{"id":54541,"date":"2024-05-13T10:23:16","date_gmt":"2024-05-13T14:23:16","guid":{"rendered":"https:\/\/sdtimes.com\/?p=54541"},"modified":"2024-05-13T10:23:16","modified_gmt":"2024-05-13T14:23:16","slug":"achieving-security-by-design-is-a-question-of-accountability","status":"publish","type":"post","link":"https:\/\/sdtimes.com\/ai\/achieving-security-by-design-is-a-question-of-accountability\/","title":{"rendered":"Achieving Security by Design is a question of accountability"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The software industry is no longer functional. Last year alone saw over <\/span><a href=\"https:\/\/nvd.nist.gov\/\"><span style=\"font-weight: 400;\">28,000 new CVEs published,<\/span><\/a><span style=\"font-weight: 400;\"> a record rise that perfectly illustrates the ongoing patching crisis facing security and development teams, which are under constant pressure to patch vulnerabilities or risk exposure. In the last 12 months, software vulnerabilities led to over 50 percent of organizations suffering <\/span><a href=\"https:\/\/info.securityjourney.com\/study-on-secure-coding-training\"><span style=\"font-weight: 400;\">8 or more breaches<\/span><\/a><span style=\"font-weight: 400;\">. The same survey found that only 11 percent believe that they patch effectively and in a timely manner. This dilemma is the result of a software industry that is far too comfortable releasing insecure applications to end-users.<\/span> <span style=\"font-weight: 400;\">Software vendors have long prioritized speed to market, with security becoming an afterthought addressed through updates and patches, and we can no longer accept it.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Security leaders, regulators, and the industry itself must embrace a higher security standard, holding software vendors and developers to a higher standard of security from the outset, truly embracing secure by design principles, clearer disclosure and faster remediation of vulnerabilities, and more regular and rigorous security testing of applications, even after their release.\u00a0\u00a0<\/span><\/p>\n<p><b>So, whose responsibility is it?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">This crisis is perpetuated by the well-publicized security skills gap. In fact, <\/span><a href=\"https:\/\/info.securityjourney.com\/study-on-secure-coding-training\"><span style=\"font-weight: 400;\">47 percent of organizations<\/span><\/a><span style=\"font-weight: 400;\"> blame their challenges remediating vulnerabilities in production on a lack of qualified personnel \u2013 showing that even within the software development lifecycle (SDLC), there is an unfairly spread security burden. In large organizations, though, resources should not be an accepted explanation for poor security standards. End users with tight security budgets and smaller teams should never have to shoulder the security shortfalls of a solution that they\u2019ve paid for and expected to be trustworthy.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But competing aggressively to acquire talent from the limited pool with security expertise is not the only solution: the shift left and shift everywhere movements have long emphasized the importance of security skills across the SLDC, even within development teams.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With many developers now turning to AI code to increase efficiency even further, it is critical that they are also equipped with the secure coding knowledge to thoroughly assess the output for security risks. Fostering the security skills of their developers is a critical way for large software vendors to reduce the number of vulnerabilities in production while showing a real commitment to improving the security of the applications they release.\u00a0<\/span><\/p>\n<p><b>Moving beyond ticking boxes<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Developing a security-centric mindset within all software vendors will be crucial to overcoming today\u2019s patching crisis. There is often a disconnect between security and development teams, with the goal of security often appearing to be at odds with competitive success. Driving a culture of shared responsibility would help establish accountability in all departments and stages of the SDLC, without penalizing organizations who prioritize security over speed to market.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Well-trained and knowledgeable development teams and project managers are the foundation of this change. The unfortunate reality is that many organizations don\u2019t see security training for developers as a priority, with <\/span><a href=\"https:\/\/info.securityjourney.com\/study-on-secure-coding-training\"><span style=\"font-weight: 400;\">68 percent<\/span><\/a><span style=\"font-weight: 400;\"> only providing secure coding training for the purposes of compliance or in the event of an exploit. The urge to create code faster than ever often means that developers\u2019 schedules cannot account for even small sessions of secure coding training, so organizations train only when they have to. Checking the box for compliance is easy but it doesn\u2019t build a security-centric culture, opening the door for complacency, oversight, and poor retention from secure code training sessions when they do happen.