{"id":13069,"date":"2020-05-08T14:59:54","date_gmt":"2020-05-08T06:59:54","guid":{"rendered":"https:\/\/nxtmag.tech\/?p=13069"},"modified":"2020-05-08T14:59:54","modified_gmt":"2020-05-08T06:59:54","slug":"managing-edge-computing-security-risks-in-a-connected-world","status":"publish","type":"post","link":"https:\/\/nxtmag.tech\/my\/2020\/05\/08\/managing-edge-computing-security-risks-in-a-connected-world\/","title":{"rendered":"Managing Edge Computing Security Risks in a Connected World"},"content":{"rendered":"<p>Driven by surging digital transformation initiatives and IoT deployments around the world, more edge computing sites than ever are being established to meet localised demands. However, one unintended side effect is the difficulty of properly securing these far-flung systems.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-13071\" src=\"https:\/\/nxtmag.tech\/wp-content\/uploads\/2020\/05\/schneider-edge-computing-security-risks.jpg\" alt=\"Schneider Electric Edge computing security risks\" width=\"900\" height=\"599\" srcset=\"https:\/\/nxtmag.tech\/wp-content\/uploads\/2020\/05\/schneider-edge-computing-security-risks.jpg 900w, https:\/\/nxtmag.tech\/wp-content\/uploads\/2020\/05\/schneider-edge-computing-security-risks-300x200.jpg 300w, https:\/\/nxtmag.tech\/wp-content\/uploads\/2020\/05\/schneider-edge-computing-security-risks-768x511.jpg 768w, https:\/\/nxtmag.tech\/wp-content\/uploads\/2020\/05\/schneider-edge-computing-security-risks-696x463.jpg 696w, https:\/\/nxtmag.tech\/wp-content\/uploads\/2020\/05\/schneider-edge-computing-security-risks-631x420.jpg 631w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/p>\n<h3><strong>Rise of Edge Devices<\/strong><\/h3>\n<p>The danger is not limited to core systems such as servers, storage and networking equipment, but the ancillary equipment needed to support them such as power distribution units (PDU), cooling units, IoT sensors, and uninterruptible power supply (UPS). Because these devices pose a security problem and could be potential vectors for cyberattacks, they must be properly secured and monitored.<\/p>\n<p>Unfortunately, facility managers do not necessarily have the expertise or bandwidth to manage these devices. It is also not feasible for a security professional to monitor the hundreds or even thousands of such devices. The result in most cases is a lack of visibility into the infrastructure, which translates into an inability to protect them from cyberattacks.<\/p>\n<p>The chore starts to get \u201ctime-consuming and difficult\u201d at as few as 20 devices, explained by Schneider Electric in a <a href=\"https:\/\/blog.se.com\/datacenter\/dcim\/2019\/10\/31\/how-to-prevent-edge-computing-security-risks-connected-world\/\">blog post<\/a>. And it gets more challenging with geographically dispersed facilities such as edge data centres.<\/p>\n<h3><strong>The Cost of Insecurity<\/strong><\/h3>\n<p>The security threat on this front is not something in the theoretical realm, but one that has been observed by security researchers. According to Steven Brown, Head of Product Management for Secure Power Software at Schneider Electric, security researchers from Microsoft had previously found attempts by organised groups to compromised popular IoT devices across multiple customer locations.<\/p>\n<p>The modus operandi is straightforward: Hackers gain initial access through a misconfigured or unpatched device. Once in, they launch internal scans to find other vulnerable appliances. This continues as the beachhead is expanded, allowing the bad actor to establish a substantial hold upon the network.<\/p>\n<p>There is a clear need for tools that make it easier to not just manage traditional data centre equipment but to stand in the gap for security experts. Organisations need a way to quickly determine the status of their data centre deployment, such as which devices require a firmware update, find misconfigured or poorly secured equipment, and to install the latest security patch.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-13070\" src=\"https:\/\/nxtmag.tech\/wp-content\/uploads\/2020\/05\/schneider-edge-computing-security-risks-2.jpg\" alt=\"Schneider Electric Edge computing security risks\" width=\"900\" height=\"473\" srcset=\"https:\/\/nxtmag.tech\/wp-content\/uploads\/2020\/05\/schneider-edge-computing-security-risks-2.jpg 900w, https:\/\/nxtmag.tech\/wp-content\/uploads\/2020\/05\/schneider-edge-computing-security-risks-2-300x158.jpg 300w, https:\/\/nxtmag.tech\/wp-content\/uploads\/2020\/05\/schneider-edge-computing-security-risks-2-768x404.jpg 768w, https:\/\/nxtmag.tech\/wp-content\/uploads\/2020\/05\/schneider-edge-computing-security-risks-2-696x366.jpg 696w, https:\/\/nxtmag.tech\/wp-content\/uploads\/2020\/05\/schneider-edge-computing-security-risks-2-799x420.jpg 799w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/p>\n<h3><strong>EcoStruxure by Schneider Electric<\/strong><\/h3>\n<p>To fill this void, Schneider Electric came up with a new security assessment that is offered as part of its EcoStruxure IT Expert platform. The next-gen DCIM software leverages cloud-based technologies to actively monitor their data centre infrastructure.