{"id":23998,"date":"2025-05-19T17:21:34","date_gmt":"2025-05-19T15:21:34","guid":{"rendered":"https:\/\/www.advens.com\/?p=23998"},"modified":"2025-05-19T17:21:36","modified_gmt":"2025-05-19T15:21:36","slug":"automation-operational-cyber-security","status":"publish","type":"post","link":"https:\/\/www.advens.com\/en\/media\/security-operations\/automation-operational-cyber-security\/","title":{"rendered":"Looking past the hype: the reality of automation in operational cyber security"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">Automation in operational cyber security: stop the hype<\/h3>\n\n\n\n<p>In cyber security, automation is often reduced to a marketing concept \u2013 SOAR. This describes the actions, once performed manually by cyber analysts, that can now be automated. Adopting <strong>automation in operational cyber security<\/strong> has become crucial for:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Assessing and responding quickly to certain security incidents when every minute counts (i.e. <a href=\"https:\/\/www.advens.fr\/en\/article\/ransomware-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\">ransomware attacks<\/a>).<\/li>\n\n\n\n<li>Optimising the time experts spend working and <strong>preventing cyber fatigue<\/strong> (limiting tedious, repetitive and time-consuming tasks).<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">High expectations vs promises: a potentially vicious circle<\/h2>\n\n\n\n<p>Faced with a growing threat and increasingly fast and sophisticated attacks, companies have heightened expectations of their cyber protection \u2013 particularly regarding <strong>reaction time<\/strong> (identifying and responding to incidents) and <strong>relevant alerts<\/strong> (avoiding false positives).<\/p>\n\n\n\n<p>In response, software publishers are inclined to offer quick-fix solutions, which inevitably struggle to deliver on their promises. These somewhat oversold solutions serve mainly to enable analysts to sort and assess alerts more quickly, but are <strong>less helpful for responding to incidents<\/strong>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Three limitations of automation in cyber security<\/h3>\n\n\n\n<h2 class=\"wp-block-heading\">#1 Technical limitations<\/h2>\n\n\n\n<p>It is generally possible to automate detecting, classifying and identifying actions. But to perform <strong>remediation actions<\/strong>, clients&#8217; technical solutions must be orchestrable, aided by the presence of an API to administer the targeted technology. It is also essential to <strong>ensure the scalability <\/strong>of an orchestration solution so it can handle multiple automations.<\/p>\n\n\n\n<p>An <strong>on-premise<\/strong> solution, which can only be managed via a graphical user interface, is much more complicated to orchestrate remotely.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">#2 Lack of context<\/h2>\n\n\n\n<p>To automate decision-making, you need context and repeatable, controlled patterns and models. But keeping <strong>context repositories complete and up to date<\/strong> is almost impossible! The information is often scattered and incomplete, or even stored only in the heads of experts within the organisation. And automating operational cyber security telepathically is not (yet) possible.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">#3 Lengthy approval process<\/h2>\n\n\n\n<p>It is possible to establish <strong>automatic reaction<\/strong> strategies within specific areas that the client has validated. But approval is usually required to be able to take concrete action.<\/p>\n\n\n\n<p>Some <strong>approval loops<\/strong> involve more than one person: the main contact might not be authorised to accept, or a third party might have to sign off on information before a decision is made, etc.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How Advens harnesses the power of automation<\/h3>\n\n\n\n<h2 class=\"wp-block-heading\">A data-centric and automation-by-design approach<\/h2>\n\n\n\n<p>At Advens, managing a security incident is a process that consists of several steps, <strong>each of which can be optimised<\/strong>. Background data and Cyber Threat Intelligence (CTI) must be integrated into the incident management process as early as possible (data-centric approach) to save time during analysis and limit the number of alerts.<\/p>\n\n\n\n<p>A crucial part of optimising a process is eliminating &#8220;unnecessary tasks&#8221;. That is the essence of <strong>automation by design<\/strong>: optimising workflow and automating trivial, repetitive or costly tasks performed by analysts.<\/p>\n\n\n\n<p>That is how Advens designed its <strong>SOC automation<\/strong>. It integrates and adds value to each step of the incident response process (collection, enrichment, threat detection, classification, communication and remediation).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Synergy and collective intelligence<\/h2>\n\n\n\n<p>By automating the CTI and the review of monitoring plans, Advens is able to provide a <strong>shared knowledge base<\/strong> to all the organisations it protects.