{"id":986,"date":"2015-10-18T20:19:00","date_gmt":"2015-10-18T20:19:00","guid":{"rendered":"http:\/\/localhost\/projects\/horsesforsources\/trust-as-a-service-blueprint_101915\/"},"modified":"2015-10-18T20:19:00","modified_gmt":"2015-10-18T20:19:00","slug":"trust-as-a-service-blueprint_101915","status":"publish","type":"post","link":"https:\/\/www.horsesforsources.com\/trust-as-a-service-blueprint_101915\/","title":{"rendered":"Provider, provider on the wall, who’s delivering Trust for Digital?"},"content":{"rendered":"

Anyone who knows me well has seen how hard we’ve been pressing the importance of security and trust in a global services delivery environment, since we founded HfS.<\/p>\n

In short, we’re moving into a world where reactive fixes to security breaches is a sure-fire recipe for disaster. \u00a0Savvy enterprises simply have<\/em> to deploy proactive, holistic management practices of their data flows across systems, people and processes. \u00a0What’s more, with all these new investments going into digital technology, SaaS platforms, global outsourcing initiatives and automation bots, the risks out there with our data flying all around the place – and the trust in people needed to manage<\/em> these risks – is second to none.<\/p>\n

So who better than an analyst legend of the networking and computing boom era, the founder of analyst firm Current Analysis himself, and now a year-long member of the HfS team, Fred McClimans<\/a>, to have a serious deep dive into what we are calling… Trust-as-a-Service:<\/p>\n

\"Click<\/a><\/p>\n

Click to Enlarge<\/p>\n<\/div>\n

So Fred, why a Blueprint on security, or perhaps the better question, why trust as a Blueprint topic?
\n<\/span><\/p>\n

The transformation from an analog to a digital economy has been profound, giving rise to a whole new wave of business and economic models that place the consumer first and corporate assets online. This is a huge shift from the legacy models where brands controlled the message, consumers ate what was available, and managing risk meant not much more than a solid business plan, a line of credit, and Master locks on the front and back doors. That game ended a long time ago.<\/p>\n

With most, if not all, corporate data now available online, and a massive consumer-driven omnichannel engagement model, we\u2019ve literally given competitors and \u201cevil-doers\u201d a map of where to find corporate treasure, while replacing those locked doors with free keys that we hand out to every customer. While the legacy threat had to get close to inflict damage, the threat today can manifest itself from anywhere.<\/p>\n

We\u2019ve also seen a huge shift in the value that brands deliver to their consumers. It used to be all about the product, but now it\u2019s increasingly about the experience \u2013 an experience that is inherently digital, less personal, and perhaps a bit more fragile. No matter how you look at it, enterprises today face risk both to their internal assets as well as to their greatest asset, their customers. Hacks and data theft \u2013 especially personal consumer data \u2013 ruin that customer experience, and decrease the level of trust. If your online or digital brand isn\u2019t trusted by the consumer, they\u2019ll easily go elsewhere. So, as we looked at the market for managed security services, it became clear pretty early on that it wasn\u2019t just security, or cybersecurity, that mattered, but the trust it enabled between a brand and its customers, partners, and even employees. That realization shifted how we approached the security market. Security isn\u2019t about securing assets, it\u2019s about creating trusted assets that can be leveraged in the market, hence Trust-as-a-Service for our Blueprint theme.<\/p>\n

That\u2019s quite a shift from the traditional approach of measuring security in terms of firewalls, identity and access management, and malware detection. What was the approach you took to measure the ability to provide trust as a service? And can you share some of the key takeaways from your research?<\/span><\/p>\n

\"\"<\/a><\/p>\n

Fred McClimans is Managing Director for Security Research, HfS (Click for Bio)<\/p>\n<\/div>\n

Well, first off, this Blueprint definitely takes all the traditional security elements into account \u2013 what we refer to as the technology side of security. Security Event and Information Management (SIEM), Data Loss Prevention (DLP), Identity Access Management (IAM), app and device security are just as important today as they were a year ago, perhaps even more important as the sophistication of cyberthreats has increased. But the real area where we are seeing new value in security is in behavior, and not just user behavior, but enterprise behavior.<\/p>\n

An increasing number of security breaches can be directly tied to enterprise behavior and processes that haven\u2019t kept up with the growing threat. We see insider threats all the time, even though most security is directed outward. And increasingly, data isn\u2019t just being stolen from within the enterprise, but from enterprise partners and consumers. So there\u2019s real need to start looking at some of the business structures and processes, the deals we make, and the types of information and access we\u2019re willing to share, that often lead to increased risk that even the best technology is unable to protect from the right prying eyes.<\/p>\n

T-mobile had a significant (hack recently that came through one of their partners, Experian. And Sony\u2019s infamous hack last year, that was linked to North Korea and the film \u201cThe Interview\u201d, revealed that over 100 internal Sony system were simply unmonitored. Both of these hacks can be tied to behavior and process.<\/p>\n

