{"id":641,"date":"2024-02-05T07:00:00","date_gmt":"2024-02-05T15:00:00","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=641"},"modified":"2025-06-19T09:09:47","modified_gmt":"2025-06-19T16:09:47","slug":"three-approaches-to-external-attack-surface-management","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/three-approaches-to-external-attack-surface-management\/","title":{"rendered":"Three Approaches to External Attack Surface Management"},"content":{"rendered":"\n<p>Attack surfaces today are incredibly large and complex. According to our research team, the size of a company\u2019s attack surface fluctuates up and down by as much as 10 percent a month.<\/p>\n\n\n\n<p>Only two decades ago, a typical company had a single server connected to the Internet. Today, they have thousands of networks connected to the internet\u2014filled with unknown and unmanaged assets and subsidiaries\u2014that an attacker can use to exfiltrate IP and\/or breach into their network and systems.&nbsp;<\/p>\n\n\n\n<p>In short, attack surfaces are moving targets rife with security gaps ready to be exploited. How can CISOs effectively secure these dynamic environments?<\/p>\n\n\n\n<p><em>The answer: <\/em><a href=\"\/external-attack-surface-management\/\">External Attack Surface Management<\/a> (EASM). But there are various approaches to carrying out an EASM strategy\u2014some less effective than others.<\/p>\n\n\n\n<p>An effective External Attack Surface Management approach requires a solution that can:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Discover all exposed assets and blind spots.&nbsp;<\/li>\n\n\n\n<li>Attribute Assets to the correct owner in the organization.<\/li>\n\n\n\n<li>Contextualize assets to understand <em>what<\/em> the asset is and its <em>purpose<\/em><\/li>\n\n\n\n<li>Prioritize the threat based on that context.&nbsp;<\/li>\n\n\n\n<li>Prioritize the threat so the security team always knows the critical attack paths into their networks.<\/li>\n<\/ul>\n\n\n\n<p>With this in mind, let\u2019s dive into three common approaches.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Approach One: Scan what you already know<\/h2>\n\n\n\n<p>Most legacy EASM tools\u2014still commonplace today\u2014operate on a foundation that requires explicit input, such as IP ranges or domain names, or hinges on integrations designed to supply such information. This traditional method inherently limits their scope to scanning assets that are already identified or directly connected to them\u2014for instance, a specific domain name that is associated with a known IP range.<\/p>\n\n\n\n<p>It\u2019s important to understand the characteristics and limitations of these vendors when considering this approach. These include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Over-dependence on Inputs: The solution requires the security team to supply foundational data such as IP ranges and domain names, or to establish integrations with existing databases like a Configuration Management Database (CMDB).&nbsp;<\/li>\n\n\n\n<li>Inability to Discover Severe Blind Spots: The vendor lacks a clear method for uncovering unknown networks\u2014those not visibly connected or related to your acknowledged networks, such as those of subsidiaries. Since risk accumulates where you\u2019re not looking\u2014this beats the purpose of such tools.<\/li>\n\n\n\n<li>Inability to Provide Evidence and Context: The vendor lacks a probabilistic methodology. The assets discovered are either owned\/related to your organization, or not. It\u2019s binary. There\u2019s no nuance or evidence to back it up.<\/li>\n\n\n\n<li>Inability to Attribute Assets to Owners: The vendor doesn\u2019t provide a model (like a graph data model) that maps the interconnections between the organization, its environments, and its assets. Generally these solutions&#8217; <em>de facto <\/em>methodology is to simply scan known \/ easy-to-find IP ranges (just like Nmap since the 90\u2019s). If you can\u2019t tell who owns the asset &#8211; how can remediation ever take place?&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Approach Two: Layer In Human Reconnaissance<\/h2>\n\n\n\n<p><em>Approach One<\/em> relies on technology-driven scans based on specified datasets, such as known IP ranges and domains.&nbsp;<\/p>\n\n\n\n<p>The second approach has <em>the same limitation<\/em>s but integrates analysts who engage in active reconnaissance to uncover additional networks and assets. Pentesting companies and small startups tend to fold this into their offerings.<\/p>\n\n\n\n<p>Analysts can enhance the discovery process by employing manual tactics, such as scouring RIPE NCC (R\u00e9seaux IP Europ\u00e9ens Network Coordination Centre) for IP range allocations, conducting Google searches for subsidiary web applications, and delving into SSL certificate databases.&nbsp;<\/p>\n\n\n\n<p>However, this approach is extremely resource- and cost-intensive, taking weeks, if not months, for a single assessment.&nbsp;<\/p>\n\n\n\n<p>A<em> <\/em>solution that is overly reliant on analyst work will lack a comprehensive model, such as a graph data model, to visualize connections between an organization and its environments. It will solely focus on IP addresses and domains, and only scan predetermined targets.&nbsp;<\/p>\n\n\n\n<p>Ultimately, for an unwary buyer, this approach can be misleading because what is presented as automated and scalable might actually hinge on unsustainable manual processes.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Approach Three: Automated Reconnaissance EASM<\/h2>\n\n\n\n<p><em>The holy grail.<\/em> A unified platform like CyCognito that can continuously meticulously map the entire attack surface beyond the corporate core to encompass subsidiaries, acquisitions, joint ventures, and brand operations\u2014and attribute each to its rightful owner.&nbsp;<\/p>\n\n\n\n<p>CyCognito EASM platform:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Operates without the need for input or &#8216;seeds,&#8217; thus emulating the tactics used by attackers themselves. This offers the most authentic perspective of an organization\u2019s vulnerabilities, which is essential for mitigating cyber risk.