{"id":105,"date":"2016-10-13T13:15:27","date_gmt":"2016-10-13T12:15:27","guid":{"rendered":"http:\/\/akquinet-security-en.blog\/?p=105"},"modified":"2020-07-24T10:04:40","modified_gmt":"2020-07-24T08:04:40","slug":"do-you-still-rely-on-inspector-chance-when-identifying-cyberattacks","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2016\/10\/13\/do-you-still-rely-on-inspector-chance-when-identifying-cyberattacks\/","title":{"rendered":"Do you still rely on \u201cInspector Chance\u201d when identifying cyberattacks?"},"content":{"rendered":"<h2><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-44 alignleft\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/ssr.jpg\" alt=\"ssr\" width=\"250\" height=\"180\" \/><span style=\"color: #626161;\">SAP protection in real-time with the SAST SECURITY RADAR.<\/span><\/h2>\n<p><span style=\"color: #626161;\">We show you how easy it is to respond in an emergency with the AKQUINET SAST SECURITY RADAR. In the area of corporate crime, more and more companies are coming to realize they still have work to do when it comes to prevention and response<strong>.<\/strong><\/span><\/p>\n<p><span style=\"color: #626161;\"><!--more--><\/span><\/p>\n<p><span style=\"color: #626161;\">In the past two years, more than one third of companies in Germany were affected by corporate crime and for large companies, this figure rises to almost half. According to Robert Mueller, director of the FBI, there are only two kinds of companies: those that have already been hacked, and those that will be. The larger and more complex the company structure, the more likely such damage is to be detected only by \u201cInspector Chance\u201d.*<\/span><\/p>\n<p><span style=\"color: #626161;\">There can never be a 100% protection. However, for your SAP systems at least, you can get considerably closer to this target &#8211; as our customers can also confirm.<\/span><\/p>\n<p><span style=\"color: #626161;\">The AKQUINET GRC Suite \u201cSAST\u201d offers security at all levels, and our latest module, the SAST SECURITY RADAR, even reports security incidents in your SAP systems in real-time. As a result, we have also been able to win over \u201cInitiative Mittelstand,\u201d which for the second time in succession, awarded the solution the <span style=\"color: #c13b70;\"><a style=\"color: #c13b70;\" href=\"https:\/\/akquinet-security-en.blog\/2016\/04\/03\/sast-security-radar-scores-to-marks-again-in-the-it-innovation-prize-2016\/\" target=\"_blank\" rel=\"noopener noreferrer\">\u201cBest of IT-Security\u201d<\/a><\/span> innovation prize.\u00a0<\/span><\/p>\n<p><span style=\"color: #626161;\"><strong>Your advantages<\/strong><\/span><\/p>\n<ul>\n<li><span style=\"color: #626161;\">The SAST software is integrated in your SAP system and fully functioning within just a few hours.<\/span><\/li>\n<li><span style=\"color: #626161;\">You do not need any additional hardware.<\/span><\/li>\n<li><span style=\"color: #626161;\">Real-time monitoring can be carried out locally on every system or from a central system.<\/span><\/li>\n<li><span style=\"color: #626161;\">Immediate response to events in the form of information via the SAST app or e-mail.<\/span><\/li>\n<li><span style=\"color: #626161;\">Filter rules reduce your log lines to a few hundred security-critical events per day.<\/span><\/li>\n<li><span style=\"color: #626161;\">If required, our experts support you in limiting this to a few events per day for which actual investigation is needed.<\/span><\/li>\n<li><span style=\"color: #626161;\">Adaptability to your own specific requirements with just a few mouse clicks<\/span>.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-107 aligncenter\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/sap-mobile-protect-eng.png\" alt=\"sap-mobile-protect-eng\" width=\"600\" height=\"350\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2017\/01\/sap-mobile-protect-eng.png 1251w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2017\/01\/sap-mobile-protect-eng-300x175.png 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2017\/01\/sap-mobile-protect-eng-768x448.png 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2017\/01\/sap-mobile-protect-eng-1024x598.png 1024w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p><span style=\"color: #626161;\">Would you like to accelerate your response time in critical situations, but lack the resources? With the Managed SAP Security Service from AKQUINET, we take over the day-to-day protection of your SAP systems and you are reliably informed by us within an hour about every security-relevant incident. On the basis of our weekly and monthly reports, you have the security of your SAP systems well in hand and can focus fully on your day-to-day business.