So what did we do? We started with the main technical criteria and then layered on top the ability of providers to take their customers to the next level of blended physical\/digital and process\/behavior maturity, which you\u2019ll see referenced in the Blueprint as the HfS Digital Trust Framework (see Can Today\u2019s Providers Deliver the Elements of Digital Trust?<\/a>) and the Digital Security Maturity Model (see Transforming the Security Maturity Model<\/a>).<\/p>\n

What separates the winners in security apart from the others? Is there a particular technology or focus that gives them the edge in helping enterprises counter the cybersecurity threat?<\/span><\/p>\n

Now you\u2019re really getting into it. I think the best way to put it is to start with the technology. Every provider we looked at had solid technical chops. In fact, there\u2019s a pretty good overlap with some of the partnerships that operate behind the scenes. And while each provider has a bit of their own special sauce in the mix, technically they all show very well.<\/p>\n

Moving up the maturity stack, what tended to set the providers apart was vision, and execution, for how enterprise security and trust enablement would materialize moving forward. Accenture and Wipro, two examples from our Winner\u2019s Circle (along with HPE and IBM), had existing services and processes that really closely aligned with our models for Trust. Leidos and Unisys, two of our High Performers (along with Cognizant, Dell, AT&T and Atos), similarly showed a good understanding of the need to move beyond security as technology and start thinking of it as a larger enabler of corporate risk management. At the end of the day, vision, innovation, and the ability to help their clients mature digitally were all key elements of success.<\/p>\n

You mentioned a shift from security as a way to protect assets towards security as a way to build and leverage trusted assets. Does that have a bearing on the way enterprises approach outcomes? And what recommendations do you have for them on this journey?<\/span><\/p>\n

Phil, that mindset shift is going to play a huge part in the success, or failure, of enterprises moving forward. Security can\u2019t afford to be an afterthought; it really needs to be thought of as a transformational enabler of a better, more trusted, business. The key recommendations? Let\u2019s start with the basics. If enterprises aren\u2019t aligning themselves with the Digital Trust Framework and the Security Maturity Model, they\u2019re already behind the game. By doing this, they\u2019ll be a bit more prepared for taking the steps needed to elevate their game.<\/p>\n

Some specific recommendations would include elevating the responsibility for overall corporate risk and security management as close to the CEO and Board as possible; expanding their security architecture to include coordination, if not oversight, of their ecosystem partners; and a shift from a \u201cprevent all breaches\u201d to a \u201cminimize breaches and control risk\u201d approach. We\u2019re also recommending some actions in the areas of provider relationships, in particular related to contractual flexibility, a greater level of actionable innovation, and a closer review of international privacy policies, something that delves into the role of security with regard to personal privacy and data rights.<\/p>\n

And of course technology \u2013 automation is going to play an increasingly significant role in identifying and countering security breaches.<\/p>\n

How about the providers? What recommendations do you have for them, and how will they need to transform themselves moving forward, or even can they?<\/span><\/p>\n

I think transformation is going to be a challenge for some of the providers out there today. Those that are leading with tech may find themselves defining their own outcomes, and miss the opportunity to shift from service providers to service, and value, enablers. I can easily see a bifurcation of the market into two groups: one that is focused on delivering value by leveraging security as a way to create trust (as their clients go through their own digital transformation), and one that remains very tech-focused and becomes more of a modular, or on-demand, type of provider. There\u2019s room for both, by the way.<\/p>\n

But more directly, providers definitely need to think about security maturity in a fundamentally different fashion, which means they\u2019ve got a lot of education to do with their clients who, based on our research, are still often thinking of security from a tech-only perspective. They also need to target the C-suite aggressively, as many of the security-related improvements and initiatives that need to be discussed go beyond the scope of a CISO.<\/p>\n

There\u2019s also an emerging physical\/digital approach to security that winning providers will, and are starting to, adopt. Biometrics, access control systems, these are all physical systems that help provide a trusted environment, but today they\u2019re separate from the digital security grid, unless they\u2019ve been included as IoT devices. But the future of security services will require providers to start to leverage these devices to provide both contextual awareness of threats and help seal off threat venues.<\/p>\n

We\u2019re also recommending providers take a much more aggressive stance regarding corporate processes and behavior, especially from a larger risk mitigation perspective, that more emphasis be placed on aligning security services with specific business unit objectives, and that user education be significantly strengthened, to the point of bringing users in as collaborate security partners to help build a more trusted digital ecosystem.<\/p>\n

And again, on the tech side, we\u2019re pushing for a greater level of modularity and adaptability to keep pace with the rapid evolution of malware, spear-phishing, and embedded code hacks. This is not an easy market to be in, and they\u2019ve got their work cut out for them.<\/p>\n

