Government, Financial Services and Energy. The objective was to learn about the evolution of the Cybersecurity landscape and understand how Big Data and predictive analytics can be deployed to address threats and risks faced daily.&nbsp;<\/div>\n<div style=\"text-align: justify;\">\n\t&nbsp;<\/div>\n<div style=\"text-align: justify;\">\n\tThe research explains that effective Big Data solutions must differ from reactive \u201cgather and analyze\u201d methods. Today, technologies exist for using data with deadlines and in ways that were not possible in the past. To gain value from Big Data, companies need behavioral analytics and tools like Hadoop to improve security at a faster pace.<\/div>\n<div style=\"text-align: justify;\">\n\t&nbsp;<\/div>\n<div style=\"text-align: justify;\">\n\tIndustry implications and opportunities<\/div>\n<div style=\"text-align: justify;\">\n\t&nbsp;<\/div>\n<div style=\"text-align: justify;\">\n\tFor the Government, maintaining the security of its data on a daily basis is crucial. US-CERT (United States Computer Readiness Emergency Team) recorded more than 46,000 incidents at US Federal Government agencies in 2013. IDC estimates that these agencies will spend more than U1TP3Q14. 5 billion in Cybersecurity to prevent attacks and identify incidents. In addition to multi-layered security defenses, government agencies have highly complex infrastructures made up of an extensive amount of technologies from older cloud and mobile application structuring systems. By turning to predictive behavior analytics, these agencies can shift their stance toward more proactive advocacy.<\/div>\n<div style=\"text-align: justify;\">\n\t&nbsp;<\/div>\n<div style=\"text-align: justify;\">\n\tIn the Utilities and Energy industry, IDC research found that advanced and predictive analytics are critical in advancing the cyber order, including regulatory compliance. Companies are just beginning to identify threats and realize the solutions available for big data analysis.<\/div>\n<div style=\"text-align: justify;\">\n\t&nbsp;<\/div>\n<div style=\"text-align: justify;\">\n\tWhen it comes to Financial Services, Cybersecurity strategies remain at the forefront of discussions. IDC research predicted that the financial sector will spend over US$ 40 billion on operational risk management and cyber threats in 2015. It was concluded that US$ 27.4 billion would be spent on IT, information security, and frauds. With the shrinking gaps and complexity of digital channels, advanced analytics solutions and services have become key technologies for risk managers, data managers and executives.<\/div>\n<div>\n\t&nbsp;<\/div>","protected":false},"excerpt":{"rendered":"<p>Cerca de 35% dos ataques cibern&eacute;ticos passam despercebidos, segundo o &nbsp;estudo Big Data and Predictive Analytics: On the Cybersecurity Frontline (Big Data e An&aacute;lises Preditivas: na linha de frente da Ciberseguran&ccedil;a), promovido pelo IDC e patrocinado pelo SAS. &nbsp;A constata&ccedil;&atilde;o demonstra que a organiza&ccedil;&otilde;es precisam ter uma postura proativa para compreender amea&ccedil;as antes que o [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[19],"tags":[],"class_list":["post-1913","post","type-post","status-publish","format-standard","hentry","category-ultimas-noticias"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cibercrimes exigem melhor dom\u00ednio no uso de Big Data e an\u00e1lises preditivas - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/cibercrimes-exigem-melhor-dominio-no-uso-de-big-data-e-analises-preditivas\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cibercrimes exigem melhor dom\u00ednio no uso de Big Data e an\u00e1lises preditivas - ABES\" \/>\n<meta property=\"og:description\" content=\"Cerca de 35% dos ataques cibern&eacute;ticos passam despercebidos, segundo o &nbsp;estudo Big Data and Predictive Analytics: On the Cybersecurity Frontline (Big Data e An&aacute;lises Preditivas: na linha de frente da Ciberseguran&ccedil;a), promovido pelo IDC e patrocinado pelo SAS. &nbsp;A constata&ccedil;&atilde;o demonstra que a organiza&ccedil;&otilde;es precisam ter uma postura proativa para compreender amea&ccedil;as antes que o [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/cibercrimes-exigem-melhor-dominio-no-uso-de-big-data-e-analises-preditivas\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2015-08-19T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/01\/logo_abes_marca_tagline_horizontal_colorido_rgb.png\" \/>\n\t<meta property=\"og:image:width\" content=\"3509\" \/>\n\t<meta property=\"og:image:height\" content=\"2482\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"prima-dev\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"prima-dev\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/cibercrimes-exigem-melhor-dominio-no-uso-de-big-data-e-analises-preditivas\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/cibercrimes-exigem-melhor-dominio-no-uso-de-big-data-e-analises-preditivas\\\/\"},\"author\":{\"name\":\"prima-dev\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/1bad6bff859e7d56ec5664b01968e27e\"},\"headline\":\"Cibercrimes exigem melhor dom\u00ednio no uso de Big Data e an\u00e1lises preditivas\",\"datePublished\":\"2015-08-19T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/cibercrimes-exigem-melhor-dominio-no-uso-de-big-data-e-analises-preditivas\\\/\"},\"wordCount\":925,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"articleSection\":[\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/cibercrimes-exigem-melhor-dominio-no-uso-de-big-data-e-analises-preditivas\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/cibercrimes-exigem-melhor-dominio-no-uso-de-big-data-e-analises-preditivas\\\/\",\"name\":\"Cibercrimes