{"id":1505,"date":"2025-05-12T08:00:00","date_gmt":"2025-05-12T15:00:00","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=1505"},"modified":"2025-05-14T11:08:10","modified_gmt":"2025-05-14T18:08:10","slug":"external-attack-surface-management-promised-visibility-but-did-it-deliver","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management-promised-visibility-but-did-it-deliver\/","title":{"rendered":"External Attack Surface Management Promised Visibility \u2014 But Did It Deliver?"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">The Original Promise: EASM as a Visibility Engine<\/h2>\n\n\n\n<p><a href=\"\/external-attack-surface-management\/\">External Attack Surface Management (EASM)<\/a> emerged with a bold promise: to illuminate the dark corners of an organization\u2019s internet-facing infrastructure. It was sold as a panacea for \u201cyou don\u2019t know what you don\u2019t know,\u201d offering security leaders the ability to <em>see everything attackers could see<\/em>. The expectation was straightforward\u2014feed the EASM solution a few IP ranges or domains, and it would map your exposed assets, vulnerabilities, and risks.<\/p>\n\n\n\n<p>But here\u2019s the reality check: many early EASM tools barely scratched the surface.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Where Legacy EASM Fell Short<\/h2>\n\n\n\n<p>The earliest wave of EASM tools were largely glorified search engines. They required \u201cseed data\u201d\u2014IP ranges, known domains, CIDRs, or SSL certs. In short, <em>they could only find what you already suspected existed<\/em>.<\/p>\n\n\n\n<p>These limitations created three critical problems for security teams:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Incomplete Discovery:<\/strong> Anything not directly tied to the provided seeds\u2014such as assets spun up by a marketing agency on a rogue AWS account or an M&amp;A-acquired subsidiary&#8217;s infrastructure\u2014remained hidden. Real-world blind spots were left entirely hidden.<br><\/li>\n\n\n\n<li><strong>High Operational Overhead:<\/strong> Security teams were burdened with constant tuning. Adding new domains, removing false positives and validating asset ownership is a manual grind, and often requires spreadsheets just to keep up.<br><\/li>\n\n\n\n<li><strong>No Business Context or Risk Prioritization:<\/strong> Legacy tools operated like port scanners with nicer dashboards. They found open services, but not the significance behind them. That meant security teams were flooded with thousands of low-value findings, with no clarity on which three systems were truly exploitable and critical to business operations.<br><\/li>\n<\/ol>\n\n\n\n<p>As one industry report put it bluntly, \u201cEASM tools created as many blind spots as they claimed to solve.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A Better Way: From Seed-Based Scanning to Attacker-Centric Discovery<\/h2>\n\n\n\n<p>So what\u2019s the fix?<\/p>\n\n\n\n<p>The future of EASM isn\u2019t about feeding tools known IPs. It\u2019s about understanding your organization the way an attacker does. That means:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>No Seed Inputs Required:<\/strong> True attacker-centric discovery begins with no prior information. It uses external signals, correlations, and attribution models to identify everything tied to your business\u2014even assets your IT or GRC teams don\u2019t know exist.<br><\/li>\n\n\n\n<li><strong>Organizational Awareness:<\/strong> Mature EASM solutions don\u2019t just find IPs; they map the entire business structure. Subsidiaries, third-party dependencies, shadow environments\u2014everything gets connected to its rightful owner in the org chart. This is what turns asset discovery into actionability.<br><\/li>\n\n\n\n<li><strong>Context-Rich Risk Prioritization:<\/strong> Instead of triggering alerts for every open port, next-gen EASM applies a risk lens. It asks: <em>Is this asset discoverable by attackers? Is it exposed? Does it contain sensitive data? Is there an exploit in the wild?<\/em> The result is a prioritized list of real threats, not false alarms.<br><\/li>\n<\/ul>\n\n\n\n<p>This approach flips the model\u2014from \u201cscan what you tell me\u201d to \u201cshow you what attackers already know.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Proof is in the Outcomes<\/h2>\n\n\n\n<p>In practice, attacker-centric EASM routinely uncovers vast quantities of blind spots in large enterprises. During one proof-of-value engagement with a Fortune 500 firm, an attacker-oriented discovery model revealed that <strong>nearly 30% of the organization\u2019s attack surface was unknown<\/strong> to internal teams. Not miscategorized\u2014<em>unknown<\/em>. That included legacy domains with exposed login portals, forgotten S3 buckets hosting sensitive data, and third-party code repositories tied to core apps.<\/p>\n\n\n\n<p>More critically, this model doesn\u2019t stop at discovery. By layering on black-box security testing\u2014mirroring how an attacker would exploit a vulnerability\u2014these platforms can validate actual exposure. This eliminates false positives and allows security teams to focus resources on verified, business-critical risks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why This Matters Now<\/h2>\n\n\n\n<p>As security leaders, we\u2019re judged not by how many CVEs we scan, but by how effectively we reduce <em>exploitability<\/em>. That means knowing our true external footprint, understanding what\u2019s valuable, and ensuring it\u2019s secure.