{"id":50187,"date":"2023-01-27T13:25:25","date_gmt":"2023-01-27T18:25:25","guid":{"rendered":"https:\/\/sdtimes.com\/?p=50187"},"modified":"2023-10-27T14:04:23","modified_gmt":"2023-10-27T18:04:23","slug":"tackling-todays-software-supply-chain-issues-with-devops-centric-security","status":"publish","type":"post","link":"https:\/\/sdtimes.com\/security\/tackling-todays-software-supply-chain-issues-with-devops-centric-security\/","title":{"rendered":"Tackling today&#8217;s software supply chain issues with DevOps-centric security"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Developers, and the software they develop, are the most popular attack vector for today\u2019s hackers and bad actors. The many development tools and processes, not to mention thousands of open-source libraries and binaries, all introduce opportunities for malicious or even accidental injection of risk across the entire software supply chain.\u00a0 In response to this expanding threat landscape, developers, security leaders, and operations teams are struggling to find a more effective way to secure their software ecosystem.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Increasingly, organizations are adopting DevSecOps, which focuses on \u201cshift left\u201d security, the idea of introducing security practices earlier in the software development life cycle. Practically speaking, however, DevSecOps is more of an overall strategy or approach, rather than a concrete set of responsibilities assigned to a specific group or individual.\u00a0 DevSecOps\u00a0 is best used to define how an organization addresses product security, or establish a cultural and technical &#8220;shift left&#8221; within the integrated development environment. It can also provide an organizational framework to address security efforts between compliance, security and development teams.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The reality, however, is that while both security and development teams are committed to fortifying the business, collaboration between the two groups can be challenging.\u00a0 A company\u2019s security teams are tasked to do whatever it takes to secure the business, while developers prefer to write quality code instead of spending their day fixing vulnerabilities.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is the DevOps team that in fact owns the specific responsibilities, tasks and budget needed to secure the software supply chain.<\/span><\/p>\n<h5><b>Defining DevOps-Centric security<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">As the name implies, DevOps teams manage the operational side of software development and are responsible for each step of the software development life cycle (SDLC).\u00a0 While security teams set policies and development teams write code, DevOps teams manage the SDLC workflow. They are the actual owners of the software supply chain.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">DevOps teams are also the logical owners for software supply chain security.\u00a0 DevOps teams have the resources, skills and accountability to identify and address security issues across the entire DevOps workflow, from development to runtime to deployment. DevOps teams are involved in every step of the software development process, so they\u2019re ideally suited to serve as a bridge between security teams, responsible for compliance and business requirements, and development teams, which can get overwhelmed with security requests, processes and regulations that are not their core competency.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">DevOps-centric security delivers an end-to-end view of an organization\u2019s software supply chain and flags a multitude of vulnerabilities and weaknesses such as CVEs, configuration issues, secrets exposure, and infrastructure-as-code violations. It also suggests remediation strategies at each stage of the software development life cycle, from code to container, to device.<\/span><\/p>\n<h5><b>How does DevOps-Centric security work?<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">A DevOps-centric approach to security builds on the rigorous process and continuous, automated testing that\u2019s the hallmark of all DevOps teams. More importantly, it guides organizations with a clear understanding of each vulnerability and suggests actions to efficiently fix the issues.<\/span><\/p>\n<h5><b>Focus on binaries as well as source code<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">The modern software supply chain has just one core asset that is delivered into production: the software binary, which takes many forms &#8211; from package, to container, to archive file.\u00a0 Attackers are increasingly focusing on attacking binaries, as they contain more information than source code alone. By analyzing the binary as well as the source code, DevOps teams can provide a more complete picture of any impact or point of exploitation. This helps eliminate complexity and streamlines security detection, assessment, and remediation efforts.