{"id":51471,"date":"2022-10-14T07:21:46","date_gmt":"2022-10-14T10:21:46","guid":{"rendered":"https:\/\/abes.org.br\/?p=51471"},"modified":"2022-10-11T18:49:42","modified_gmt":"2022-10-11T21:49:42","slug":"sonda-e-veritas-criam-estrategia-mirando-ataques-ransomware","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/sonda-e-veritas-criam-estrategia-mirando-ataques-ransomware\/","title":{"rendered":"SONDA and Veritas create strategy targeting ransomware attacks"},"content":{"rendered":"<p style=\"text-align: center\"><i>Companies reinforce the adoption of immutable backup and infrastructure monitoring in the face of cloud adhesion scenarios and growing ransomware attacks<\/i><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-41297 aligncenter\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/11\/Seguran\u00e7a-Digital-close-up-programmer-typing-keyboard.jpg\" alt=\"\" width=\"383\" height=\"255\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/11\/Seguran\u00e7a-Digital-close-up-programmer-typing-keyboard.jpg 7952w, https:\/\/abes.org.br\/wp-content\/uploads\/2021\/11\/Seguran\u00e7a-Digital-close-up-programmer-typing-keyboard-300x200.jpg 300w, https:\/\/abes.org.br\/wp-content\/uploads\/2021\/11\/Seguran\u00e7a-Digital-close-up-programmer-typing-keyboard-1024x683.jpg 1024w, https:\/\/abes.org.br\/wp-content\/uploads\/2021\/11\/Seguran\u00e7a-Digital-close-up-programmer-typing-keyboard-768x512.jpg 768w, https:\/\/abes.org.br\/wp-content\/uploads\/2021\/11\/Seguran\u00e7a-Digital-close-up-programmer-typing-keyboard-391x260.jpg 391w, https:\/\/abes.org.br\/wp-content\/uploads\/2021\/11\/Seguran\u00e7a-Digital-close-up-programmer-typing-keyboard-1536x1025.jpg 1536w, https:\/\/abes.org.br\/wp-content\/uploads\/2021\/11\/Seguran\u00e7a-Digital-close-up-programmer-typing-keyboard-18x12.jpg 18w, https:\/\/abes.org.br\/wp-content\/uploads\/2021\/11\/Seguran\u00e7a-Digital-close-up-programmer-typing-keyboard-1080x720.jpg 1080w, https:\/\/abes.org.br\/wp-content\/uploads\/2021\/11\/Seguran\u00e7a-Digital-close-up-programmer-typing-keyboard-480x320.jpg 480w\" sizes=\"(max-width: 383px) 100vw, 383px\" \/><\/p>\n<p style=\"font-weight: 400\">SONDA, a regional reference in digital transformation services, and Veritas, a reference in corporate data protection, create a joint strategy to meet the new corporate demands of protection, detection and recovery from ransomware attacks.<\/p>\n<p style=\"font-weight: 400\">According to SONDA, while the adoption of the cloud remains a priority on the corporate agenda to meet growth plans, incorporating themes such as collaborative work in different locations and cost reductions with a more robust infrastructure, the increase in incidents with ransomware grows at the same rate. In the global ranking of ransomware attacks, Brazil currently ranks fourth, behind only the United States, Germany and the United Kingdom, according to the SonicWall Cyber Threat 2022 report.<\/p>\n<p style=\"font-weight: 400\">Given this scenario, the proposal of the regional alliance aims to support organizations in the challenge around data protection, since today providers of SaaS (Software as a Service) structures work in the &quot;shared responsibility model&quot;, which means that the organizations are solely responsible for protecting their data.<\/p>\n<p style=\"font-weight: 400\">\u201cThe provider is not responsible for taking care of the data and, therefore, does not include backup services in its storage. If data is lost, deleted or hijacked in the event of an attack, whether it be mission-critical information, personal data, intellectual property or trade secrets, organizations are on their own to recover it\u201d, adds Silvio Pereira Rocha J\u00fanior, sales specialist. of the PROBE.<\/p>\n<p style=\"font-weight: 400\">In this strategy, on the one hand, SONDA has mastery in Data Center management to serve companies that use hybrid cloud environments. On the other hand, Veritas has solutions that ensure rapid disaster recovery with automation and orchestration at scale with a focus on data integrity and immutability. \u201cKnowing that Zero Trust does not cover an operation 100%, a company in the retail sector, for example, cannot close its doors if its data is invaded, just as a hospital could not interrupt its routine. In this line, among the differentials offered are the fast restoration due to the replication system and the guarantee of non-invasion of the back up due to the solution model provided by Veritas\u201d, adds Rocha J\u00fanior.