<\/p>\n<p>A new security monitoring feature makes it trivial for customers to continuously assess the state of their systems. This ranges from configuration errors with security implications, out-of-date firmware, or whether some of the devices are simply too outdated to support security best-practices.<\/p>\n<p>In comments published on Schneider Electric blog <a href=\"https:\/\/blog.se.com\/datacenter\/dcim\/2019\/10\/31\/how-to-prevent-edge-computing-security-risks-connected-world\/\">here<\/a>, David Radszuweit, the CEO of Linespotting AB and a 25-year veteran in the industry, was a pilot customer of the security monitor feature. He shared about how the system proved to be a real eye-opener and helped him discover security issues on devices that he did not think existed. \u201cIt was a real eye opener,\u201d said Radszuweit.<\/p>\n<p>You can learn more about Schneider Electric\u2019s EcoStruxure IT Expert monitoring software <a href=\"https:\/\/ecostruxureit.com\/ecostruxure-it-expert\/\">here<\/a>.<\/p>\n<p><em>Chi Sen Gay, Head of Data Center Software Solutions, APJ &#038; EMEA, Schneider Electric<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Driven by surging digital transformation initiatives and IoT deployments around the world, more edge computing sites than ever are being established to meet localised demands. However, one unintended side effect is the difficulty of properly securing these far-flung systems. Rise of Edge Devices The danger is not limited to core systems such as servers, storage [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":13071,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sfsi_plus_gutenberg_text_before_share":"","sfsi_plus_gutenberg_show_text_before_share":"","sfsi_plus_gutenberg_icon_type":"","sfsi_plus_gutenberg_icon_alignemt":"","sfsi_plus_gutenburg_max_per_row":"","footnotes":""},"categories":[19,523],"tags":[734,401,701,880],"class_list":{"0":"post-13069","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-guru","9":"tag-edge-computing","10":"tag-industry","11":"tag-schneider-electric","12":"tag-technology"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Managing Edge Computing Security Risks in a Connected World<\/title>\n<meta name=\"description\" content=\"More edge computing sites than ever are being established to meet localised demands. However, it also brings with it edge computing security risks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nxtmag.tech\/my\/2020\/05\/08\/managing-edge-computing-security-risks-in-a-connected-world\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:locale:alternate\" content=\"en_SG\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Managing Edge Computing Security Risks in a Connected World\" \/>\n<meta property=\"og:description\" content=\"More edge computing sites than ever are being established to meet localised demands. However, it also brings with it edge computing security risks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nxtmag.tech\/my\/2020\/05\/08\/managing-edge-computing-security-risks-in-a-connected-world\/\" \/>\n<meta property=\"og:site_name\" content=\"NXT Malaysia\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-08T06:59:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nxtmag.tech\/wp-content\/uploads\/2020\/05\/schneider-edge-computing-security-risks.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"599\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"NXT\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"NXT\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2020\\\/05\\\/08\\\/managing-edge-computing-security-risks-in-a-connected-world\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2020\\\/05\\\/08\\\/managing-edge-computing-security-risks-in-a-connected-world\\\/\"},\"author\":{\"name\":\"NXT\",\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/#\\\/schema\\\/person\\\/c426122b1dd58a57f52a773b80de3852\"},\"headline\":\"Managing Edge Computing Security Risks in a Connected