{"id":7666,"date":"2023-10-31T22:42:12","date_gmt":"2023-10-31T21:42:12","guid":{"rendered":"https:\/\/irg-net.com\/?p=7666"},"modified":"2023-10-31T23:42:13","modified_gmt":"2023-10-31T22:42:13","slug":"generative-ai-meets-cybersecurity-use-cases","status":"publish","type":"post","link":"https:\/\/irg-net.com\/index.php\/generative-ai-meets-cybersecurity-use-cases\/","title":{"rendered":"Generative AI Meets Cybersecurity: Use Cases&#8230;"},"content":{"rendered":"<p>Generative AI Meets Cybersecurity: Use Cases for Lateral Security and the SOC<\/p>\n<p><a href='https:\/\/dy.si\/BU5g5d2' target='_blank' rel=\"noopener\"><img src='https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/68935045-d750-4306-86df-a34e59dbbbe4\/?size=Box320'><\/a><\/p>\n<h4><a href='https:\/\/dy.si\/BU5g5d2' style='text-decoration: none' target='_blank' rel=\"noopener\">Generative AI Meets Cybersecurity: Use Cases&#8230;<\/a><\/h4>\n<p>With security, the battle between good and evil is always a swinging pendulum. Traditionally, the shrewdness of the attack has depended on the skill of the attacker and the sophistication of the arsenal. This is true on the protection side of the equation, too\u2014over $200B in investments have [&#8230;]<\/p>\n<hr \/>\n<p><a href='http:\/\/advocacy.vmware.com' target='_blank' rel=\"noopener\">VMware Social Media Advocacy<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Generative AI Meets Cybersecurity: Use Cases for Lateral Security and the SOC Generative AI Meets Cybersecurity: Use Cases&#8230; With security, the battle between good and evil is always a swinging pendulum. Traditionally, the shrewdness of the attack has depended on the skill of the attacker and the sophistication of the arsenal. This is true on [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_post_was_ever_published":false},"categories":[1],"tags":[],"class_list":["post-7666","post","type-post","status-publish","format-standard","hentry","category-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Generative AI Meets Cybersecurity: Use Cases... - irgNET<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/generative-ai-meets-cybersecurity-use-cases\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Generative AI Meets Cybersecurity: Use Cases... - irgNET\" \/>\n<meta property=\"og:description\" content=\"Generative AI Meets Cybersecurity: Use Cases for Lateral Security and the SOC Generative AI Meets Cybersecurity: Use Cases&#8230; With security, the battle between good and evil is always a swinging pendulum. Traditionally, the shrewdness of the attack has depended on the skill of the attacker and the sophistication of the arsenal. This is true on [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/generative-ai-meets-cybersecurity-use-cases\/\" \/>\n<meta property=\"og:site_name\" content=\"irgNET\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-31T21:42:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-31T22:42:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/68935045-d750-4306-86df-a34e59dbbbe4\/?size=Box320\" \/>\n<meta name=\"author\" content=\"vExpert\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@irg_net\" \/>\n<meta name=\"twitter:site\" content=\"@irg_net\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"vExpert\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/generative-ai-meets-cybersecurity-use-cases\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/generative-ai-meets-cybersecurity-use-cases\\\/\"},\"author\":{\"name\":\"vExpert\",\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/#\\\/schema\\\/person\\\/ad045fcfa1007f9dbb8bce2f216d4e35\"},\"headline\":\"Generative AI Meets Cybersecurity: Use Cases&#8230;\",\"datePublished\":\"2023-10-31T21:42:12+00:00\",\"dateModified\":\"2023-10-31T22:42:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/generative-ai-meets-cybersecurity-use-cases\\\/\"},\"wordCount\":77,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/generative-ai-meets-cybersecurity-use-cases\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/d3utlhu53nfcwz.cloudfront.net\\\/171901\\\/cdnImage\\\/article\\\/68935045-d750-4306-86df-a34e59dbbbe4\\\/?size=Box320\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/generative-ai-meets-cybersecurity-use-cases\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/generative-ai-meets-cybersecurity-use-cases\\\/\",\"url\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/generative-ai-meets-cybersecurity-use-cases\\\/\",\"name\":\"Generative