<\/span><\/p>\n<p><span style=\"color: #626161;\">Curious? If so, ask our advice:<\/span> <a href=\"mailto:ask@akquinet.de\"><strong>knowhow@akquinet.de <\/strong><\/a><\/p>\n<h6><span style=\"color: #626161;\">* KPMG study \u201cCorporate crime in Germany 2016&#8243;<\/span><\/h6>\n","protected":false},"excerpt":{"rendered":"<p>SAP protection in real-time with the SAST SECURITY RADAR.<br \/>\nWe show you how easy it is to respond in an emergency with the AKQUINET SAST SECURITY RADAR. In the area of corporate crime, more and more companies are coming to realize they still have work to do when it comes to prevention and response.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[156,58,80,114],"class_list":["post-105","post","type-post","status-publish","format-standard","hentry","category-sast-suite","tag-cyber-security","tag-real-time-monitoring","tag-sap-security","tag-threat-detection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Do you still rely on \u201cInspector Chance\u201d when identifying cyberattacks?<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2016\/10\/13\/do-you-still-rely-on-inspector-chance-when-identifying-cyberattacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Do you still rely on \u201cInspector Chance\u201d when identifying cyberattacks?\" \/>\n<meta property=\"og:description\" content=\"SAP protection in real-time with the SAST SECURITY RADAR. We show you how easy it is to respond in an emergency with the AKQUINET SAST SECURITY RADAR. In the area of corporate crime, more and more companies are coming to realize they still have work to do when it comes to prevention and response.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2016\/10\/13\/do-you-still-rely-on-inspector-chance-when-identifying-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-13T12:15:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-24T08:04:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/ssr.jpg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2016\\\/10\\\/13\\\/do-you-still-rely-on-inspector-chance-when-identifying-cyberattacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2016\\\/10\\\/13\\\/do-you-still-rely-on-inspector-chance-when-identifying-cyberattacks\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"Do you still rely on \u201cInspector Chance\u201d when identifying cyberattacks?\",\"datePublished\":\"2016-10-13T12:15:27+00:00\",\"dateModified\":\"2020-07-24T08:04:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2016\\\/10\\\/13\\\/do-you-still-rely-on-inspector-chance-when-identifying-cyberattacks\\\/\"},\"wordCount\":417,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2016\\\/10\\\/13\\\/do-you-still-rely-on-inspector-chance-when-identifying-cyberattacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2017\\\/01\\\/ssr.jpg\",\"keywords\":[\"Cyber Security\",\"Real-time monitoring\",\"SAP Security\",\"Threat Detection\"],\"articleSection\":[\"SAST SUITE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2016\\\/10\\\/13\\\/do-you-still-rely-on-inspector-chance-when-identifying-cyberattacks\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2016\\\/10\\\/13\\\/do-you-still-rely-on-inspector-chance-when-identifying-cyberattacks\\\/\",\"name\":\"Do you still rely on \u201cInspector Chance\u201d when identifying cyberattacks?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2016\\\/10\\\/13\\\/do-you-still-rely-on-inspector-chance-when-identifying-cyberattacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2016\\\/10\\\/13\\\/do-you-still-rely-on-inspector-chance-when-identifying-cyberattacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2017\\\/01\\\/ssr.jpg\",\"datePublished\":\"2016-10-13T12:15:27+00:00\",\"dateModified\":\"2020-07-24T08:04:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2016\\\/10\\\/13\\\/do-you-still-rely-on-inspector-chance-when-identifying-cyberattacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2016\\\/10\\\/13\\\/do-you-still-rely-on-inspector-chance-when-identifying-cyberattacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2016\\\/10\\\/13\\\/do-you-still-rely-on-inspector-chance-when-identifying-cyberattacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2017\\\/01\\\/ssr.jpg\",\"contentUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2017\\\/01\\\/ssr.