{"id":783,"date":"2024-04-02T12:23:09","date_gmt":"2024-04-02T19:23:09","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=783"},"modified":"2024-08-02T14:57:05","modified_gmt":"2024-08-02T21:57:05","slug":"explaining-explainability","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/explaining-explainability\/","title":{"rendered":"Explaining Explainability: CyCognito&#8217;s Data-First Approach"},"content":{"rendered":"\n<p>There is an important concept that runs through our product that I call <em>explainability<\/em>.&nbsp; I use the term a lot with our product and engineering teams to emphasize our data-first approach and our will to stand behind our data. The term is, well, self-explanatory, but I want to dig into it and show how it helps security professionals.<\/p>\n\n\n\n<p>To me, I don\u2019t know any other way of building a product that customers will truly trust other than to explain how conclusions and rankings were determined. We are as much a deep data as a security company, meaning that the CyCognito platform presents high-quality and actionable data to its users in the domain of cybersecurity. Let\u2019s dig in.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Is Explainability?<\/h2>\n\n\n\n<p>In a way, explainability is the story behind the data. And stories are often the best way to explain things to people. The stories are composed of information and connections, shown visually.<\/p>\n\n\n\n<p>So first, what kinds of data do you need to tell the story? I think it\u2019s data about data. This kind of data includes things like:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>When was the data collected?&nbsp;<\/li>\n\n\n\n<li>What are the sources?&nbsp;<\/li>\n\n\n\n<li>How certain is the system about the accuracy of the data?&nbsp;<\/li>\n\n\n\n<li>How was it detected?<\/li>\n\n\n\n<li>How can it be reproduced?<\/li>\n<\/ul>\n\n\n\n<p>When you think about it, not too different from the well-known who, what, when, where, and why of a story.<\/p>\n\n\n\n<p>This data is pulled from a variety of different sources, including scanning modules, web crawling, third-party databases, and threat intelligence feeds. It then undergoes sophisticated validation, analysis, processing, aggregation, and automatic decision-making on a massive scale.&nbsp;<\/p>\n\n\n\n<p>Second, in order to be clear, we want to visualize all our explanations in a useful and convenient way, especially in complex situations such as discovery. Sometimes, a bunch of fields or a simple table can be enough, but often, much more complex visualizations are needed. For example, the discovery path utilizes complex graph algorithms in order to explain how a certain asset is related to the organization and can be discovered by an attacker. It necessitates a much more sophisticated visualization that illustrates the underlying complexity.&nbsp;<\/p>\n\n\n\n<p>I believe an automated product that provides critical, multi-layered, and actionable information regarding an organization\u2019s exposure, business risk, and critical attack vectors is much more useful. Being accurate is critical, but explaining how conclusions were arrived at is equally so.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Explainability in Action<\/h2>\n\n\n\n<p>Let\u2019s take a look at two common tasks security teams face. This will bring explainability into sharper focus.<\/p>\n\n\n\n<p>The first common use case for explainability is describing the <em>discovery path<\/em>. At the heart of our technology lies an ability to discover IT assets based on company name alone. This is a very complex and algorithm-heavy process that requires both AI-based business mapping and subsidiary detection, as well as sophisticated internet-wide crawling. The same process a sophisticated attacker might perform in a targeted attack.<\/p>\n\n\n\n<p>The output of this process is a customer\u2019s exposed asset inventory. Because of this complex, multi-step process, it\u2019s often unclear why and how a certain asset is related. Take this example:&nbsp; a company has a subsidiary that has another subsidiary that owns a domain that points to an IP that has a certificate that is shared with another IP. Whew!<\/p>\n\n\n\n<p>The discovery path tells a story of how the asset was discovered, so the customer can understand why it\u2019s related. It also helps understand how a potential attacker can discover this asset simply by starting from the customer\u2019s main website.<\/p>\n\n\n\n<p>Here\u2019s an example of us explaining our data and the decisions we took in order to come to the relevant conclusions. It takes a very complicated end result\u00a0 \u2013\u00a0attributing an asset to the attack surface \u2013\u00a0and breaks the process down into understandable and verifiable steps. It answers the frequent question: Why is this asset in my attack surface? Figure 1 shows an example of this below.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"898\" height=\"1312\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Untitled.png\" alt=\"\" class=\"wp-image-785\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Untitled.png 898w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Untitled-350x512.png 350w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Untitled-768x1122.png 768w\" sizes=\"auto, (max-width: 898px) 100vw, 898px\" \/><\/figure><\/div>\n\n\n<p><em>Figure 1. The discovery path shows Acme Corporation subsidiary ownership, domain ownership, and IP address attribution.<\/em><\/p>\n\n\n\n<p>Another use case for explainability is providing evidence of issues. IT, Ops and Dev teams are jaded when it comes to vulnerability reports because of the large volume of false positives they receive every week from a number of security products. Providing evidence of an issue helps them understand it better and trust that it is a real issue.