AI Meets Cybersecurity: Use Cases... - irgNET\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/generative-ai-meets-cybersecurity-use-cases\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/generative-ai-meets-cybersecurity-use-cases\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/d3utlhu53nfcwz.cloudfront.net\\\/171901\\\/cdnImage\\\/article\\\/68935045-d750-4306-86df-a34e59dbbbe4\\\/?size=Box320\",\"datePublished\":\"2023-10-31T21:42:12+00:00\",\"dateModified\":\"2023-10-31T22:42:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/generative-ai-meets-cybersecurity-use-cases\\\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/generative-ai-meets-cybersecurity-use-cases\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/generative-ai-meets-cybersecurity-use-cases\\\/#primaryimage\",\"url\":\"https:\\\/\\\/d3utlhu53nfcwz.cloudfront.net\\\/171901\\\/cdnImage\\\/article\\\/68935045-d750-4306-86df-a34e59dbbbe4\\\/?size=Box320\",\"contentUrl\":\"https:\\\/\\\/d3utlhu53nfcwz.cloudfront.net\\\/171901\\\/cdnImage\\\/article\\\/68935045-d750-4306-86df-a34e59dbbbe4\\\/?size=Box320\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/generative-ai-meets-cybersecurity-use-cases\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Generative AI Meets Cybersecurity: Use Cases&#8230;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/#website\",\"url\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/\",\"name\":\"irgNET\",\"description\":\"a virtual Knowledge Base\",\"publisher\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/#organization\",\"name\":\"irg-NET\",\"url\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i2.wp.com\\\/irg-net.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/cropped-FINAL-Removed-Alpha.png?fit=2048%2C2048&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i2.wp.com\\\/irg-net.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/cropped-FINAL-Removed-Alpha.png?fit=2048%2C2048&ssl=1\",\"width\":2048,\"height\":2048,\"caption\":\"irg-NET\"},\"image\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/irg_net\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/h-cemre-g\u00fcnay-2b61601b4\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UC8GknhO5YMAkAoVxppu6aaQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/#\\\/schema\\\/person\\\/ad045fcfa1007f9dbb8bce2f216d4e35\",\"name\":\"vExpert\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9c9040288c07ac1cec5cb257e278f78d3f68990d7d0a2d761f209ebd4c8cf0ae?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9c9040288c07ac1cec5cb257e278f78d3f68990d7d0a2d761f209ebd4c8cf0ae?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9c9040288c07ac1cec5cb257e278f78d3f68990d7d0a2d761f209ebd4c8cf0ae?s=96&r=g\",\"caption\":\"vExpert\"},\"sameAs\":[\"https:\\\/\\\/irg-net.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Generative AI Meets Cybersecurity: Use Cases... - irgNET","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/generative-ai-meets-cybersecurity-use-cases\/","og_locale":"en_US","og_type":"article","og_title":"Generative AI Meets Cybersecurity: Use Cases... - irgNET","og_description":"Generative AI Meets Cybersecurity: Use Cases for Lateral Security and the SOC Generative AI Meets Cybersecurity: Use Cases&#8230; With security, the battle between good and evil is always a swinging pendulum. Traditionally, the shrewdness of the attack has depended on the skill of the attacker and the sophistication of the arsenal. This is true on [&hellip;]","og_url":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/generative-ai-meets-cybersecurity-use-cases\/","og_site_name":"irgNET","article_published_time":"2023-10-31T21:42:12+00:00","article_modified_time":"2023-10-31T22:42:13+00:00","og_image":[{"url":"https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/68935045-d750-4306-86df-a34e59dbbbe4\/?size=Box320","type":"","width":"","height":""}],"author":"vExpert","twitter_card":"summary_large_image","twitter_creator":"@irg_net","twitter_site":"@irg_net","twitter_misc":{"Written by":"vExpert"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/generative-ai-meets-cybersecurity-use-cases\/#article","isPartOf":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/generative-ai-meets-cybersecurity-use-cases\/"},"author":{"name":"vExpert","@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/#\/schema\/person\/ad045fcfa1007f9dbb8bce2f216d4e35"},"headline":"Generative