{"id":868,"date":"2024-06-03T08:00:00","date_gmt":"2024-06-03T15:00:00","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=868"},"modified":"2025-04-14T09:34:46","modified_gmt":"2025-04-14T16:34:46","slug":"web-application-security-testing-struggles-shortfalls-and-solutions","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/web-application-security-testing-struggles-shortfalls-and-solutions\/","title":{"rendered":"Web Application Security Testing: Struggles, Shortfalls and Solutions"},"content":{"rendered":"\n<p>High-value data, mission criticality, and sheer numbers make web applications a compelling target for cyberattacks. According to Verizon\u2019s 2023 Data Breach Investigations Report, web applications were the most commonly exploited vector in both incidents and breaches last year.<sup>1<\/sup>&nbsp;&nbsp;<\/p>\n\n\n\n<p>There\u2019s another reason why web applications may be so attractive to threat actors. Most security teams simply cannot keep pace with demands for application updates and patching, testing, and vulnerability remediation. As a result, many organizations struggle to protect their mission-critical web apps, which typically number in the dozens or hundreds.<\/p>\n\n\n\n<p>To uncover current web application security testing challenges, requirements, and approaches, CyCognito sponsored a survey of several hundred U.S. and U.K. cybersecurity professionals.&nbsp;<\/p>\n\n\n\n<p><strong>Key findings from the survey:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Large attack surface:<\/strong> Organizations are exposing hundreds of web applications that are developed in-house and by third-party partners.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Frequent incidents:<\/strong> More than 35% of respondents said their organization experiences a significant web app security event at least once a week.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Ineffective tools:<\/strong> Many respondents said they were concerned that tools for protecting web apps, such as web application firewalls, were not up to the job.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Inadequate testing:<\/strong> Nearly three-quarters (70%) of survey participants said the number of web applications in their environment was too large for adequate testing.<strong>&nbsp;<\/strong><\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Remediation difficulties:<\/strong> More than half of respondents indicated they struggle to remediate the vulnerabilities uncovered by web application testing.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Web app security concerns &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/h2>\n\n\n\n<p>Modern organizations rely on a vast number of web applications, both internally developed and from third-party vendors. This sprawling attack surface, constantly changing and growing, creates significant security concerns. These concerns varied among survey respondents, even though all of them had significant experience conducting or managing vulnerability scanning, web app security testing, or other SecOps tasks.&nbsp;<\/p>\n\n\n\n<p>The top concern was the overall threat posed to web applications, highlighting their criticality. Following closely were concerns about siloed teams (Dev, SecOps, etc.) hindering collaboration and the ineffectiveness of existing security tools, such as web application firewalls (WAFs).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Testing roadblocks<\/h2>\n\n\n\n<p>From <a href=\"\/learn\/application-security\/dynamic-application-security.php\">DAST<\/a> and IAST to penetration testing, organizations use a variety of methods to identify vulnerabilities, misconfigurations and other weaknesses in web applications. However, regardless of the method, most organizations only test monthly or less often, according to the survey. Also, tools are applied to a small portion of the attack surface. The results showed that comprehensive (100%) coverage of web apps by different test methods was limited, ranging from 5% to 13%. Infrequent or selective testing leaves web apps vulnerable to threats.\u00a0<\/p>\n\n\n\n<p>Reasons why respondents do not test more often or cover more of the attack surface included:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Too many apps and APIs<\/li>\n\n\n\n<li>Not enough time<\/li>\n\n\n\n<li>Frequent app updates and changes<\/li>\n\n\n\n<li>Insufficient staff<\/li>\n\n\n\n<li>Budget limitations<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Remediation challenges and the need for automation<\/h2>\n\n\n\n<p>With an ever-growing number of vulnerabilities discovered each month, prioritizing remediation is crucial. However, over half of survey respondents struggle to address the vulnerabilities identified during testing. Staffing shortages and complex workflows further impede effective remediation. Looking forward, many respondents view automation as a top priority to streamline testing processes.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Solving the web app security testing dilemma<\/h2>\n\n\n\n<p>Taking into account the above constraints, how can organizations improve their testing frequency, coverage, and effectiveness? The following solutions represent best practices that can help achieve these goals:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Continuous monitoring<\/strong>, which provides ongoing visibility into the attack surface, can improve proactivity and guide remediation activities.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Automation<\/strong> can save time, money, and effort as long as it does not create other problems, such as generating false positives. Nearly two-thirds (65%) of respondents said increasing automation in their web application security testing will be a priority over the next year.