<\/span><\/p>\n<h5><b>Contextual analysis: Determining which vulnerabilities, weaknesses, and exposures need remediation and the most cost-effective way to do it<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">Serious vulnerabilities are being identified daily through the efforts of researchers and bug bounty programs.\u00a0 Yet these CVEs may or may not be exploitable, depending on factors such as the application&#8217;s configurations, use of authentication mechanisms, and exposure of keys. DevOps-centric security looks at the context in which software is operating to prioritize and recommend how to remediate vulnerabilities quickly and effectively, without wasting developers\u2019 time on non-applicable issues.\u00a0 It\u2019s particularly important to be able to scan and analyze containers for open-source vulnerabilities, since the use of containers to hide malicious code is now on the rise.<\/span><\/p>\n<h5><b>Providing a holistic view of the software supply chain<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">Through their involvement in each step of the software development process, DevOps teams offer a holistic view of a company\u2019s software supply chain and all its weaknesses.\u00a0 DevOps-centric security analyzes binaries, infrastructure, integrations, releases, and flows all in one place, eliminating the confusion of disparate security systems with varying or limited\u00a0 information, and inconsistent reporting.\u00a0 Thus, <\/span><span style=\"font-weight: 400;\">when you implement security using DevOps processes, you not only scan to identify problems within the software, but also help developers prioritize and fix them quickly and easily<\/span><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>Developers, and the software they develop, are the most popular attack vector for today\u2019s hackers and bad actors. The many development tools and processes, not to mention thousands of open-source libraries and binaries, all introduce opportunities for malicious or even accidental injection of risk across the entire software supply chain.\u00a0 In response to this expanding  &hellip; <a class=\"read-more\" href=\"https:\/\/sdtimes.com\/security\/tackling-todays-software-supply-chain-issues-with-devops-centric-security\/\">continue reading<\/a><!-- AddThis Advanced Settings generic via filter on get_the_excerpt --><!-- AddThis Share Buttons generic via filter on get_the_excerpt --><\/p>\n","protected":false},"author":1138,"featured_media":50188,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"cybocfi_hide_featured_image":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[1],"tags":[254,8749,329,16101],"coauthors":[16481],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Tackling today&#039;s software supply chain issues with DevOps-centric security - SD Times<\/title>\n<meta name=\"description\" content=\"While both security and development teams are committed to fortifying the business, collaboration between the two groups can be challenging.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sdtimes.com\/security\/tackling-todays-software-supply-chain-issues-with-devops-centric-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tackling today&#039;s software supply chain issues with DevOps-centric security - SD Times\" \/>\n<meta property=\"og:description\" content=\"While both security and development teams are committed to fortifying the business, collaboration between the two groups can be challenging.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sdtimes.com\/security\/tackling-todays-software-supply-chain-issues-with-devops-centric-security\/\" \/>\n<meta property=\"og:site_name\" content=\"SD Times\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SDTimesD2\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-27T18:25:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-27T18:04:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sdtimes.com\/wp-content\/uploads\/2023\/01\/Screen-Shot-2023-01-27-at-1.24.36-PM.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"734\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Nati Davidi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sdtimes\" \/>\n<meta name=\"twitter:site\" content=\"@sdtimes\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nati Davidi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sdtimes.com\/security\/tackling-todays-software-supply-chain-issues-with-devops-centric-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sdtimes.com\/security\/tackling-todays-software-supply-chain-issues-with-devops-centric-security\/\"},\"author\":{\"name\":\"Nati Davidi\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/5bc2da5fba85ffbd3929232ed67e3426\"},\"headline\":\"Tackling today&#8217;s software supply chain issues with DevOps-centric security\",\"datePublished\":\"2023-01-27T18:25:25+00:00\",\"dateModified\":\"2023-10-27T18:04:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sdtimes.com\/security\/tackling-todays-software-supply-chain-issues-with-devops-centric-security\/\"},\"wordCount\":796,\"publisher\":{\"@id\":\"https:\/\/sdtimes.