exigem melhor dom\u00ednio no uso de Big Data e an\u00e1lises preditivas - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"datePublished\":\"2015-08-19T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/cibercrimes-exigem-melhor-dominio-no-uso-de-big-data-e-analises-preditivas\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/cibercrimes-exigem-melhor-dominio-no-uso-de-big-data-e-analises-preditivas\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/cibercrimes-exigem-melhor-dominio-no-uso-de-big-data-e-analises-preditivas\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cibercrimes exigem melhor dom\u00ednio no uso de Big Data e an\u00e1lises preditivas\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/1bad6bff859e7d56ec5664b01968e27e\",\"name\":\"prima-dev\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/039c6325210cecd393c57645bc755f7d13deed578fddf4dbfa87bc05dcbcfa4b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/039c6325210cecd393c57645bc755f7d13deed578fddf4dbfa87bc05dcbcfa4b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/039c6325210cecd393c57645bc755f7d13deed578fddf4dbfa87bc05dcbcfa4b?s=96&d=mm&r=g\",\"caption\":\"prima-dev\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/prima-dev\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cibercrimes exigem melhor dom\u00ednio no uso de Big Data e an\u00e1lises preditivas - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/cibercrimes-exigem-melhor-dominio-no-uso-de-big-data-e-analises-preditivas\/","og_locale":"en_US","og_type":"article","og_title":"Cibercrimes exigem melhor dom\u00ednio no uso de Big Data e an\u00e1lises preditivas - ABES","og_description":"Cerca de 35% dos ataques cibern&eacute;ticos passam despercebidos, segundo o &nbsp;estudo Big Data and Predictive Analytics: On the Cybersecurity Frontline (Big Data e An&aacute;lises Preditivas: na linha de frente da Ciberseguran&ccedil;a), promovido pelo IDC e patrocinado pelo SAS. &nbsp;A constata&ccedil;&atilde;o demonstra que a organiza&ccedil;&otilde;es precisam ter uma postura proativa para compreender amea&ccedil;as antes que o [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/cibercrimes-exigem-melhor-dominio-no-uso-de-big-data-e-analises-preditivas\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2015-08-19T00:00:00+00:00","og_image":[{"width":3509,"height":2482,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/01\/logo_abes_marca_tagline_horizontal_colorido_rgb.png","type":"image\/png"}],"author":"prima-dev","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"prima-dev","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/cibercrimes-exigem-melhor-dominio-no-uso-de-big-data-e-analises-preditivas\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/cibercrimes-exigem-melhor-dominio-no-uso-de-big-data-e-analises-preditivas\/"},"author":{"name":"prima-dev","@id":"https:\/\/abes.org.br\/#\/schema\/person\/1bad6bff859e7d56ec5664b01968e27e"},"headline":"Cibercrimes exigem melhor dom\u00ednio no uso de Big Data e an\u00e1lises preditivas","datePublished":"2015-08-19T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/cibercrimes-exigem-melhor-dominio-no-uso-de-big-data-e-analises-preditivas\/"},"wordCount":925,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"articleSection":["\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/cibercrimes-exigem-melhor-dominio-no-uso-de-big-data-e-analises-preditivas\/","url":"https:\/\/abes.org.br\/cibercrimes-exigem-melhor-dominio-no-uso-de-big-data-e-analises-preditivas\/","name":"Cibercrimes exigem melhor dom\u00ednio no uso de Big Data e an\u00e1lises preditivas - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"datePublished":"2015-08-19T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/cibercrimes-exigem-melhor-dominio-no-uso-de-big-data-e-analises-preditivas\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/cibercrimes-exigem-melhor-dominio-no-uso-de-big-data-e-analises-preditivas\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/cibercrimes-exigem-melhor-dominio-no-uso-de-big-data-e-analises-preditivas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Cibercrimes exigem melhor dom\u00ednio no uso de Big Data e an\u00e1lises preditivas"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/1bad6bff859e7d56ec5664b01968e27e","name":"prima-dev","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/039c6325210cecd393c57645bc755f7d13deed578fddf4dbfa87bc05dcbcfa4b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/039c6325210cecd393c57645bc755f7d13deed578fddf4dbfa87bc05dcbcfa4b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/039c6325210cecd393c57645bc755f7d13deed578fddf4dbfa87bc05dcbcfa4b?s=96&d=mm&r=g","caption":"prima-dev"},"url":"https:\/\/abes.org.br\/en\/author\/prima-dev\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-19 16:26:20","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/1913","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=1913"}],"version-history":[{"count":0,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/1913\/revisions"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=1913"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=1913"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=1913"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}