<\/li>\n\n\n\n<li>Leverages Natural Language Processing (NLP) and heuristic algorithms to accelerate asset classification.&nbsp; Given the cost and resource implications of manual classification and the insufficient data in existing databases like CMDBs\u2014where a mere 5%-30% of assets are properly categorized and attributed\u2014this technology becomes indispensable.<\/li>\n\n\n\n<li>Provides the business context necessary to prioritize risks effectively. Even if a vulnerability affects a thousand machines, CyCognito can identify <em>the most critical one<\/em> by providing insight into exposure level, business significance, and exploitability.<\/li>\n<\/ul>\n\n\n\n<p>An EASM approach transcends the trap of treating all critical issues with equal urgency, allowing for the recognition that, realistically, there may only be a handful of truly critical vectors that could lead to an immediate breach.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are three approaches to External Attack Surface Management (EASM) for securing complex and evolving attack surfaces in modern organizations. Each has its own set of considerations, including the limitations of traditional methods and the resource-intensive nature of human reconnaissance, which clearly underscore the benefits of an automated and comprehensive EASM solution like CyCognito.      <\/p>\n","protected":false},"author":18,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[130,17,129,131],"class_list":["post-641","post","type-post","status-publish","format-standard","hentry","category-product","tag-automated-reconnaissance","tag-external-attack-surface-management","tag-human-reconnaissance","tag-natural-language-processing-nlp"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Three Approaches to External Attack Surface Management | CyCognito Blog<\/title>\n<meta name=\"description\" content=\"There are three approaches to External Attack Surface Management (EASM) for securing complex and evolving attack surfaces in modern organizations. Each has its own set of considerations, including the limitations of traditional methods and the resource-intensive nature of human reconnaissance, which clearly underscore the benefits of an automated and comprehensive EASM solution like CyCognito.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/three-approaches-to-external-attack-surface-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Three Approaches to External Attack Surface Management\" \/>\n<meta property=\"og:description\" content=\"There are three approaches to External Attack Surface Management (EASM) for securing complex and evolving attack surfaces in modern organizations. Each has its own set of considerations, including the limitations of traditional methods and the resource-intensive nature of human reconnaissance, which clearly underscore the benefits of an automated and comprehensive EASM solution like CyCognito.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/three-approaches-to-external-attack-surface-management\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-05T15:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-19T16:09:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/banner-solution-brief-demystifying-continuous-threat-exposure-management-ctem2400x1256-email.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"1256\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rob Gurzeev\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Three Approaches to External Attack Surface Management\" \/>\n<meta name=\"twitter:description\" content=\"There are three approaches to External Attack Surface Management (EASM) for securing complex and evolving attack surfaces in modern organizations. Each has its own set of considerations, including the limitations of traditional methods and the resource-intensive nature of human reconnaissance, which clearly underscore the benefits of an automated and comprehensive EASM solution like CyCognito.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/banner-solution-brief-demystifying-continuous-threat-exposure-management-ctem-2048x1024-twitter.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rob Gurzeev\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/three-approaches-to-external-attack-surface-management\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/three-approaches-to-external-attack-surface-management\/\"},\"author\":{\"name\":\"Rob Gurzeev\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/d5cdeba13fde783ae5ebf80d0765b679\"},\"headline\":\"Three Approaches to External Attack Surface Management\",\"datePublished\":\"2024-02-05T15:00:00+00:00\",\"dateModified\":\"2025-06-19T16:09:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/three-approaches-to-external-attack-surface-management\/\"},\"wordCount\":866,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"keywords\":[\"Automated Reconnaissance\",\"External Attack Surface Management\",\"Human Reconnaissance\",\"Natural Language Processing (NLP)\"],\"articleSection\":[\"Product\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/three-approaches-to-external-attack-surface-management\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/three-approaches-to-external-attack-surface-management\/\",\"name\":\"Three Approaches to External Attack Surface Management | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"datePublished\":\"2024-02-05T15:00:00+00:00\",\"dateModified\":\"2025-06-19T16:09:47+00:00\",\"description\":\"There are three approaches to External Attack Surface Management (EASM) for securing complex and evolving attack surfaces in modern organizations. Each has its own set of considerations, including the limitations of traditional methods and the resource-intensive nature of human reconnaissance, which clearly underscore the benefits of an automated and comprehensive EASM solution like CyCognito.