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The industry as a whole is severely lacking in the prevalence, frequency, and quality of training. Software vendors need to understand that software security is a central concern for their customers, one that justifies continuous training and allots time for rigorous code reviews.\u00a0<\/span><\/p>\n<p><b>Proactivity is always the answer<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Building a comprehensive and proactive approach to software security can help organizations mitigate security risks when software vendors fail. A concerning <\/span><a href=\"https:\/\/info.securityjourney.com\/study-on-secure-coding-training\"><span style=\"font-weight: 400;\">55 percent<\/span><\/a><span style=\"font-weight: 400;\"> of security leaders report that a misalignment between development, compliance, and security teams causes delays in patching. In giant tech corporations, this misalignment is heightened. By taking a proactive approach that assesses and responds to CVEs based on risk prioritization, organizations can realign their teams with clear patching protocols.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In a threat landscape where reactive methods are no longer sufficient, investing in education and detection is crucial. When developing in-house applications or configurations, developers should be capable of sniffing out any code that could potentially give threat actors a foothold into their networks. Although it is the responsibility of software vendors to release secure applications, many vulnerabilities arise from misconfigurations when software is uploaded onto a new or existing system. It is absolutely crucial that in-house developers have the proper education and skills to ensure that applications are configured and used as designed, scanning regularly for new vulnerabilities before a bad actor can exploit them.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The current patching crisis is the result of the rapid innovations that are happening in the industry today, and this is not an inherently bad thing. But as customers and regulators come to expect higher standards of software security, organizations can help themselves to meet the patching crisis head on by embracing \u201csecurity by design\u201d principles and proactive patch management strategies \u00a0 in their own internal teams.\u00a0 <\/span><\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>The software industry is no longer functional. Last year alone saw over 28,000 new CVEs published, a record rise that perfectly illustrates the ongoing patching crisis facing security and development teams, which are under constant pressure to patch vulnerabilities or risk exposure. In the last 12 months, software vulnerabilities led to over 50 percent of  &hellip; <a class=\"read-more\" href=\"https:\/\/sdtimes.com\/ai\/achieving-security-by-design-is-a-question-of-accountability\/\">continue reading<\/a><!-- AddThis Advanced Settings generic via filter on get_the_excerpt --><!-- AddThis Share Buttons generic via filter on get_the_excerpt --><\/p>\n","protected":false},"author":1223,"featured_media":54542,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"cybocfi_hide_featured_image":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[1],"tags":[143,8988,3999],"coauthors":[16951],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Achieving Security by Design is a question of accountability - SD Times<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sdtimes.com\/ai\/achieving-security-by-design-is-a-question-of-accountability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Achieving Security by Design is a question of accountability - SD Times\" \/>\n<meta property=\"og:description\" content=\"The software industry is no longer functional. Last year alone saw over 28,000 new CVEs published, a record rise that perfectly illustrates the ongoing patching crisis facing security and development teams, which are under constant pressure to patch vulnerabilities or risk exposure. In the last 12 months, software vulnerabilities led to over 50 percent of &hellip; continue reading\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sdtimes.com\/ai\/achieving-security-by-design-is-a-question-of-accountability\/\" \/>\n<meta property=\"og:site_name\" content=\"SD Times\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SDTimesD2\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-13T14:23:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/05\/iStock-889592404.