{"id":33570,"date":"2023-10-03T04:00:00","date_gmt":"2023-10-03T11:00:00","guid":{"rendered":"https:\/\/insidebigdata.com\/?p=33570"},"modified":"2023-10-02T18:53:07","modified_gmt":"2023-10-03T01:53:07","slug":"seven-reasons-why-data-security-needs-ai","status":"publish","type":"post","link":"https:\/\/insidebigdata.com\/2023\/10\/03\/seven-reasons-why-data-security-needs-ai\/","title":{"rendered":"Seven Reasons why Data Security Needs AI"},"content":{"rendered":"\n<p>Today data holds the key to business success. Enterprises are embracing&nbsp;the power of data&nbsp;to improve marketing effectiveness, identify new revenue opportunities, personalize customer experiences, and improve operational efficiency.&nbsp;&nbsp; However, the increasing complexity of the data landscape is making it a huge challenge to provide users and applications with fast access required, while ensuring regulatory compliance.&nbsp;<\/p>\n\n\n\n<p>Here are seven trends that suggest why more intelligent and automated solutions are needed to enable data governance.<\/p>\n\n\n\n<ol type=\"1\" start=\"1\">\n<li><strong>Data Federation&nbsp;<\/strong>\u2013 The process of decentralizing or democratizing data is a quantum leap in enterprise data architecture that opens the door to numerous ways to maximize business outcomes. However, the ability to query data from different sources into one single virtual format requires improved data quality as well as data accessibility. Enterprises need a flexible data security architecture where data governance standards are defined centrally, but domain teams have the autonomy and resources to execute them locally.<\/li>\n\n\n\n<li><strong>The Rise of the Data Mesh<\/strong>&nbsp;&#8211; Monolithic data infrastructures that handle data consumption, storage, transformation, and output in one central repository are becoming replaced by a data mesh architecture with a wide variety of dispersed data sources, infrastructure, and pipelines. Because there are different methods for securing data in each environment, there is a higher likelihood of errors or inconsistencies managing security authorizations.<\/li>\n\n\n\n<li><strong>Highly Dynamic Regulatory Environment<\/strong>&nbsp;&#8211; The regulatory landscape is becoming increasingly more complex.&nbsp; International companies are challenged to follow state, federal and international data privacy regulations, where over 130 countries have their own legislation for data privacy.&nbsp; Data security needs to accommodate the latest versions of all these regulations and adjust policies based on internal security requirements automatically.<\/li>\n\n\n\n<li><strong>Shifting Data to the Cloud<\/strong>&nbsp;&#8211; Businesses all over the world are replacing legacy, on-premises technology with flexible, scalable, and cost-effective computing in the cloud. As organizations increasingly rely on third party providers for collecting, storing, and processing sensitive data, they lose visibility of data assets and can be more vulnerable to cyberattacks and data breaches.<\/li>\n\n\n\n<li><strong>AI\/ML<\/strong>&nbsp;&#8211;&nbsp;AI enables organizations to streamline operations, generate better predictions and insights, and make smarter decisions to drive revenue.&nbsp; The success of these AI models is increasing the demand for a steady pipeline of data, but safe access requires monitoring multitude of different regulations and internal security policies.<\/li>\n\n\n\n<li><strong>Data Explosion<\/strong>&nbsp;&#8211;&nbsp;The volume of enterprise data is expected to more than double in size between 2022 and 2026, according to John Rydning, research vice president, IDC&#8217;s Global DataSphere.&nbsp; Enterprises need the ability to scale up their security systems to manage the growing volumes of data as well as the increasing number of data consumers including employees, customers, suppliers, partners, ML models, and applications.<\/li>\n\n\n\n<li><strong>Need for Automated Policy Access Control &#8211;&nbsp;<\/strong>The most common method for access control RBAC&nbsp;(rule-based access control), has several limitations.&nbsp; Permissions can be assigned only to user roles, not to objects and operations. Actions are restricted instead of access to data. Employees also often change roles and companies, making it very difficult to keep permissions up to date.&nbsp; Policy-based authorizations are more efficient, but they are more complex and need AI to learn how data is used to provide the correct authorizations.&nbsp;&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>With the increasingly complex data landscape, organizations need a strong data governance strategy.\u00a0 Only intelligent automation can keep up with the fast pace of highly dynamic data teams, users, tools, and regulations.\u00a0\u00a0 AI is an indispensable technology because it can monitor, learn, and predict how data will be used to provide the right people with the data they need to fuel data democratization and business success.