<\/p>\n\n\n\n<p>The CyCognito platform not only presents that the issue was found, but gives detection \u201cevidence,\u201d as shown in Figure 2 below. This type of evidence is especially important for fuzzy application vulnerabilities, such as XSS, SQL Injections, and the like, where it\u2019s important to understand details such as the specific query parameters affected. The detailed evidence allows a much easier validation by the person responsible for remediation.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"1048\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Untitled-1-1280x1048.png\" alt=\"\" class=\"wp-image-787\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Untitled-1-1280x1048.png 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Untitled-1-512x419.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Untitled-1-768x629.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Untitled-1-1536x1258.png 1536w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Untitled-1.png 1600w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure><\/div>\n\n\n<p><em>Figure 2. Technical details of a very specific XSS vulnerability instance provide evidence to the security analyst.<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Business Value of Explainability<\/h2>\n\n\n\n<p>A byproduct of the security value of explainability is business value. This is manifested in two ways:<\/p>\n\n\n\n<p><strong>Efficiency<\/strong> \u2013\u00a0A detailed explanation of an issue makes it much more efficient to resolve. Knowing who owns it reduces the time a security analyst spends figuring that out. Complete evidence also reduces the time a security analyst spends gathering needed information.\u00a0<\/p>\n\n\n\n<p><strong>Trust<\/strong> \u2013\u00a0As mentioned, IT, Ops, and Dev teams have suffered for years with false positives. Hundreds or even thousands of bogus issues have eroded the trust they have in their security colleagues. Providing detailed evidence in an easily-explained fashion helps to rebuild this trust and make the various teams work better together.<\/p>\n\n\n\n<p>Explainability is a must for security products. With the scale of infrastructures and the number of incidents security, IT and development teams must handle, trust and efficiency are paramount. Presenting data about data, telling a story and visualizing it clearly help do that.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dive into &#8216;Explainability&#8217; and its role for IT and Security professionals. Understand its significance and discover real-world examples that highlight its business impact. Discover how Explainability can transform business operations and decision-making for your IT and Security teams.<\/p>\n","protected":false},"author":16,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[147,11,146],"class_list":["post-783","post","type-post","status-publish","format-standard","hentry","category-product","tag-contextualization","tag-discovery","tag-explainability"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Explaining Explainability: CyCognito&#039;s Data-First Approach | CyCognito Blog<\/title>\n<meta name=\"description\" content=\"Dive into &#039;Explainability&#039; and its role for IT and Security professionals. Understand its significance and discover real-world examples that highlight its business impact. Discover how Explainability can transform business operations and decision-making for your IT and Security teams.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/explaining-explainability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Explaining Explainability\" \/>\n<meta property=\"og:description\" content=\"Dive into &#039;Explainability&#039; and its role for IT and Security professionals. Understand its significance and discover real-world examples that highlight its business impact. Discover how Explainability can transform business operations and decision-making for your IT and Security teams.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/explaining-explainability\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-02T19:23:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-02T21:57:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/banner-blog-2024-04-02-2400x1256-email.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"1256\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dima Potekhin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dima Potekhin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/explaining-explainability\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/explaining-explainability\/\"},\"author\":{\"name\":\"Dima Potekhin\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/16f807dc6fbdae9ce6a73a160267d550\"},\"headline\":\"Explaining Explainability: CyCognito&#8217;s Data-First Approach\",\"datePublished\":\"2024-04-02T19:23:09+00:00\",\"dateModified\":\"2024-08-02T21:57:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/explaining-explainability\/\"},\"wordCount\":979,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/explaining-explainability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Untitled.png\",\"keywords\":[\"Contextualization\",\"Discovery\",\"Explainability\"],\"articleSection\":[\"Product\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/explaining-explainability\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/explaining-explainability\/\",\"name\":\"Explaining Explainability: CyCognito's Data-First Approach | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/explaining-explainability\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/explaining-explainability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Untitled.png\",\"datePublished\":\"2024-04-02T19:23:09+00:00\",\"dateModified\":\"2024-08-02T21:57:05+00:00\",\"description\":\"Dive into 'Explainability' and its role for IT and Security professionals. Understand its significance and discover real-world examples that highlight its business impact. Discover how Explainability can transform business operations and decision-making for your IT and Security teams.