World\",\"datePublished\":\"2020-05-08T06:59:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2020\\\/05\\\/08\\\/managing-edge-computing-security-risks-in-a-connected-world\\\/\"},\"wordCount\":551,\"image\":{\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2020\\\/05\\\/08\\\/managing-edge-computing-security-risks-in-a-connected-world\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nxtmag.tech\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/schneider-edge-computing-security-risks.jpg\",\"keywords\":[\"edge computing\",\"industry\",\"Schneider Electric\",\"Technology\"],\"articleSection\":[\"News\",\"Guru\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2020\\\/05\\\/08\\\/managing-edge-computing-security-risks-in-a-connected-world\\\/\",\"url\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2020\\\/05\\\/08\\\/managing-edge-computing-security-risks-in-a-connected-world\\\/\",\"name\":\"Managing Edge Computing Security Risks in a Connected World\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2020\\\/05\\\/08\\\/managing-edge-computing-security-risks-in-a-connected-world\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2020\\\/05\\\/08\\\/managing-edge-computing-security-risks-in-a-connected-world\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nxtmag.tech\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/schneider-edge-computing-security-risks.jpg\",\"datePublished\":\"2020-05-08T06:59:54+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/#\\\/schema\\\/person\\\/c426122b1dd58a57f52a773b80de3852\"},\"description\":\"More edge computing sites than ever are being established to meet localised demands. However, it also brings with it edge computing security risks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2020\\\/05\\\/08\\\/managing-edge-computing-security-risks-in-a-connected-world\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2020\\\/05\\\/08\\\/managing-edge-computing-security-risks-in-a-connected-world\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2020\\\/05\\\/08\\\/managing-edge-computing-security-risks-in-a-connected-world\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nxtmag.tech\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/schneider-edge-computing-security-risks.jpg\",\"contentUrl\":\"https:\\\/\\\/nxtmag.tech\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/schneider-edge-computing-security-risks.jpg\",\"width\":900,\"height\":599,\"caption\":\"Schneider Electric Edge computing security risks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2020\\\/05\\\/08\\\/managing-edge-computing-security-risks-in-a-connected-world\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nxtmag.tech\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Managing Edge Computing Security Risks in a Connected World\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/#website\",\"url\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/\",\"name\":\"NXT Malaysia\",\"description\":\"Gear, Gadget, Technology\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/#\\\/schema\\\/person\\\/c426122b1dd58a57f52a773b80de3852\",\"name\":\"NXT\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3df61dffd2251dce64d0dd37531fe754b46b0b2026acd61b51a5c9d429f8cc6f?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3df61dffd2251dce64d0dd37531fe754b46b0b2026acd61b51a5c9d429f8cc6f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3df61dffd2251dce64d0dd37531fe754b46b0b2026acd61b51a5c9d429f8cc6f?s=96&d=mm&r=g\",\"caption\":\"NXT\"},\"url\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/author\\\/lawrence\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Managing Edge Computing Security Risks in a Connected World","description":"More edge computing sites than ever are being established to meet localised demands. However, it also brings with it edge computing security risks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nxtmag.tech\/my\/2020\/05\/08\/managing-edge-computing-security-risks-in-a-connected-world\/","og_locale":"en_US","og_type":"article","og_title":"[:sg]Managing Edge Computing Security Risks in a Connected World[:] - NXT Malaysia","og_description":"More edge computing sites than ever are being established to meet localised demands. However, it also brings with it edge computing security risks.","og_url":"https:\/\/nxtmag.tech\/my\/2020\/05\/08\/managing-edge-computing-security-risks-in-a-connected-world\/","og_site_name":"NXT Malaysia","article_published_time":"2020-05-08T06:59:54+00:00","og_image":[{"width":900,"height":599,"url":"https:\/\/nxtmag.tech\/wp-content\/uploads\/2020\/05\/schneider-edge-computing-security-risks.jpg","type":"image\/jpeg"}],"author":"NXT","twitter_card":"summary_large_image","twitter_misc":{"Written