\u00a0\u00a0\u00a0<\/p>\n\n\n\n<p><strong>About the Author<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"150\" height=\"150\" src=\"https:\/\/insidebigdata.com\/wp-content\/uploads\/2023\/10\/Noam-Biran.jpg\" alt=\"\" class=\"wp-image-33571\" srcset=\"https:\/\/insidebigdata.com\/wp-content\/uploads\/2023\/10\/Noam-Biran.jpg 150w, https:\/\/insidebigdata.com\/wp-content\/uploads\/2023\/10\/Noam-Biran-300x300.jpg 300w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/figure><\/div>\n\n\n<p>Noam Biran, <a href=\"https:\/\/www.velotix.ai\/\" target=\"_blank\" rel=\"noreferrer noopener\">Velotix<\/a> VP Product. Noam is a product management executive that has successfully developed a product idea into a thriving business with over $100M in sales. Currently VP of Product at Velotix he is responsible for developing the technical vision and product strategy that supports business goals. Noam previously served as VP of product at the cybersecurity company Hunters and as Director of Product Management at ServiceNow that provides a cloud-based platform to help digitize and unify enterprises.<\/p>\n\n\n\n<p><em>Sign up for the free insideBIGDATA&nbsp;<a href=\"http:\/\/inside-bigdata.com\/newsletter\/\" target=\"_blank\" rel=\"noreferrer noopener\">newsletter<\/a>.<\/em><\/p>\n\n\n\n<p><em>Join us on Twitter:&nbsp;<a href=\"https:\/\/twitter.com\/InsideBigData1\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/twitter.com\/InsideBigData1<\/a><\/em><\/p>\n\n\n\n<p><em>Join us on LinkedIn:&nbsp;<a href=\"https:\/\/www.linkedin.com\/company\/insidebigdata\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.linkedin.com\/company\/insidebigdata\/<\/a><\/em><\/p>\n\n\n\n<p><em>Join us on Facebook:&nbsp;<a href=\"https:\/\/www.facebook.com\/insideBIGDATANOW\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.facebook.com\/insideBIGDATANOW<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today data holds the key to business success. Enterprises are embracing\u00a0the power of data\u00a0to improve marketing effectiveness, identify new revenue opportunities, personalize customer experiences, and improve operational efficiency.\u00a0\u00a0 However, the increasing complexity of the data landscape is making it a huge challenge to provide users and applications with fast access required, while ensuring regulatory compliance.\u00a0In this contributed article, Noam Biran, Velotix VP Product,  offers seven trends that suggest why more intelligent and automated solutions are needed to enable data governance.<\/p>\n","protected":false},"author":10531,"featured_media":33572,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"categories":[526,115,182,180,61,67,56,97,1],"tags":[280,341],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Seven Reasons why Data Security Needs AI - insideBIGDATA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/insidebigdata.com\/2023\/10\/03\/seven-reasons-why-data-security-needs-ai\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Seven Reasons why Data Security Needs AI - insideBIGDATA\" \/>\n<meta property=\"og:description\" content=\"Today data holds the key to business success. Enterprises are embracing\u00a0the power of data\u00a0to improve marketing effectiveness, identify new revenue opportunities, personalize customer experiences, and improve operational efficiency.\u00a0\u00a0 However, the increasing complexity of the data landscape is making it a huge challenge to provide users and applications with fast access required, while ensuring regulatory compliance.\u00a0In this contributed article, Noam Biran, Velotix VP Product, offers seven trends that suggest why more intelligent and automated solutions are needed to enable data governance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/insidebigdata.com\/2023\/10\/03\/seven-reasons-why-data-security-needs-ai\/\" \/>\n<meta property=\"og:site_name\" content=\"insideBIGDATA\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/insidebigdata\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-03T11:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-03T01:53:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/insidebigdata.com\/wp-content\/uploads\/2023\/10\/Data_Pipeline_shutterstock_9623992_special.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Contributor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@insideBigData\" \/>\n<meta name=\"twitter:site\" content=\"@insideBigData\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Contributor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/insidebigdata.com\/2023\/10\/03\/seven-reasons-why-data-security-needs-ai\/\",\"url\":\"https:\/\/insidebigdata.com\/2023\/10\/03\/seven-reasons-why-data-security-needs-ai\/\",\"name\":\"Seven Reasons why Data Security Needs AI - insideBIGDATA\",\"isPartOf\":{\"@id\":\"https:\/\/insidebigdata.com\/#website\"},\"datePublished\":\"2023-10-03T11:00:00+00:00\",\"dateModified\":\"2023-10-03T01:53:07+00:00\",\"author\":{\"@id\":\"https:\/\/insidebigdata.com\/#\/schema\/person\/35a290930284d4cdbf002d457f3d5d87\"},\"breadcrumb\":{\"@id\":\"https:\/\/insidebigdata.com\/2023\/10\/03\/seven-reasons-why-data-security-needs-ai\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/insidebigdata.com\/2023\/10\/03\/seven-reasons-why-data-security-needs-ai\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/insidebigdata.com\/2023\/10\/03\/seven-reasons-why-data-security-needs-ai\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/insidebigdata.