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Production testing<\/strong> (vs. sandboxing or offline testing) ensures that all elements affecting a web app are taken into account, including databases, open-source libraries, and authentication mechanisms.<\/li>\n<\/ul>\n\n\n\n<p>Automated active security testing incorporates all of these factors. It eliminates tedious, labor-intensive manual processes by conducting continuous or frequent testing of all web apps and associated APIs in the environment, identifying risks with a high degree of accuracy, and filtering out low-priority issues or events.&nbsp;<\/p>\n\n\n\n<p>These sophisticated solutions can meet survey respondents\u2019 top requirements for web app testing tools:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>High accuracy&nbsp;<\/li>\n\n\n\n<li>Continuous testing&nbsp;<\/li>\n\n\n\n<li>Active testing of production apps without impacting them<\/li>\n\n\n\n<li>Risk prioritization&nbsp;<\/li>\n\n\n\n<li>Robust automation capability<\/li>\n\n\n\n<li>Ease of use&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>To help meet these requirements, 63% of survey participants said they plan to purchase a solution that enables continuous security testing of all web apps.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The CyCognito solution<\/h2>\n\n\n\n<p>CyCognito\u2019s automated active security testing solution, part of its external exposure management platform, features the following:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Automated discovery and attribution of external web assets<\/li>\n\n\n\n<li>Continuous testing of web apps using tens of thousands of tools, including DAST<\/li>\n\n\n\n<li>A prioritization engine that evaluates test findings in relation to exploit intelligence and business context.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>This SaaS solution delivers unmatched asset coverage and broad and deep insights on par with pentesting.<\/p>\n\n\n\n<p>Interested in learning more about overcoming these web application security testing challenges and how you can achieve continuous testing? <a href=\"\/resources\/reports\/cycognito-state-of-web-application-security-testing-2024\/\">Download the report<\/a> to dive deeper into the findings and discover best practices for conquering your web app security testing woes. Alternatively, <a href=\"\/contact\/\">contact CyCognito<\/a> to learn more about how our active security testing can offer a solution for your organization.<\/p>\n\n\n\n<p><sup>1<\/sup> Barracuda Networks mitigated more than 18 billion attacks against web apps and APIs in 2023. <a href=\"https:\/\/blog.barracuda.com\/2024\/02\/07\/threat-spotlight-attackers-targeting-web-applications-right-now#:~:text=The%20number%20of%20attacks%20targeting,1.716%20billion%20in%20December%20alone\">https:\/\/blog.barracuda.com\/2024\/02\/07\/threat-spotlight-attackers-targeting-web-applications-right-now#:~:text=The%20number%20of%20attacks%20targeting,1.716%20billion%20in%20December%20alone<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A survey of cybersecurity professionals in the U.S. and U.K. reveals challenges in web application security testing. Key findings include extensive attack surfaces due to numerous in-house and third-party applications, frequent security incidents, concerns about the effectiveness of existing tools, and inadequate testing coverage. Additionally, over half of respondents struggle to remediate discovered vulnerabilities. These findings highlight the need for improved web application security testing strategies.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[229,3],"tags":[161,160,72,162,159],"class_list":["post-868","post","type-post","status-publish","format-standard","hentry","category-featured","category-research","tag-attack-surface","tag-cybersecurity-survey","tag-security-testing","tag-web-application-firewall-waf","tag-web-application-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Web Application Security Testing: Struggles, Shortfalls and Solutions | CyCognito Blog<\/title>\n<meta name=\"description\" content=\"A survey of cybersecurity professionals in the U.S. and U.K. reveals challenges in web application security testing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/web-application-security-testing-struggles-shortfalls-and-solutions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Web Application Security Testing: Struggles, Shortfalls and Solutions\" \/>\n<meta property=\"og:description\" content=\"A survey of cybersecurity professionals in the U.S. and U.K. reveals challenges in web application security testing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/web-application-security-testing-struggles-shortfalls-and-solutions\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-03T15:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-14T16:34:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/banner-blog-2024-06-03-2400x1256-email.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"1256\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Graham Rance\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Graham Rance\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/web-application-security-testing-struggles-shortfalls-and-solutions\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/web-application-security-testing-struggles-shortfalls-and-solutions\/\"},\"author\":{\"name\":\"Graham Rance\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/8301fef51e1385cbbd559548983488bf\"},\"headline\":\"Web Application Security Testing: Struggles, Shortfalls and Solutions\",\"datePublished\":\"2024-06-03T15:00:00+00:00\",\"dateModified\":\"2025-04-14T16:34:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/web-application-security-testing-struggles-shortfalls-and-solutions\/\"},\"wordCount\":906,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"keywords\":[\"Attack Surface\",\"Cybersecurity Survey\",\"Security Testing\",\"Web Application Firewall (WAF)\",\"Web Application Security\"],\"articleSection\":[\"Featured\",\"Research\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/web-application-security-testing-struggles-shortfalls-and-solutions\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/web-application-security-testing-struggles-shortfalls-and-solutions\/\",\"name\":\"Web Application Security Testing: Struggles, Shortfalls and Solutions | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"datePublished\":\"2024-06-03T15:00:00+00:00\",\"dateModified\":\"2025-04-14T16:34:46+00:00\",\"description\":\"A survey of cybersecurity professionals in the U.S. and U.K. reveals challenges in web application security testing.