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/security\/tackling-todays-software-supply-chain-issues-with-devops-centric-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2023\/01\/Screen-Shot-2023-01-27-at-1.24.36-PM.jpg\",\"keywords\":[\"DevOps\",\"DevSecOps\",\"JFrog\",\"Supply Chain Security\"],\"articleSection\":[\"Latest News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sdtimes.com\/security\/tackling-todays-software-supply-chain-issues-with-devops-centric-security\/\",\"url\":\"https:\/\/sdtimes.com\/security\/tackling-todays-software-supply-chain-issues-with-devops-centric-security\/\",\"name\":\"Tackling today's software supply chain issues with DevOps-centric security - SD Times\",\"isPartOf\":{\"@id\":\"https:\/\/sdtimes.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sdtimes.com\/security\/tackling-todays-software-supply-chain-issues-with-devops-centric-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/security\/tackling-todays-software-supply-chain-issues-with-devops-centric-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2023\/01\/Screen-Shot-2023-01-27-at-1.24.36-PM.jpg\",\"datePublished\":\"2023-01-27T18:25:25+00:00\",\"dateModified\":\"2023-10-27T18:04:23+00:00\",\"description\":\"While both security and development teams are committed to fortifying the business, collaboration between the two groups can be challenging.\",\"breadcrumb\":{\"@id\":\"https:\/\/sdtimes.com\/security\/tackling-todays-software-supply-chain-issues-with-devops-centric-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sdtimes.com\/security\/tackling-todays-software-supply-chain-issues-with-devops-centric-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/security\/tackling-todays-software-supply-chain-issues-with-devops-centric-security\/#primaryimage\",\"url\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2023\/01\/Screen-Shot-2023-01-27-at-1.24.36-PM.jpg\",\"contentUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2023\/01\/Screen-Shot-2023-01-27-at-1.24.36-PM.jpg\",\"width\":734,\"height\":512},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sdtimes.com\/security\/tackling-todays-software-supply-chain-issues-with-devops-centric-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sdtimes.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tackling today&#8217;s software supply chain issues with DevOps-centric security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sdtimes.com\/#website\",\"url\":\"https:\/\/sdtimes.com\/\",\"name\":\"SD Times\",\"description\":\"Software Development News\",\"publisher\":{\"@id\":\"https:\/\/sdtimes.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sdtimes.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sdtimes.com\/#organization\",\"name\":\"SD Times\",\"url\":\"https:\/\/sdtimes.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png\",\"contentUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png\",\"width\":225,\"height\":90,\"caption\":\"SD Times\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/SDTimesD2\",\"https:\/\/x.com\/sdtimes\",\"https:\/\/www.linkedin.com\/company\/sdtimes\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/5bc2da5fba85ffbd3929232ed67e3426\",\"name\":\"Nati Davidi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/image\/92c62a474e512672078200004d0ebbb7\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/333f719b753f8fe9bb7b0a86dc057a4e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/333f719b753f8fe9bb7b0a86dc057a4e?s=96&d=mm&r=g\",\"caption\":\"Nati Davidi\"},\"description\":\"Nati Davidi is, SVP, JFrog Security\",\"url\":\"https:\/\/sdtimes.com\/author\/nati-davidi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tackling today's software supply chain issues with DevOps-centric security - SD Times","description":"While both security and development teams are committed to fortifying the business, collaboration between the two groups can be challenging.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sdtimes.com\/security\/tackling-todays-software-supply-chain-issues-with-devops-centric-security\/","og_locale":"en_US","og_type":"article","og_title":"Tackling today's software supply chain issues with DevOps-centric security - SD Times","og_description":"While both security and development teams are committed to fortifying the business, collaboration between the two groups can be challenging.","og_url":"https:\/\/sdtimes.com\/security\/tackling-todays-software-supply-chain-issues-with-devops-centric-security\/","og_site_name":"SD Times","article_publisher":"https:\/\/www.facebook.com\/SDTimesD2","article_published_time":"2023-01-27T18:25:25+00:00","article_modified_time":"2023-10-27T18:04:23+00:00","og_image":[{"width":734,"height":512,"url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2023\/01\/Screen-Shot-2023-01-27-at-1.24.36-PM.jpg","type":"image\/jpeg"}],"author":"Nati Davidi","twitter_card":"summary_large_image","twitter_creator":"@sdtimes","twitter_site":"@sdtimes","twitter_misc":{"Written by":"Nati Davidi","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sdtimes.com\/security\/tackling-todays-software-supply-chain-issues-with-devops-centric-security\/#article","isPartOf":{"@id":"https:\/\/sdtimes.com\/security\/tackling-todays-software-supply-chain-issues-with-devops-centric-security\/"},"author":{"name":"Nati