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/explaining-explainability\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/explaining-explainability\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/explaining-explainability\/#primaryimage\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Untitled.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Untitled.png\",\"width\":898,\"height\":1312},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/explaining-explainability\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Explaining Explainability: CyCognito&#8217;s Data-First Approach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/16f807dc6fbdae9ce6a73a160267d550\",\"name\":\"Dima Potekhin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c2f15d6780fd8a5dba15935bf013363b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c2f15d6780fd8a5dba15935bf013363b?s=96&d=mm&r=g\",\"caption\":\"Dima Potekhin\"},\"description\":\"CTO and Co-Founder\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/dima-potekhin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Explaining Explainability: CyCognito's Data-First Approach | CyCognito Blog","description":"Dive into 'Explainability' and its role for IT and Security professionals. Understand its significance and discover real-world examples that highlight its business impact. Discover how Explainability can transform business operations and decision-making for your IT and Security teams.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/explaining-explainability\/","og_locale":"en_US","og_type":"article","og_title":"Explaining Explainability","og_description":"Dive into 'Explainability' and its role for IT and Security professionals. Understand its significance and discover real-world examples that highlight its business impact. Discover how Explainability can transform business operations and decision-making for your IT and Security teams.","og_url":"https:\/\/www.cycognito.com\/blog\/explaining-explainability\/","og_site_name":"CyCognito Blog","article_published_time":"2024-04-02T19:23:09+00:00","article_modified_time":"2024-08-02T21:57:05+00:00","og_image":[{"width":2400,"height":1256,"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/banner-blog-2024-04-02-2400x1256-email.jpg","type":"image\/jpeg"}],"author":"Dima Potekhin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Dima Potekhin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/explaining-explainability\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/explaining-explainability\/"},"author":{"name":"Dima Potekhin","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/16f807dc6fbdae9ce6a73a160267d550"},"headline":"Explaining Explainability: CyCognito&#8217;s Data-First Approach","datePublished":"2024-04-02T19:23:09+00:00","dateModified":"2024-08-02T21:57:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/explaining-explainability\/"},"wordCount":979,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/explaining-explainability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Untitled.png","keywords":["Contextualization","Discovery","Explainability"],"articleSection":["Product"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/explaining-explainability\/","url":"https:\/\/www.cycognito.com\/blog\/explaining-explainability\/","name":"Explaining Explainability: CyCognito's Data-First Approach | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/explaining-explainability\/#primaryimage"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/explaining-explainability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Untitled.png","datePublished":"2024-04-02T19:23:09+00:00","dateModified":"2024-08-02T21:57:05+00:00","description":"Dive into 'Explainability' and its role for IT and Security professionals. Understand its significance and discover real-world examples that highlight its business impact. Discover how Explainability can transform business operations and decision-making for your IT and Security teams.","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/explaining-explainability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/explaining-explainability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/explaining-explainability\/#primaryimage","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Untitled.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Untitled.png","width":898,"height":1312},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/explaining-explainability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Explaining Explainability: CyCognito&#8217;s Data-First Approach"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/16f807dc6fbdae9ce6a73a160267d550","name":"Dima Potekhin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c2f15d6780fd8a5dba15935bf013363b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c2f15d6780fd8a5dba15935bf013363b?s=96&d=mm&r=g","caption":"Dima Potekhin"},"description":"CTO and Co-Founder","url":"https:\/\/www.cycognito.com\/blog\/author\/dima-potekhin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/783","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=783"}],"version-history":[{"count":4,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/783\/revisions"}],"predecessor-version":[{"id":1040,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/783\/revisions\/1040"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=783"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=783"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=783"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}