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1358\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michael Burch\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sdtimes\" \/>\n<meta name=\"twitter:site\" content=\"@sdtimes\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Burch\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sdtimes.com\/ai\/achieving-security-by-design-is-a-question-of-accountability\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sdtimes.com\/ai\/achieving-security-by-design-is-a-question-of-accountability\/\"},\"author\":{\"name\":\"Michael Burch\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/de9c73b2f85f9cd8f2f5eb7ba4a42879\"},\"headline\":\"Achieving Security by Design is a question of accountability\",\"datePublished\":\"2024-05-13T14:23:16+00:00\",\"dateModified\":\"2024-05-13T14:23:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sdtimes.com\/ai\/achieving-security-by-design-is-a-question-of-accountability\/\"},\"wordCount\":863,\"publisher\":{\"@id\":\"https:\/\/sdtimes.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/ai\/achieving-security-by-design-is-a-question-of-accountability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/05\/iStock-889592404.jpg\",\"keywords\":[\"AI\",\"application security\",\"shift-left\"],\"articleSection\":[\"Latest News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sdtimes.com\/ai\/achieving-security-by-design-is-a-question-of-accountability\/\",\"url\":\"https:\/\/sdtimes.com\/ai\/achieving-security-by-design-is-a-question-of-accountability\/\",\"name\":\"Achieving Security by Design is a question of accountability - SD Times\",\"isPartOf\":{\"@id\":\"https:\/\/sdtimes.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sdtimes.com\/ai\/achieving-security-by-design-is-a-question-of-accountability\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/ai\/achieving-security-by-design-is-a-question-of-accountability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/05\/iStock-889592404.jpg\",\"datePublished\":\"2024-05-13T14:23:16+00:00\",\"dateModified\":\"2024-05-13T14:23:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sdtimes.com\/ai\/achieving-security-by-design-is-a-question-of-accountability\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sdtimes.com\/ai\/achieving-security-by-design-is-a-question-of-accountability\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/ai\/achieving-security-by-design-is-a-question-of-accountability\/#primaryimage\",\"url\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/05\/iStock-889592404.jpg\",\"contentUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/05\/iStock-889592404.jpg\",\"width\":1920,\"height\":1358,\"caption\":\"Plaster on a display\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sdtimes.com\/ai\/achieving-security-by-design-is-a-question-of-accountability\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sdtimes.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Achieving Security by Design is a question of accountability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sdtimes.com\/#website\",\"url\":\"https:\/\/sdtimes.com\/\",\"name\":\"SD Times\",\"description\":\"Software Development News\",\"publisher\":{\"@id\":\"https:\/\/sdtimes.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sdtimes.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sdtimes.com\/#organization\",\"name\":\"SD Times\",\"url\":\"https:\/\/sdtimes.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png\",\"contentUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png\",\"width\":225,\"height\":90,\"caption\":\"SD Times\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/SDTimesD2\",\"https:\/\/x.com\/sdtimes\",\"https:\/\/www.linkedin.com\/company\/sdtimes\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/de9c73b2f85f9cd8f2f5eb7ba4a42879\",\"name\":\"Michael Burch\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/image\/9a79ddf4f5860125fd9b9106178d0376\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/92860ecdce23193c6c322eabf6466286?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/92860ecdce23193c6c322eabf6466286?s=96&d=mm&r=g\",\"caption\":\"Michael Burch\"},\"description\":\"Michael Burch is Director of Application Security at Security Journey\",\"url\":\"https:\/\/sdtimes.com\/author\/mike-b\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Achieving Security by Design is a question of accountability - SD Times","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sdtimes.com\/ai\/achieving-security-by-design-is-a-question-of-accountability\/","og_locale":"en_US","og_type":"article","og_title":"Achieving Security by Design is a question of accountability - SD Times","og_description":"The software industry is no longer functional. Last year alone saw over 28,000 new CVEs published, a record rise that perfectly illustrates the ongoing patching crisis facing security and development teams, which are under constant pressure to patch vulnerabilities or risk exposure. In the last 12 months, software vulnerabilities led to over 50 percent of &hellip; continue reading","og_url":"https:\/\/sdtimes.com\/ai\/achieving-security-by-design-is-a-question-of-accountability\/","og_site_name":"SD Times","article_publisher":"https:\/\/www.facebook.com\/SDTimesD2","article_published_time":"2024-05-13T14:23:16+00:00","og_image":[{"width":1920,"height":1358,"url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/05\/iStock-889592404.jpg","type":"image\/jpeg"}],"author":"Michael