AI Meets Cybersecurity: Use Cases&#8230;","datePublished":"2023-10-31T21:42:12+00:00","dateModified":"2023-10-31T22:42:13+00:00","mainEntityOfPage":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/generative-ai-meets-cybersecurity-use-cases\/"},"wordCount":77,"commentCount":0,"publisher":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/#organization"},"image":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/generative-ai-meets-cybersecurity-use-cases\/#primaryimage"},"thumbnailUrl":"https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/68935045-d750-4306-86df-a34e59dbbbe4\/?size=Box320","articleSection":["Blog"],"inLanguage":"en","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/generative-ai-meets-cybersecurity-use-cases\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/generative-ai-meets-cybersecurity-use-cases\/","url":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/generative-ai-meets-cybersecurity-use-cases\/","name":"Generative AI Meets Cybersecurity: Use Cases... - irgNET","isPartOf":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/generative-ai-meets-cybersecurity-use-cases\/#primaryimage"},"image":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/generative-ai-meets-cybersecurity-use-cases\/#primaryimage"},"thumbnailUrl":"https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/68935045-d750-4306-86df-a34e59dbbbe4\/?size=Box320","datePublished":"2023-10-31T21:42:12+00:00","dateModified":"2023-10-31T22:42:13+00:00","breadcrumb":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/generative-ai-meets-cybersecurity-use-cases\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/generative-ai-meets-cybersecurity-use-cases\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/generative-ai-meets-cybersecurity-use-cases\/#primaryimage","url":"https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/68935045-d750-4306-86df-a34e59dbbbe4\/?size=Box320","contentUrl":"https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/68935045-d750-4306-86df-a34e59dbbbe4\/?size=Box320"},{"@type":"BreadcrumbList","@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/generative-ai-meets-cybersecurity-use-cases\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/"},{"@type":"ListItem","position":2,"name":"Generative AI Meets Cybersecurity: Use Cases&#8230;"}]},{"@type":"WebSite","@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/#website","url":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/","name":"irgNET","description":"a virtual Knowledge Base","publisher":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/#organization","name":"irg-NET","url":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/#\/schema\/logo\/image\/","url":"https:\/\/i2.wp.com\/irg-net.com\/wp-content\/uploads\/2021\/06\/cropped-FINAL-Removed-Alpha.png?fit=2048%2C2048&ssl=1","contentUrl":"https:\/\/i2.wp.com\/irg-net.com\/wp-content\/uploads\/2021\/06\/cropped-FINAL-Removed-Alpha.png?fit=2048%2C2048&ssl=1","width":2048,"height":2048,"caption":"irg-NET"},"image":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/irg_net","https:\/\/www.linkedin.com\/in\/h-cemre-g\u00fcnay-2b61601b4\/","https:\/\/www.youtube.com\/channel\/UC8GknhO5YMAkAoVxppu6aaQ"]},{"@type":"Person","@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/#\/schema\/person\/ad045fcfa1007f9dbb8bce2f216d4e35","name":"vExpert","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/secure.gravatar.com\/avatar\/9c9040288c07ac1cec5cb257e278f78d3f68990d7d0a2d761f209ebd4c8cf0ae?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9c9040288c07ac1cec5cb257e278f78d3f68990d7d0a2d761f209ebd4c8cf0ae?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9c9040288c07ac1cec5cb257e278f78d3f68990d7d0a2d761f209ebd4c8cf0ae?s=96&r=g","caption":"vExpert"},"sameAs":["https:\/\/irg-net.com"]}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/posts\/7666","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/comments?post=7666"}],"version-history":[{"count":1,"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/posts\/7666\/revisions"}],"predecessor-version":[{"id":7667,"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/posts\/7666\/revisions\/7667"}],"wp:attachment":[{"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/media?parent=7666"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/categories?post=7666"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/tags?post=7666"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}