by":"NXT","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nxtmag.tech\/my\/2020\/05\/08\/managing-edge-computing-security-risks-in-a-connected-world\/#article","isPartOf":{"@id":"https:\/\/nxtmag.tech\/my\/2020\/05\/08\/managing-edge-computing-security-risks-in-a-connected-world\/"},"author":{"name":"NXT","@id":"https:\/\/nxtmag.tech\/my\/#\/schema\/person\/c426122b1dd58a57f52a773b80de3852"},"headline":"Managing Edge Computing Security Risks in a Connected World","datePublished":"2020-05-08T06:59:54+00:00","mainEntityOfPage":{"@id":"https:\/\/nxtmag.tech\/my\/2020\/05\/08\/managing-edge-computing-security-risks-in-a-connected-world\/"},"wordCount":551,"image":{"@id":"https:\/\/nxtmag.tech\/my\/2020\/05\/08\/managing-edge-computing-security-risks-in-a-connected-world\/#primaryimage"},"thumbnailUrl":"https:\/\/nxtmag.tech\/wp-content\/uploads\/2020\/05\/schneider-edge-computing-security-risks.jpg","keywords":["edge computing","industry","Schneider Electric","Technology"],"articleSection":["News","Guru"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/nxtmag.tech\/my\/2020\/05\/08\/managing-edge-computing-security-risks-in-a-connected-world\/","url":"https:\/\/nxtmag.tech\/my\/2020\/05\/08\/managing-edge-computing-security-risks-in-a-connected-world\/","name":"Managing Edge Computing Security Risks in a Connected World","isPartOf":{"@id":"https:\/\/nxtmag.tech\/my\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nxtmag.tech\/my\/2020\/05\/08\/managing-edge-computing-security-risks-in-a-connected-world\/#primaryimage"},"image":{"@id":"https:\/\/nxtmag.tech\/my\/2020\/05\/08\/managing-edge-computing-security-risks-in-a-connected-world\/#primaryimage"},"thumbnailUrl":"https:\/\/nxtmag.tech\/wp-content\/uploads\/2020\/05\/schneider-edge-computing-security-risks.jpg","datePublished":"2020-05-08T06:59:54+00:00","author":{"@id":"https:\/\/nxtmag.tech\/my\/#\/schema\/person\/c426122b1dd58a57f52a773b80de3852"},"description":"More edge computing sites than ever are being established to meet localised demands. However, it also brings with it edge computing security risks.","breadcrumb":{"@id":"https:\/\/nxtmag.tech\/my\/2020\/05\/08\/managing-edge-computing-security-risks-in-a-connected-world\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nxtmag.tech\/my\/2020\/05\/08\/managing-edge-computing-security-risks-in-a-connected-world\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nxtmag.tech\/my\/2020\/05\/08\/managing-edge-computing-security-risks-in-a-connected-world\/#primaryimage","url":"https:\/\/nxtmag.tech\/wp-content\/uploads\/2020\/05\/schneider-edge-computing-security-risks.jpg","contentUrl":"https:\/\/nxtmag.tech\/wp-content\/uploads\/2020\/05\/schneider-edge-computing-security-risks.jpg","width":900,"height":599,"caption":"Schneider Electric Edge computing security risks"},{"@type":"BreadcrumbList","@id":"https:\/\/nxtmag.tech\/my\/2020\/05\/08\/managing-edge-computing-security-risks-in-a-connected-world\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nxtmag.tech\/"},{"@type":"ListItem","position":2,"name":"Managing Edge Computing Security Risks in a Connected World"}]},{"@type":"WebSite","@id":"https:\/\/nxtmag.tech\/my\/#website","url":"https:\/\/nxtmag.tech\/my\/","name":"NXT Malaysia","description":"Gear, Gadget, Technology","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nxtmag.tech\/my\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/nxtmag.tech\/my\/#\/schema\/person\/c426122b1dd58a57f52a773b80de3852","name":"NXT","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3df61dffd2251dce64d0dd37531fe754b46b0b2026acd61b51a5c9d429f8cc6f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3df61dffd2251dce64d0dd37531fe754b46b0b2026acd61b51a5c9d429f8cc6f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3df61dffd2251dce64d0dd37531fe754b46b0b2026acd61b51a5c9d429f8cc6f?s=96&d=mm&r=g","caption":"NXT"},"url":"https:\/\/nxtmag.tech\/my\/author\/lawrence\/"}]}},"_links":{"self":[{"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/posts\/13069","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/comments?post=13069"}],"version-history":[{"count":1,"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/posts\/13069\/revisions"}],"predecessor-version":[{"id":13072,"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/posts\/13069\/revisions\/13072"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/media\/13071"}],"wp:attachment":[{"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/media?parent=13069"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/categories?post=13069"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/tags?post=13069"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}