Burch","twitter_card":"summary_large_image","twitter_creator":"@sdtimes","twitter_site":"@sdtimes","twitter_misc":{"Written by":"Michael Burch","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sdtimes.com\/ai\/achieving-security-by-design-is-a-question-of-accountability\/#article","isPartOf":{"@id":"https:\/\/sdtimes.com\/ai\/achieving-security-by-design-is-a-question-of-accountability\/"},"author":{"name":"Michael Burch","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/de9c73b2f85f9cd8f2f5eb7ba4a42879"},"headline":"Achieving Security by Design is a question of accountability","datePublished":"2024-05-13T14:23:16+00:00","dateModified":"2024-05-13T14:23:16+00:00","mainEntityOfPage":{"@id":"https:\/\/sdtimes.com\/ai\/achieving-security-by-design-is-a-question-of-accountability\/"},"wordCount":863,"publisher":{"@id":"https:\/\/sdtimes.com\/#organization"},"image":{"@id":"https:\/\/sdtimes.com\/ai\/achieving-security-by-design-is-a-question-of-accountability\/#primaryimage"},"thumbnailUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/05\/iStock-889592404.jpg","keywords":["AI","application security","shift-left"],"articleSection":["Latest News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sdtimes.com\/ai\/achieving-security-by-design-is-a-question-of-accountability\/","url":"https:\/\/sdtimes.com\/ai\/achieving-security-by-design-is-a-question-of-accountability\/","name":"Achieving Security by Design is a question of accountability - SD Times","isPartOf":{"@id":"https:\/\/sdtimes.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sdtimes.com\/ai\/achieving-security-by-design-is-a-question-of-accountability\/#primaryimage"},"image":{"@id":"https:\/\/sdtimes.com\/ai\/achieving-security-by-design-is-a-question-of-accountability\/#primaryimage"},"thumbnailUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/05\/iStock-889592404.jpg","datePublished":"2024-05-13T14:23:16+00:00","dateModified":"2024-05-13T14:23:16+00:00","breadcrumb":{"@id":"https:\/\/sdtimes.com\/ai\/achieving-security-by-design-is-a-question-of-accountability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sdtimes.com\/ai\/achieving-security-by-design-is-a-question-of-accountability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/ai\/achieving-security-by-design-is-a-question-of-accountability\/#primaryimage","url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/05\/iStock-889592404.jpg","contentUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/05\/iStock-889592404.jpg","width":1920,"height":1358,"caption":"Plaster on a display"},{"@type":"BreadcrumbList","@id":"https:\/\/sdtimes.com\/ai\/achieving-security-by-design-is-a-question-of-accountability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sdtimes.com\/"},{"@type":"ListItem","position":2,"name":"Achieving Security by Design is a question of accountability"}]},{"@type":"WebSite","@id":"https:\/\/sdtimes.com\/#website","url":"https:\/\/sdtimes.com\/","name":"SD Times","description":"Software Development News","publisher":{"@id":"https:\/\/sdtimes.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sdtimes.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sdtimes.com\/#organization","name":"SD Times","url":"https:\/\/sdtimes.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/","url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png","contentUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png","width":225,"height":90,"caption":"SD Times"},"image":{"@id":"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/SDTimesD2","https:\/\/x.com\/sdtimes","https:\/\/www.linkedin.com\/company\/sdtimes\/"]},{"@type":"Person","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/de9c73b2f85f9cd8f2f5eb7ba4a42879","name":"Michael Burch","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/image\/9a79ddf4f5860125fd9b9106178d0376","url":"https:\/\/secure.gravatar.com\/avatar\/92860ecdce23193c6c322eabf6466286?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/92860ecdce23193c6c322eabf6466286?s=96&d=mm&r=g","caption":"Michael Burch"},"description":"Michael Burch is Director of Application Security at Security Journey","url":"https:\/\/sdtimes.com\/author\/mike-b\/"}]}},"_links":{"self":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/54541"}],"collection":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/users\/1223"}],"replies":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/comments?post=54541"}],"version-history":[{"count":1,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/54541\/revisions"}],"predecessor-version":[{"id":54543,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/54541\/revisions\/54543"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/media\/54542"}],"wp:attachment":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/media?parent=54541"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/categories?post=54541"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/tags?post=54541"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/coauthors?post=54541"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}