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/three-approaches-to-external-attack-surface-management\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/three-approaches-to-external-attack-surface-management\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/three-approaches-to-external-attack-surface-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Three Approaches to External Attack Surface Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/d5cdeba13fde783ae5ebf80d0765b679\",\"name\":\"Rob Gurzeev\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/188f9b5d63c82a731809f453b8cc26f8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/188f9b5d63c82a731809f453b8cc26f8?s=96&d=mm&r=g\",\"caption\":\"Rob Gurzeev\"},\"description\":\"CEO &amp; Co-Founder\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/rob-gurzeev\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Three Approaches to External Attack Surface Management | CyCognito Blog","description":"There are three approaches to External Attack Surface Management (EASM) for securing complex and evolving attack surfaces in modern organizations. Each has its own set of considerations, including the limitations of traditional methods and the resource-intensive nature of human reconnaissance, which clearly underscore the benefits of an automated and comprehensive EASM solution like CyCognito.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/three-approaches-to-external-attack-surface-management\/","og_locale":"en_US","og_type":"article","og_title":"Three Approaches to External Attack Surface Management","og_description":"There are three approaches to External Attack Surface Management (EASM) for securing complex and evolving attack surfaces in modern organizations. Each has its own set of considerations, including the limitations of traditional methods and the resource-intensive nature of human reconnaissance, which clearly underscore the benefits of an automated and comprehensive EASM solution like CyCognito.","og_url":"https:\/\/www.cycognito.com\/blog\/three-approaches-to-external-attack-surface-management\/","og_site_name":"CyCognito Blog","article_published_time":"2024-02-05T15:00:00+00:00","article_modified_time":"2025-06-19T16:09:47+00:00","og_image":[{"width":2400,"height":1256,"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/banner-solution-brief-demystifying-continuous-threat-exposure-management-ctem2400x1256-email.jpg","type":"image\/jpeg"}],"author":"Rob Gurzeev","twitter_card":"summary_large_image","twitter_title":"Three Approaches to External Attack Surface Management","twitter_description":"There are three approaches to External Attack Surface Management (EASM) for securing complex and evolving attack surfaces in modern organizations. Each has its own set of considerations, including the limitations of traditional methods and the resource-intensive nature of human reconnaissance, which clearly underscore the benefits of an automated and comprehensive EASM solution like CyCognito.","twitter_image":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/banner-solution-brief-demystifying-continuous-threat-exposure-management-ctem-2048x1024-twitter.jpg","twitter_misc":{"Written by":"Rob Gurzeev","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/three-approaches-to-external-attack-surface-management\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/three-approaches-to-external-attack-surface-management\/"},"author":{"name":"Rob Gurzeev","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/d5cdeba13fde783ae5ebf80d0765b679"},"headline":"Three Approaches to External Attack Surface Management","datePublished":"2024-02-05T15:00:00+00:00","dateModified":"2025-06-19T16:09:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/three-approaches-to-external-attack-surface-management\/"},"wordCount":866,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"keywords":["Automated Reconnaissance","External Attack Surface Management","Human Reconnaissance","Natural Language Processing (NLP)"],"articleSection":["Product"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/three-approaches-to-external-attack-surface-management\/","url":"https:\/\/www.cycognito.com\/blog\/three-approaches-to-external-attack-surface-management\/","name":"Three Approaches to External Attack Surface Management | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"datePublished":"2024-02-05T15:00:00+00:00","dateModified":"2025-06-19T16:09:47+00:00","description":"There are three approaches to External Attack Surface Management (EASM) for securing complex and evolving attack surfaces in modern organizations. Each has its own set of considerations, including the limitations of traditional methods and the resource-intensive nature of human reconnaissance, which clearly underscore the benefits of an automated and comprehensive EASM solution like CyCognito.","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/three-approaches-to-external-attack-surface-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/three-approaches-to-external-attack-surface-management\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/three-approaches-to-external-attack-surface-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Three Approaches to External Attack Surface Management"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/d5cdeba13fde783ae5ebf80d0765b679","name":"Rob Gurzeev","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/188f9b5d63c82a731809f453b8cc26f8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/188f9b5d63c82a731809f453b8cc26f8?s=96&d=mm&r=g","caption":"Rob Gurzeev"},"description":"CEO &amp; Co-Founder","url":"https:\/\/www.cycognito.com\/blog\/author\/rob-gurzeev\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/641","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=641"}],"version-history":[{"count":4,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/641\/revisions"}],"predecessor-version":[{"id":1575,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/641\/revisions\/1575"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=641"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=641"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=641"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}