<\/p>\n<p style=\"font-weight: 400\">In addition to ensuring protection and security, all stored data must meet compliance requirements, whether company policies or regulations, such as the LGPD (General Data Protection Law). Non-compliance puts organizations in the crosshairs of ransomware attacks, as leaking data could increase ransom payments.<\/p>\n<p style=\"font-weight: 400\">\u201cWhile we have solutions that differentiate themselves in the market in the face of new challenges, SONDA, with its regional presence, allows us to have capillarity in our offer so that we can reach companies located in different regions, which guarantees a personalized service according to the needs and unique requirements of each organization\u201d, concludes Gustavo Leite, Vice President Latin America at Veritas.<\/p>","protected":false},"excerpt":{"rendered":"<p>Empresas refor\u00e7am a ado\u00e7\u00e3o de backup imut\u00e1vel e monitoramento de infraestrutura frente aos cen\u00e1rios de ades\u00e3o \u00e0 nuvem e crescente ataques ransomware A SONDA,\u00a0refer\u00eancia regional em servi\u00e7os de transforma\u00e7\u00e3o digital, e a Veritas,\u00a0refer\u00eancia\u00a0em prote\u00e7\u00e3o de dados corporativos, criam estrat\u00e9gia conjunta para atender \u00e0s novas demandas corporativas de prote\u00e7\u00e3o, detec\u00e7\u00e3o e recupera\u00e7\u00e3o de ataques ransomware. De [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[2743,3046,2700,1061],"class_list":["post-51471","post","type-post","status-publish","format-standard","hentry","category-coluna-4","category-ultimas-noticias","tag-ataques-ransomware","tag-protecao-digital","tag-recuperacao-de-dados","tag-zero-trust"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SONDA e Veritas criam estrat\u00e9gia mirando ataques ransomware - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/sonda-e-veritas-criam-estrategia-mirando-ataques-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SONDA e Veritas criam estrat\u00e9gia mirando ataques ransomware - ABES\" \/>\n<meta property=\"og:description\" content=\"Empresas refor\u00e7am a ado\u00e7\u00e3o de backup imut\u00e1vel e monitoramento de infraestrutura frente aos cen\u00e1rios de ades\u00e3o \u00e0 nuvem e crescente ataques ransomware A SONDA,\u00a0refer\u00eancia regional em servi\u00e7os de transforma\u00e7\u00e3o digital, e a Veritas,\u00a0refer\u00eancia\u00a0em prote\u00e7\u00e3o de dados corporativos, criam estrat\u00e9gia conjunta para atender \u00e0s novas demandas corporativas de prote\u00e7\u00e3o, detec\u00e7\u00e3o e recupera\u00e7\u00e3o de ataques ransomware. De [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/sonda-e-veritas-criam-estrategia-mirando-ataques-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-14T10:21:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/01\/logo_abes_marca_tagline_horizontal_colorido_rgb.png\" \/>\n\t<meta property=\"og:image:width\" content=\"3509\" \/>\n\t<meta property=\"og:image:height\" content=\"2482\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/sonda-e-veritas-criam-estrategia-mirando-ataques-ransomware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/sonda-e-veritas-criam-estrategia-mirando-ataques-ransomware\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\"},\"headline\":\"SONDA e Veritas criam estrat\u00e9gia mirando ataques ransomware\",\"datePublished\":\"2022-10-14T10:21:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/sonda-e-veritas-criam-estrategia-mirando-ataques-ransomware\\\/\"},\"wordCount\":576,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"keywords\":[\"ataques ransomware\",\"prote\u00e7\u00e3o digital\",\"recupera\u00e7\u00e3o de dados\",\"Zero