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/web-application-security-testing-struggles-shortfalls-and-solutions\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/web-application-security-testing-struggles-shortfalls-and-solutions\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/web-application-security-testing-struggles-shortfalls-and-solutions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Web Application Security Testing: Struggles, Shortfalls and Solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/8301fef51e1385cbbd559548983488bf\",\"name\":\"Graham Rance\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/043a9e8c234ff6ec2d462237b8a92d95?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/043a9e8c234ff6ec2d462237b8a92d95?s=96&d=mm&r=g\",\"caption\":\"Graham Rance\"},\"description\":\"Field CTO\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/graham-rance\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Web Application Security Testing: Struggles, Shortfalls and Solutions | CyCognito Blog","description":"A survey of cybersecurity professionals in the U.S. and U.K. reveals challenges in web application security testing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/web-application-security-testing-struggles-shortfalls-and-solutions\/","og_locale":"en_US","og_type":"article","og_title":"Web Application Security Testing: Struggles, Shortfalls and Solutions","og_description":"A survey of cybersecurity professionals in the U.S. and U.K. reveals challenges in web application security testing.","og_url":"https:\/\/www.cycognito.com\/blog\/web-application-security-testing-struggles-shortfalls-and-solutions\/","og_site_name":"CyCognito Blog","article_published_time":"2024-06-03T15:00:00+00:00","article_modified_time":"2025-04-14T16:34:46+00:00","og_image":[{"width":2400,"height":1256,"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/banner-blog-2024-06-03-2400x1256-email.png","type":"image\/png"}],"author":"Graham Rance","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Graham Rance","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/web-application-security-testing-struggles-shortfalls-and-solutions\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/web-application-security-testing-struggles-shortfalls-and-solutions\/"},"author":{"name":"Graham Rance","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/8301fef51e1385cbbd559548983488bf"},"headline":"Web Application Security Testing: Struggles, Shortfalls and Solutions","datePublished":"2024-06-03T15:00:00+00:00","dateModified":"2025-04-14T16:34:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/web-application-security-testing-struggles-shortfalls-and-solutions\/"},"wordCount":906,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"keywords":["Attack Surface","Cybersecurity Survey","Security Testing","Web Application Firewall (WAF)","Web Application Security"],"articleSection":["Featured","Research"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/web-application-security-testing-struggles-shortfalls-and-solutions\/","url":"https:\/\/www.cycognito.com\/blog\/web-application-security-testing-struggles-shortfalls-and-solutions\/","name":"Web Application Security Testing: Struggles, Shortfalls and Solutions | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"datePublished":"2024-06-03T15:00:00+00:00","dateModified":"2025-04-14T16:34:46+00:00","description":"A survey of cybersecurity professionals in the U.S. and U.K. reveals challenges in web application security testing.","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/web-application-security-testing-struggles-shortfalls-and-solutions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/web-application-security-testing-struggles-shortfalls-and-solutions\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/web-application-security-testing-struggles-shortfalls-and-solutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Web Application Security Testing: Struggles, Shortfalls and Solutions"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/8301fef51e1385cbbd559548983488bf","name":"Graham Rance","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/043a9e8c234ff6ec2d462237b8a92d95?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/043a9e8c234ff6ec2d462237b8a92d95?s=96&d=mm&r=g","caption":"Graham Rance"},"description":"Field CTO","url":"https:\/\/www.cycognito.com\/blog\/author\/graham-rance\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/868","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=868"}],"version-history":[{"count":3,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/868\/revisions"}],"predecessor-version":[{"id":1459,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/868\/revisions\/1459"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=868"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=868"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=868"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}