<\/p>\n\n\n\n<p>The Advens mySoc platform can also be <strong>orchestrated via APIs<\/strong>. It lets experts and analysts create automations for specific business processes &#8211; making them both operators and designers of solutions.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Advens approach: four benefits for end users<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>A security incident management process that is <strong>optimised at every stage<\/strong>.<\/li>\n\n\n\n<li><strong>Shorter<\/strong> classification and remediation times.<\/li>\n\n\n\n<li><strong>A reduced false positive rate.<\/strong><\/li>\n\n\n\n<li><strong>An adaptive and evolving vision of cyber security:<\/strong> when other areas need to be secured or new algorithms are introduced, companies can seamlessly integrate them into their security process.<\/li>\n<\/ol>\n\n\n  \n<figure id=\"block-citation-1943897837\" class=\"acf-block-citation aligncenter mb-4\">\n  <blockquote class=\"blockquote\">\n    <p class=\"fs-3\">&#8220;Automating operational cyber security means integrating the entire processing flow, from enriching the data collected to remediation actions. At Advens, this is made possible by the data-centric and automation-by-design approach of our platform.&#8221;<\/p>\n  <\/blockquote>\n  <div class=\"d-flex align-items-center justify-content-start gap-3 gap-xl-4\">\n          <img decoding=\"async\" src=\"https:\/\/www.advens.com\/app\/uploads\/2023\/01\/mickae-l-beaumont-product-manager-chez-advens-150x150.jpg\" loading=\"lazy\" alt=\"Micka\u00ebl Beaumont\" class=\"img-fluid blockquote-img rounded-circle\"\/>\n        <figcaption class=\"blockquote-footer text-end d-flex flex-wrap align-items-center justify-content-end m-0\">\n      <strong>Micka\u00ebl Beaumont<\/strong>\n      <span class=\"mx-1\">\u2022<\/span>\n      <span>Product Manager at Advens<\/span>\n    <\/figcaption>\n  <\/div>\n<\/figure>\n\n\n\n<p>&#8220;Automating operational cyber security means integrating the entire processing flow, from enriching the data collected to remediation actions. At Advens, this is made possible by the data-centric and automation-by-design approach of our platform.&#8221; Micka\u00ebl Beaumont, Product Manager at Advens<\/p>\n\n\n\n<p><span style=\"font-weight:bold\">In light of increasingly aggressive and frequent attacks, automation is a must. But it is not a silver bullet! Incident detection and management can be automated, but remediation actions must be done by hand. Data context, collective intelligence and operational excellence are essential to achieving this. This is the core of how Advens&#8217; mySOC solution works.<\/span><\/p>\n\n\n\n<p class=\"has-text-align-center is-style-full-width\"><a href=\"https:\/\/www.advens.com\/en\/service\/mysoc\/\" target=\"_blank\" rel=\"noreferrer noopener\">Discover mySOC ><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Automation in operational cyber security: stop the hype In cyber security, automation is often reduced to a marketing concept \u2013 SOAR. This describes the actions, once performed manually by cyber analysts, that can now be automated. Adopting automation in operational cyber security has become crucial for: High expectations vs promises: a potentially vicious circle Faced [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":5071,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[470],"tags":[],"custom_format":[],"class_list":["post-23998","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-operations"],"acf":[],"contentshake_article_id":"","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Automating operational cyber security: the Advens approach<\/title>\n<meta name=\"description\" content=\"There are limits to automation in cyber security, especially in remediation. Advens sets the record straight and outlines its solutions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.advens.com\/en\/security-operations\/automation-operational-cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Automating operational cyber security: the Advens approach\" \/>\n<meta property=\"og:description\" content=\"There are limits to automation in cyber security, especially in remediation. Advens sets the record straight and outlines its solutions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.advens.com\/en\/security-operations\/automation-operational-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Advens\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-19T15:21:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-19T15:21:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.advens.com\/app\/uploads\/2023\/01\/automatisation-cybersecurite-operationnelle.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Benjamin Leroux\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.advens.com\/en\/security-operations\/automation-operational-cyber-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.advens.com\/en\/security-operations\/automation-operational-cyber-security\/\"},\"author\":{\"name\":\"Benjamin Leroux\",\"@id\":\"https:\/\/www.advens.com\/#\/schema\/person\/0a0cf6bfbcf86fdef2602cefe9b941c7\"},\"headline\":\"Looking past the hype: the reality of automation in operational cyber security\",\"datePublished\":\"2025-05-19T15:21:34+00:00\",\"dateModified\":\"2025-05-19T15:21:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.advens.com\/en\/security-operations\/automation-operational-cyber-security\/\"},\"wordCount\":714,\"publisher\":{\"@id\":\"https:\/\/www.advens.