Davidi","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/5bc2da5fba85ffbd3929232ed67e3426"},"headline":"Tackling today&#8217;s software supply chain issues with DevOps-centric security","datePublished":"2023-01-27T18:25:25+00:00","dateModified":"2023-10-27T18:04:23+00:00","mainEntityOfPage":{"@id":"https:\/\/sdtimes.com\/security\/tackling-todays-software-supply-chain-issues-with-devops-centric-security\/"},"wordCount":796,"publisher":{"@id":"https:\/\/sdtimes.com\/#organization"},"image":{"@id":"https:\/\/sdtimes.com\/security\/tackling-todays-software-supply-chain-issues-with-devops-centric-security\/#primaryimage"},"thumbnailUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2023\/01\/Screen-Shot-2023-01-27-at-1.24.36-PM.jpg","keywords":["DevOps","DevSecOps","JFrog","Supply Chain Security"],"articleSection":["Latest News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sdtimes.com\/security\/tackling-todays-software-supply-chain-issues-with-devops-centric-security\/","url":"https:\/\/sdtimes.com\/security\/tackling-todays-software-supply-chain-issues-with-devops-centric-security\/","name":"Tackling today's software supply chain issues with DevOps-centric security - SD Times","isPartOf":{"@id":"https:\/\/sdtimes.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sdtimes.com\/security\/tackling-todays-software-supply-chain-issues-with-devops-centric-security\/#primaryimage"},"image":{"@id":"https:\/\/sdtimes.com\/security\/tackling-todays-software-supply-chain-issues-with-devops-centric-security\/#primaryimage"},"thumbnailUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2023\/01\/Screen-Shot-2023-01-27-at-1.24.36-PM.jpg","datePublished":"2023-01-27T18:25:25+00:00","dateModified":"2023-10-27T18:04:23+00:00","description":"While both security and development teams are committed to fortifying the business, collaboration between the two groups can be challenging.","breadcrumb":{"@id":"https:\/\/sdtimes.com\/security\/tackling-todays-software-supply-chain-issues-with-devops-centric-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sdtimes.com\/security\/tackling-todays-software-supply-chain-issues-with-devops-centric-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/security\/tackling-todays-software-supply-chain-issues-with-devops-centric-security\/#primaryimage","url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2023\/01\/Screen-Shot-2023-01-27-at-1.24.36-PM.jpg","contentUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2023\/01\/Screen-Shot-2023-01-27-at-1.24.36-PM.jpg","width":734,"height":512},{"@type":"BreadcrumbList","@id":"https:\/\/sdtimes.com\/security\/tackling-todays-software-supply-chain-issues-with-devops-centric-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sdtimes.com\/"},{"@type":"ListItem","position":2,"name":"Tackling today&#8217;s software supply chain issues with DevOps-centric security"}]},{"@type":"WebSite","@id":"https:\/\/sdtimes.com\/#website","url":"https:\/\/sdtimes.com\/","name":"SD Times","description":"Software Development News","publisher":{"@id":"https:\/\/sdtimes.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sdtimes.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sdtimes.com\/#organization","name":"SD Times","url":"https:\/\/sdtimes.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/","url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png","contentUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png","width":225,"height":90,"caption":"SD Times"},"image":{"@id":"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/SDTimesD2","https:\/\/x.com\/sdtimes","https:\/\/www.linkedin.com\/company\/sdtimes\/"]},{"@type":"Person","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/5bc2da5fba85ffbd3929232ed67e3426","name":"Nati Davidi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/image\/92c62a474e512672078200004d0ebbb7","url":"https:\/\/secure.gravatar.com\/avatar\/333f719b753f8fe9bb7b0a86dc057a4e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/333f719b753f8fe9bb7b0a86dc057a4e?s=96&d=mm&r=g","caption":"Nati Davidi"},"description":"Nati Davidi is, SVP, JFrog Security","url":"https:\/\/sdtimes.com\/author\/nati-davidi\/"}]}},"_links":{"self":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/50187"}],"collection":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/users\/1138"}],"replies":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/comments?post=50187"}],"version-history":[{"count":1,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/50187\/revisions"}],"predecessor-version":[{"id":50189,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/50187\/revisions\/50189"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/media\/50188"}],"wp:attachment":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/media?parent=50187"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/categories?post=50187"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/tags?post=50187"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/coauthors?post=50187"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}