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seven Reasons why Data Security Needs AI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/insidebigdata.com\/#website\",\"url\":\"https:\/\/insidebigdata.com\/\",\"name\":\"insideBIGDATA\",\"description\":\"Your Source for AI, Data Science, Deep Learning &amp; Machine Learning Strategies\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/insidebigdata.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/insidebigdata.com\/#\/schema\/person\/35a290930284d4cdbf002d457f3d5d87\",\"name\":\"Contributor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/insidebigdata.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/36bffd267e38ed3f525205f67270e91b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/36bffd267e38ed3f525205f67270e91b?s=96&d=mm&r=g\",\"caption\":\"Contributor\"},\"url\":\"https:\/\/insidebigdata.com\/author\/contributor\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Seven Reasons why Data Security Needs AI - insideBIGDATA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/insidebigdata.com\/2023\/10\/03\/seven-reasons-why-data-security-needs-ai\/","og_locale":"en_US","og_type":"article","og_title":"Seven Reasons why Data Security Needs AI - insideBIGDATA","og_description":"Today data holds the key to business success. Enterprises are embracing\u00a0the power of data\u00a0to improve marketing effectiveness, identify new revenue opportunities, personalize customer experiences, and improve operational efficiency.\u00a0\u00a0 However, the increasing complexity of the data landscape is making it a huge challenge to provide users and applications with fast access required, while ensuring regulatory compliance.\u00a0In this contributed article, Noam Biran, Velotix VP Product, offers seven trends that suggest why more intelligent and automated solutions are needed to enable data governance.","og_url":"https:\/\/insidebigdata.com\/2023\/10\/03\/seven-reasons-why-data-security-needs-ai\/","og_site_name":"insideBIGDATA","article_publisher":"http:\/\/www.facebook.com\/insidebigdata","article_published_time":"2023-10-03T11:00:00+00:00","article_modified_time":"2023-10-03T01:53:07+00:00","og_image":[{"width":1100,"height":550,"url":"https:\/\/insidebigdata.com\/wp-content\/uploads\/2023\/10\/Data_Pipeline_shutterstock_9623992_special.jpg","type":"image\/jpeg"}],"author":"Contributor","twitter_card":"summary_large_image","twitter_creator":"@insideBigData","twitter_site":"@insideBigData","twitter_misc":{"Written by":"Contributor","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/insidebigdata.com\/2023\/10\/03\/seven-reasons-why-data-security-needs-ai\/","url":"https:\/\/insidebigdata.com\/2023\/10\/03\/seven-reasons-why-data-security-needs-ai\/","name":"Seven Reasons why Data Security Needs AI - insideBIGDATA","isPartOf":{"@id":"https:\/\/insidebigdata.com\/#website"},"datePublished":"2023-10-03T11:00:00+00:00","dateModified":"2023-10-03T01:53:07+00:00","author":{"@id":"https:\/\/insidebigdata.com\/#\/schema\/person\/35a290930284d4cdbf002d457f3d5d87"},"breadcrumb":{"@id":"https:\/\/insidebigdata.com\/2023\/10\/03\/seven-reasons-why-data-security-needs-ai\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/insidebigdata.com\/2023\/10\/03\/seven-reasons-why-data-security-needs-ai\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/insidebigdata.com\/2023\/10\/03\/seven-reasons-why-data-security-needs-ai\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/insidebigdata.com\/"},{"@type":"ListItem","position":2,"name":"Seven Reasons why Data Security Needs AI"}]},{"@type":"WebSite","@id":"https:\/\/insidebigdata.com\/#website","url":"https:\/\/insidebigdata.com\/","name":"insideBIGDATA","description":"Your Source for AI, Data Science, Deep Learning &amp; Machine Learning Strategies","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/insidebigdata.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/insidebigdata.com\/#\/schema\/person\/35a290930284d4cdbf002d457f3d5d87","name":"Contributor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/insidebigdata.