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.advens.com\/en\/security-operations\/automation-operational-cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.advens.com\/app\/uploads\/2023\/01\/automatisation-cybersecurite-operationnelle.jpg\",\"articleSection\":[\"Security Operations\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.advens.com\/en\/security-operations\/automation-operational-cyber-security\/\",\"url\":\"https:\/\/www.advens.com\/en\/security-operations\/automation-operational-cyber-security\/\",\"name\":\"Automating operational cyber security: the Advens approach\",\"isPartOf\":{\"@id\":\"https:\/\/www.advens.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.advens.com\/en\/security-operations\/automation-operational-cyber-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.advens.com\/en\/security-operations\/automation-operational-cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.advens.com\/app\/uploads\/2023\/01\/automatisation-cybersecurite-operationnelle.jpg\",\"datePublished\":\"2025-05-19T15:21:34+00:00\",\"dateModified\":\"2025-05-19T15:21:36+00:00\",\"description\":\"There are limits to automation in cyber security, especially in remediation. Advens sets the record straight and outlines its solutions.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.advens.com\/en\/security-operations\/automation-operational-cyber-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.advens.com\/en\/security-operations\/automation-operational-cyber-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.advens.com\/en\/security-operations\/automation-operational-cyber-security\/#primaryimage\",\"url\":\"https:\/\/www.advens.com\/app\/uploads\/2023\/01\/automatisation-cybersecurite-operationnelle.jpg\",\"contentUrl\":\"https:\/\/www.advens.com\/app\/uploads\/2023\/01\/automatisation-cybersecurite-operationnelle.jpg\",\"width\":1920,\"height\":1440,\"caption\":\"https:\/\/www.cyberun.net\/\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.advens.com\/en\/security-operations\/automation-operational-cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.advens.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Operations\",\"item\":\"https:\/\/www.advens.com\/en\/security-operations\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Looking past the hype: the reality of automation in operational cyber security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.advens.com\/#website\",\"url\":\"https:\/\/www.advens.com\/\",\"name\":\"Advens\",\"description\":\"For Cyber, People &amp; Planet\",\"publisher\":{\"@id\":\"https:\/\/www.advens.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.advens.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.advens.com\/#organization\",\"name\":\"Advens\",\"url\":\"https:\/\/www.advens.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.advens.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.advens.com\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png\",\"contentUrl\":\"https:\/\/www.advens.com\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png\",\"width\":1501,\"height\":1501,\"caption\":\"Advens\"},\"image\":{\"@id\":\"https:\/\/www.advens.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/advens\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.advens.com\/#\/schema\/person\/0a0cf6bfbcf86fdef2602cefe9b941c7\",\"name\":\"Benjamin Leroux\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.advens.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6130a303ba5e9000db1d968b9c41bf9e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6130a303ba5e9000db1d968b9c41bf9e?s=96&d=mm&r=g\",\"caption\":\"Benjamin Leroux\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/benjamin-leroux-1688a4\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Automating operational cyber security: the Advens approach","description":"There are limits to automation in cyber security, especially in remediation. Advens sets the record straight and outlines its solutions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.advens.com\/en\/security-operations\/automation-operational-cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"Automating operational cyber security: the Advens approach","og_description":"There are limits to automation in cyber security, especially in remediation. Advens sets the record straight and outlines its solutions.","og_url":"https:\/\/www.advens.com\/en\/security-operations\/automation-operational-cyber-security\/","og_site_name":"Advens","article_published_time":"2025-05-19T15:21:34+00:00","article_modified_time":"2025-05-19T15:21:36+00:00","og_image":[{"width":1920,"height":1440,"url":"https:\/\/www.advens.com\/app\/uploads\/2023\/01\/automatisation-cybersecurite-operationnelle.jpg","type":"image\/jpeg"}],"author":"Benjamin