Trust\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/sonda-e-veritas-criam-estrategia-mirando-ataques-ransomware\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/sonda-e-veritas-criam-estrategia-mirando-ataques-ransomware\\\/\",\"name\":\"SONDA e Veritas criam estrat\u00e9gia mirando ataques ransomware - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"datePublished\":\"2022-10-14T10:21:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/sonda-e-veritas-criam-estrategia-mirando-ataques-ransomware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/en\\\/sonda-e-veritas-criam-estrategia-mirando-ataques-ransomware\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/sonda-e-veritas-criam-estrategia-mirando-ataques-ransomware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SONDA e Veritas criam estrat\u00e9gia mirando ataques ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SONDA e Veritas criam estrat\u00e9gia mirando ataques ransomware - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/sonda-e-veritas-criam-estrategia-mirando-ataques-ransomware\/","og_locale":"en_US","og_type":"article","og_title":"SONDA e Veritas criam estrat\u00e9gia mirando ataques ransomware - ABES","og_description":"Empresas refor\u00e7am a ado\u00e7\u00e3o de backup imut\u00e1vel e monitoramento de infraestrutura frente aos cen\u00e1rios de ades\u00e3o \u00e0 nuvem e crescente ataques ransomware A SONDA,\u00a0refer\u00eancia regional em servi\u00e7os de transforma\u00e7\u00e3o digital, e a Veritas,\u00a0refer\u00eancia\u00a0em prote\u00e7\u00e3o de dados corporativos, criam estrat\u00e9gia conjunta para atender \u00e0s novas demandas corporativas de prote\u00e7\u00e3o, detec\u00e7\u00e3o e recupera\u00e7\u00e3o de ataques ransomware. De [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/sonda-e-veritas-criam-estrategia-mirando-ataques-ransomware\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2022-10-14T10:21:46+00:00","og_image":[{"width":3509,"height":2482,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/01\/logo_abes_marca_tagline_horizontal_colorido_rgb.png","type":"image\/png"}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/en\/sonda-e-veritas-criam-estrategia-mirando-ataques-ransomware\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/en\/sonda-e-veritas-criam-estrategia-mirando-ataques-ransomware\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3"},"headline":"SONDA e Veritas criam estrat\u00e9gia mirando ataques ransomware","datePublished":"2022-10-14T10:21:46+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/en\/sonda-e-veritas-criam-estrategia-mirando-ataques-ransomware\/"},"wordCount":576,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"keywords":["ataques ransomware","prote\u00e7\u00e3o digital","recupera\u00e7\u00e3o de dados","Zero Trust"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/en\/sonda-e-veritas-criam-estrategia-mirando-ataques-ransomware\/","url":"https:\/\/abes.org.br\/en\/sonda-e-veritas-criam-estrategia-mirando-ataques-ransomware\/","name":"SONDA e Veritas criam estrat\u00e9gia mirando ataques ransomware - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"datePublished":"2022-10-14T10:21:46+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/en\/sonda-e-veritas-criam-estrategia-mirando-ataques-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/en\/sonda-e-veritas-criam-estrategia-mirando-ataques-ransomware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/en\/sonda-e-veritas-criam-estrategia-mirando-ataques-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"SONDA e Veritas criam estrat\u00e9gia mirando ataques ransomware"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-26 21:07:48","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/51471","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=51471"}],"version-history":[{"count":1,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/51471\/revisions"}],"predecessor-version":[{"id":51472,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/51471\/revisions\/51472"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=51471"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=51471"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=51471"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}