<\/p>\n\n\n\n<p>But today\u2019s IT environment is decentralized, cloud-first, and fast-moving. Developers spin up environments with a credit card, marketing teams can launch microsites in a weekend, M&amp;A activity pulls in unmanaged infrastructure and EASM must match this pace with automation, improved context, and attacker awareness.<\/p>\n\n\n\n<p>And yet, many organizations are still relying on seed-based, scan-and-forget tools built for a different era.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Where External Attack Surface Management Must Go Next<\/h2>\n\n\n\n<p>To keep up with the expanding threat landscape and shrinking tolerance for risk, the future of EASM must evolve along three vectors:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Autonomous Discovery and Attribution:<\/strong> Fully automated, zero-input discovery that doesn\u2019t rely on seed data. Every asset is mapped to its organizational owner\u2014at scale and with evidence.<br><\/li>\n\n\n\n<li><strong>Risk-Aware Prioritization:<\/strong> Prioritization should be driven by real attacker behavior. Which assets are discoverable? Which are attractive? Which are vulnerable and connected to business-critical systems?<br><\/li>\n\n\n\n<li><strong>Continuous Validation and Testing:<\/strong> EASM must go beyond passive scanning. Active, black-box testing techniques must be embedded to confirm risk and reduce noise. This is how we solve the gap between &#8220;knowing&#8221; and &#8220;fixing.&#8221;<br><\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Final Thoughts: From Promises to Real Outcomes<\/h2>\n\n\n\n<p>EASM promised visibility. For many, it delivered dashboards\u2014but not answers.<\/p>\n\n\n\n<p>The next phase of EASM isn\u2019t about seeing more. It\u2019s about <em>seeing what matters<\/em>\u2014and taking action. That requires ditching legacy assumptions, embracing attacker-centric perspectives, and investing in solutions that automate discovery, attribution, validation, and prioritization at global scale.<\/p>\n\n\n\n<p>Security leaders need more than \u201calerts.\u201d They need <em>proof<\/em>. Proof of exposure, proof of exploitability, and proof of risk reduction.<\/p>\n\n\n\n<p>The visibility revolution isn\u2019t over. It\u2019s just getting started. And the tools that deliver on that original promise\u2014without asking you to draw the map for them\u2014will be the ones that define the future of cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>External Attack Surface Management (EASM) promised to illuminate the unknown, but early tools barely scratched the surface, relying on what security teams already knew. Today\u2019s attacker-centric EASM flips the script, discovering unknown assets, mapping them to the business, and validating real-world risk with zero input. The result isn\u2019t just visibility\u2014it\u2019s proof of exposure, and a clear path to action.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[239,242,240,241],"class_list":["post-1505","post","type-post","status-publish","format-standard","hentry","category-perspectives","tag-attacker-centric-discovery","tag-black-box-security-testing","tag-legacy-easm","tag-risk-aware-prioritization"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>External Attack Surface Management Promised Visibility \u2014 But Did It Deliver? | CyCognito Blog<\/title>\n<meta name=\"description\" content=\"Most EASM tools only show what you already know. Attacker-centric EASM flips the model\u2014discovering unknown assets, tying them to business context, and validating real risk without manual input.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management-promised-visibility-but-did-it-deliver\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"External Attack Surface Management Promised Visibility \u2014 But Did It Deliver?\" \/>\n<meta property=\"og:description\" content=\"Most EASM tools only show what you already know. Attacker-centric EASM flips the model\u2014discovering unknown assets, tying them to business context, and validating real risk without manual input.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management-promised-visibility-but-did-it-deliver\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-12T15:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-14T18:08:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/banner-blog-2025-05-12-2400x1256-email.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"1256\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Graham Rance\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Graham Rance\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management-promised-visibility-but-did-it-deliver\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management-promised-visibility-but-did-it-deliver\/\"},\"author\":{\"name\":\"Graham Rance\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/8301fef51e1385cbbd559548983488bf\"},\"headline\":\"External Attack Surface Management Promised Visibility \u2014 But Did It Deliver?\",\"datePublished\":\"2025-05-12T15:00:00+00:00\",\"dateModified\":\"2025-05-14T18:08:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management-promised-visibility-but-did-it-deliver\/\"},\"wordCount\":934,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"keywords\":[\"Attacker-Centric Discovery\",\"Black-Box Security Testing\",\"Legacy EASM\",\"Risk-Aware Prioritization\"],\"articleSection\":[\"Perspectives\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management-promised-visibility-but-did-it-deliver\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management-promised-visibility-but-did-it-deliver\/\",\"name\":\"External Attack Surface Management Promised Visibility \u2014 But Did It Deliver? | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"datePublished\":\"2025-05-12T15:00:00+00:00\",\"dateModified\":\"2025-05-14T18:08:10+00:00\",\"description\":\"Most EASM tools only show what you already know. Attacker-centric EASM flips the model\u2014discovering unknown assets, tying them to business context, and validating real risk without manual input.