Leroux","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.advens.com\/en\/security-operations\/automation-operational-cyber-security\/#article","isPartOf":{"@id":"https:\/\/www.advens.com\/en\/security-operations\/automation-operational-cyber-security\/"},"author":{"name":"Benjamin Leroux","@id":"https:\/\/www.advens.com\/#\/schema\/person\/0a0cf6bfbcf86fdef2602cefe9b941c7"},"headline":"Looking past the hype: the reality of automation in operational cyber security","datePublished":"2025-05-19T15:21:34+00:00","dateModified":"2025-05-19T15:21:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.advens.com\/en\/security-operations\/automation-operational-cyber-security\/"},"wordCount":714,"publisher":{"@id":"https:\/\/www.advens.com\/#organization"},"image":{"@id":"https:\/\/www.advens.com\/en\/security-operations\/automation-operational-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.advens.com\/app\/uploads\/2023\/01\/automatisation-cybersecurite-operationnelle.jpg","articleSection":["Security Operations"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.advens.com\/en\/security-operations\/automation-operational-cyber-security\/","url":"https:\/\/www.advens.com\/en\/security-operations\/automation-operational-cyber-security\/","name":"Automating operational cyber security: the Advens approach","isPartOf":{"@id":"https:\/\/www.advens.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.advens.com\/en\/security-operations\/automation-operational-cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/www.advens.com\/en\/security-operations\/automation-operational-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.advens.com\/app\/uploads\/2023\/01\/automatisation-cybersecurite-operationnelle.jpg","datePublished":"2025-05-19T15:21:34+00:00","dateModified":"2025-05-19T15:21:36+00:00","description":"There are limits to automation in cyber security, especially in remediation. Advens sets the record straight and outlines its solutions.","breadcrumb":{"@id":"https:\/\/www.advens.com\/en\/security-operations\/automation-operational-cyber-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.advens.com\/en\/security-operations\/automation-operational-cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.advens.com\/en\/security-operations\/automation-operational-cyber-security\/#primaryimage","url":"https:\/\/www.advens.com\/app\/uploads\/2023\/01\/automatisation-cybersecurite-operationnelle.jpg","contentUrl":"https:\/\/www.advens.com\/app\/uploads\/2023\/01\/automatisation-cybersecurite-operationnelle.jpg","width":1920,"height":1440,"caption":"https:\/\/www.cyberun.net\/"},{"@type":"BreadcrumbList","@id":"https:\/\/www.advens.com\/en\/security-operations\/automation-operational-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.advens.com\/en\/"},{"@type":"ListItem","position":2,"name":"Security Operations","item":"https:\/\/www.advens.com\/en\/security-operations\/"},{"@type":"ListItem","position":3,"name":"Looking past the hype: the reality of automation in operational cyber security"}]},{"@type":"WebSite","@id":"https:\/\/www.advens.com\/#website","url":"https:\/\/www.advens.com\/","name":"Advens","description":"For Cyber, People &amp; Planet","publisher":{"@id":"https:\/\/www.advens.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.advens.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.advens.com\/#organization","name":"Advens","url":"https:\/\/www.advens.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.advens.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.advens.com\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png","contentUrl":"https:\/\/www.advens.com\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png","width":1501,"height":1501,"caption":"Advens"},"image":{"@id":"https:\/\/www.advens.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/advens\/"]},{"@type":"Person","@id":"https:\/\/www.advens.com\/#\/schema\/person\/0a0cf6bfbcf86fdef2602cefe9b941c7","name":"Benjamin Leroux","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.advens.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6130a303ba5e9000db1d968b9c41bf9e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6130a303ba5e9000db1d968b9c41bf9e?s=96&d=mm&r=g","caption":"Benjamin Leroux"},"sameAs":["https:\/\/www.linkedin.com\/in\/benjamin-leroux-1688a4\/"]}]}},"featured_url":"https:\/\/www.advens.com\/app\/uploads\/2023\/01\/automatisation-cybersecurite-operationnelle.jpg","_links":{"self":[{"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/posts\/23998","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/comments?post=23998"}],"version-history":[{"count":1,"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/posts\/23998\/revisions"}],"predecessor-version":[{"id":23999,"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/posts\/23998\/revisions\/23999"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/media\/5071"}],"wp:attachment":[{"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/media?parent=23998"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/categories?post=23998"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/tags?post=23998"},{"taxonomy":"format","embeddable":true,"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/custom_format?post=23998"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}