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/36bffd267e38ed3f525205f67270e91b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/36bffd267e38ed3f525205f67270e91b?s=96&d=mm&r=g","caption":"Contributor"},"url":"https:\/\/insidebigdata.com\/author\/contributor\/"}]}},"jetpack_featured_media_url":"https:\/\/insidebigdata.com\/wp-content\/uploads\/2023\/10\/Data_Pipeline_shutterstock_9623992_special.jpg","jetpack_shortlink":"https:\/\/wp.me\/p9eA3j-8Js","jetpack-related-posts":[{"id":22153,"url":"https:\/\/insidebigdata.com\/2019\/02\/19\/enterprises-seek-to-improve-technological-infrastructure-and-cloud-hosting-processes-for-supporting-ai\/","url_meta":{"origin":33570,"position":0},"title":"Enterprises Seek to Improve Technological Infrastructure and Cloud Hosting Processes for Supporting AI","date":"February 19, 2019","format":false,"excerpt":"Today we continue the insideBIGDATA Executive Round Up, our annual feature showcasing the insights of thought leaders on the state of the big data industry, and where it is headed. In today\u2019s discussion, our panel of experienced big data executives \u2013 Ayush Parashar, Co-founder and Vice President of Engineering for\u2026","rel":"","context":"In &quot;Cloud&quot;","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/insidebigdata.com\/wp-content\/uploads\/2019\/02\/Artificial_intelligence_safe_3.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":23513,"url":"https:\/\/insidebigdata.com\/2019\/11\/02\/how-big-data-keeps-businesses-secure\/","url_meta":{"origin":33570,"position":1},"title":"How Big Data Keeps Businesses Secure","date":"November 2, 2019","format":false,"excerpt":"In this contributed article, Magnolia Potter discusses how big data has become almost ubiquitous in the world of business. From supply chain and inventory management to HR processes like hiring, big data has proven itself to be a valuable tool. However, big data can do much more than simply improve\u2026","rel":"","context":"In &quot;Big Data&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":23807,"url":"https:\/\/insidebigdata.com\/2020\/01\/08\/preventing-big-data-project-failure\/","url_meta":{"origin":33570,"position":2},"title":"Preventing Big Data Project Failure","date":"January 8, 2020","format":false,"excerpt":"In this special guest feature, Anexinet Director of Advanced Analytics, Brian Atkiss, discusses how Big Data projects can fail for many reasons, including the project\u2019s inability to integrate with existing business processes, data security and\/or governance challenges. Often a Big Data project will fail because an organization is looking to\u2026","rel":"","context":"In &quot;Big Data&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":19230,"url":"https:\/\/insidebigdata.com\/2017\/10\/25\/intersection-ai-big-data\/","url_meta":{"origin":33570,"position":3},"title":"The Intersection of AI and Big Data","date":"October 25, 2017","format":false,"excerpt":"In this special guest feature, Asaf Yigal, Co-founder and Vice President of Product at Logz.io, discusses the intersection of artificial intelligence and big data, and how it will be instrumental in DevOps.","rel":"","context":"In &quot;AI Deep Learning&quot;","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/insidebigdata.com\/wp-content\/uploads\/2017\/10\/Asaf-Yigal.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":22814,"url":"https:\/\/insidebigdata.com\/2019\/06\/18\/ai-driven-data-catalogs-right-business\/","url_meta":{"origin":33570,"position":4},"title":"AI-Driven Data Catalogs: How to Find the Right one for Your Business","date":"June 18, 2019","format":false,"excerpt":"The commoditization of data has opened a world of opportunities up for countless enterprises. But as big data explodes, metadata initiatives are failing, and data discovery and retrieval is getting more and more difficult. A new white paper from IO-Tahoe explores data catalogs as a potential answer to this challenge.","rel":"","context":"In &quot;AI Deep Learning&quot;","img":{"alt_text":"data catalogs","src":"https:\/\/i0.wp.com\/insidebigdata.com\/wp-content\/uploads\/2019\/05\/shutterstock_675107101.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":30471,"url":"https:\/\/insidebigdata.com\/2022\/09\/28\/synthesized-solidifies-its-partnership-with-deutsche-bank-providing-high-quality-synthetic-data-for-ai-and-ml-testing-purposes\/","url_meta":{"origin":33570,"position":5},"title":"Synthesized Solidifies its Partnership with Deutsche Bank, Providing High-quality Synthetic Data for AI and ML Testing Purposes","date":"September 28, 2022","format":false,"excerpt":"Synthesized Ltd, a leading synthetic data generation platform, which provides engineering and data science teams a quick way to create and share trusted data through advanced machine learning and automation, announced that Deutsche Bank is investing in its next phase of growth and technology innovation development.\u00a0","rel":"","context":"In &quot;AI Deep Learning&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/posts\/33570"}],"collection":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/users\/10531"}],"replies":[{"embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/comments?post=33570"}],"version-history":[{"count":0,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/posts\/33570\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/media\/33572"}],"wp:attachment":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/media?parent=33570"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/categories?post=33570"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/tags?post=33570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}