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management-promised-visibility-but-did-it-deliver\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management-promised-visibility-but-did-it-deliver\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management-promised-visibility-but-did-it-deliver\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"External Attack Surface Management Promised Visibility \u2014 But Did It Deliver?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/8301fef51e1385cbbd559548983488bf\",\"name\":\"Graham Rance\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/043a9e8c234ff6ec2d462237b8a92d95?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/043a9e8c234ff6ec2d462237b8a92d95?s=96&d=mm&r=g\",\"caption\":\"Graham Rance\"},\"description\":\"Field CTO\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/graham-rance\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"External Attack Surface Management Promised Visibility \u2014 But Did It Deliver? | CyCognito Blog","description":"Most EASM tools only show what you already know. Attacker-centric EASM flips the model\u2014discovering unknown assets, tying them to business context, and validating real risk without manual input.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management-promised-visibility-but-did-it-deliver\/","og_locale":"en_US","og_type":"article","og_title":"External Attack Surface Management Promised Visibility \u2014 But Did It Deliver?","og_description":"Most EASM tools only show what you already know. Attacker-centric EASM flips the model\u2014discovering unknown assets, tying them to business context, and validating real risk without manual input.","og_url":"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management-promised-visibility-but-did-it-deliver\/","og_site_name":"CyCognito Blog","article_published_time":"2025-05-12T15:00:00+00:00","article_modified_time":"2025-05-14T18:08:10+00:00","og_image":[{"width":2400,"height":1256,"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/banner-blog-2025-05-12-2400x1256-email.png","type":"image\/png"}],"author":"Graham Rance","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Graham Rance","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management-promised-visibility-but-did-it-deliver\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management-promised-visibility-but-did-it-deliver\/"},"author":{"name":"Graham Rance","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/8301fef51e1385cbbd559548983488bf"},"headline":"External Attack Surface Management Promised Visibility \u2014 But Did It Deliver?","datePublished":"2025-05-12T15:00:00+00:00","dateModified":"2025-05-14T18:08:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management-promised-visibility-but-did-it-deliver\/"},"wordCount":934,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"keywords":["Attacker-Centric Discovery","Black-Box Security Testing","Legacy EASM","Risk-Aware Prioritization"],"articleSection":["Perspectives"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management-promised-visibility-but-did-it-deliver\/","url":"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management-promised-visibility-but-did-it-deliver\/","name":"External Attack Surface Management Promised Visibility \u2014 But Did It Deliver? | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"datePublished":"2025-05-12T15:00:00+00:00","dateModified":"2025-05-14T18:08:10+00:00","description":"Most EASM tools only show what you already know. Attacker-centric EASM flips the model\u2014discovering unknown assets, tying them to business context, and validating real risk without manual input.","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management-promised-visibility-but-did-it-deliver\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/external-attack-surface-management-promised-visibility-but-did-it-deliver\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management-promised-visibility-but-did-it-deliver\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"External Attack Surface Management Promised Visibility \u2014 But Did It Deliver?"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/8301fef51e1385cbbd559548983488bf","name":"Graham Rance","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/043a9e8c234ff6ec2d462237b8a92d95?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/043a9e8c234ff6ec2d462237b8a92d95?s=96&d=mm&r=g","caption":"Graham Rance"},"description":"Field CTO","url":"https:\/\/www.cycognito.com\/blog\/author\/graham-rance\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/1505","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=1505"}],"version-history":[{"count":3,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/1505\/revisions"}],"predecessor-version":[{"id":1529,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/1505\/revisions\/1529"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=1505"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=1505"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=1505"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}