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2016\\\/10\\\/13\\\/do-you-still-rely-on-inspector-chance-when-identifying-cyberattacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Do you still rely on \u201cInspector Chance\u201d when identifying cyberattacks?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Do you still rely on \u201cInspector Chance\u201d when identifying cyberattacks?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2016\/10\/13\/do-you-still-rely-on-inspector-chance-when-identifying-cyberattacks\/","og_locale":"en_US","og_type":"article","og_title":"Do you still rely on \u201cInspector Chance\u201d when identifying cyberattacks?","og_description":"SAP protection in real-time with the SAST SECURITY RADAR. We show you how easy it is to respond in an emergency with the AKQUINET SAST SECURITY RADAR. In the area of corporate crime, more and more companies are coming to realize they still have work to do when it comes to prevention and response.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2016\/10\/13\/do-you-still-rely-on-inspector-chance-when-identifying-cyberattacks\/","og_site_name":"SAST BLOG","article_published_time":"2016-10-13T12:15:27+00:00","article_modified_time":"2020-07-24T08:04:40+00:00","og_image":[{"url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/ssr.jpg","type":"","width":"","height":""}],"author":"securityblog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"securityblog","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2016\/10\/13\/do-you-still-rely-on-inspector-chance-when-identifying-cyberattacks\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2016\/10\/13\/do-you-still-rely-on-inspector-chance-when-identifying-cyberattacks\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"Do you still rely on \u201cInspector Chance\u201d when identifying cyberattacks?","datePublished":"2016-10-13T12:15:27+00:00","dateModified":"2020-07-24T08:04:40+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2016\/10\/13\/do-you-still-rely-on-inspector-chance-when-identifying-cyberattacks\/"},"wordCount":417,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2016\/10\/13\/do-you-still-rely-on-inspector-chance-when-identifying-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/ssr.jpg","keywords":["Cyber Security","Real-time monitoring","SAP Security","Threat Detection"],"articleSection":["SAST SUITE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2016\/10\/13\/do-you-still-rely-on-inspector-chance-when-identifying-cyberattacks\/","url":"https:\/\/sast-solutions.com\/blog-en\/2016\/10\/13\/do-you-still-rely-on-inspector-chance-when-identifying-cyberattacks\/","name":"Do you still rely on \u201cInspector Chance\u201d when identifying cyberattacks?","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2016\/10\/13\/do-you-still-rely-on-inspector-chance-when-identifying-cyberattacks\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2016\/10\/13\/do-you-still-rely-on-inspector-chance-when-identifying-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/ssr.jpg","datePublished":"2016-10-13T12:15:27+00:00","dateModified":"2020-07-24T08:04:40+00:00","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2016\/10\/13\/do-you-still-rely-on-inspector-chance-when-identifying-cyberattacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2016\/10\/13\/do-you-still-rely-on-inspector-chance-when-identifying-cyberattacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2016\/10\/13\/do-you-still-rely-on-inspector-chance-when-identifying-cyberattacks\/#primaryimage","url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/ssr.jpg","contentUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/ssr.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2016\/10\/13\/do-you-still-rely-on-inspector-chance-when-identifying-cyberattacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"Do you still rely on \u201cInspector Chance\u201d when identifying cyberattacks?"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/105","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=105"}],"version-history":[{"count":1,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/105\/revisions"}],"predecessor-version":[{"id":1323,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/105\/revisions\/1323"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=105"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=105"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}