What can we expect out of the industry in the coming year or so \u2013 it sounds like the threats show no sign of abating any time soon?<\/span><\/p>\n

Let\u2019s face it, the security market may never achieve a stable, or inherently safe, status. One of the constants throughout the past decade \u2013 really since the inception of digital technology \u2013 is that the level of threat always seems to meet or beat the level of protection.<\/p>\n

Enterprises are constrained by time, technology, and budget. Hackers, especially those that are organized or sponsored, live by a different set of rules. There\u2019s somewhat of an asymmetrical challenge at play. If you want to keep an asset 100% safe, you have to win every battle 100% of the time. But if you want to steal something, you only have to win once.<\/p>\n

This imbalance is likely to become more pronounced as hackers find, and exploit, an increasing number of zero day vulnerabilities, especially in older, legacy systems, or as they start to leverage more of the accumulated personal data, that\u2019s available in the dark corners of the web, to put together sophisticated personalized hacks that continue to blur the lines between the physical and digital worlds.<\/p>\n

We\u2019re also expecting an increase in the number of \u201cmass risk\u201d attacks \u2013 hacks that have the ability to cause fairly significant damage to a very large number of people, as well as an increase in smart hacks that find value in the accumulation of smaller pieces of less valued, or protected, information.<\/p>\n

Fred McClimans\u00a0can be tweeted at @fredmcclimans<\/a><\/em><\/p>\n

HfS readers can click\u00a0<\/i><\/b>here<\/i><\/b><\/span><\/a>\u00a0to view highlights of all our 26 HfS Blueprint reports.<\/i><\/b><\/span><\/p>\n

HfS subscribers\u00a0click here<\/span><\/a><\/span>\u00a0to access the new HfS Blueprint Report: Trust-as-a-Service 2015<\/span><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"

Anyone who knows me well has seen how hard we’ve been pressing the importance of security and trust in a…<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[48,51,57,61,63,65,78,81,838,84,836,90,91,92,831,830,98],"tags":[337],"ppma_author":[19],"yoast_head":"\nProvider, provider on the wall, who's delivering Trust for Digital? - Horses for Sources | No Boundaries<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.horsesforsources.com\/trust-as-a-service-blueprint_101915\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Provider, provider on the wall, who's delivering Trust for Digital? - Horses for Sources | No Boundaries\" \/>\n<meta property=\"og:description\" content=\"Anyone who knows me well has seen how hard we’ve been pressing the importance of security and trust in a...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.horsesforsources.com\/trust-as-a-service-blueprint_101915\/\" \/>\n<meta property=\"og:site_name\" content=\"Horses for Sources | No Boundaries\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-18T20:19:00+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.horsesforsources.com\/wp-content\/uploads\/2015\/10\/Trust-as-a-Services-2015_Axis_only-e1445212169869.jpg\" \/>\n<meta name=\"author\" content=\"Phil Fersht\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pfersht\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Phil Fersht\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.horsesforsources.com\/trust-as-a-service-blueprint_101915\/\",\"url\":\"https:\/\/www.horsesforsources.com\/trust-as-a-service-blueprint_101915\/\",\"name\":\"Provider, provider on the wall, who's delivering Trust for Digital? - Horses for Sources | No Boundaries\",\"isPartOf\":{\"@id\":\"https:\/\/www.horsesforsources.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.horsesforsources.com\/trust-as-a-service-blueprint_101915\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.horsesforsources.com\/trust-as-a-service-blueprint_101915\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.horsesforsources.com\/wp-content\/uploads\/2015\/10\/Trust-as-a-Services-2015_Axis_only-e1445212169869.jpg\",\"datePublished\":\"2015-10-18T20:19:00+00:00\",\"dateModified\":\"2015-10-18T20:19:00+00:00\",\"author\":{\"@id\":\"https:\/\/www.horsesforsources.com\/#\/schema\/person\/c4f084ff7ad43632f537b3b30918e69f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.horsesforsources.com\/trust-as-a-service-blueprint_101915\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.horsesforsources.com\/trust-as-a-service-blueprint_101915\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.horsesforsources.com\/trust-as-a-service-blueprint_101915\/#primaryimage\",\"url\":\"http:\/\/www.horsesforsources.com\/wp-content\/uploads\/2015\/10\/Trust-as-a-Services-2015_Axis_only-e1445212169869.jpg\",\"contentUrl\":\"http:\/\/www.horsesforsources.com\/wp-content\/uploads\/2015\/10\/Trust-as-a-Services-2015_Axis_only-e1445212169869.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.horsesforsources.com\/trust-as-a-service-blueprint_101915\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.horsesforsources.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Provider, provider on the wall, who’s delivering Trust for Digital?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.horsesforsources.com\/#website\",\"url\":\"https:\/\/www.horsesforsources.com\/\",\"name\":\"Horses for Sources | No Boundaries\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.horsesforsources.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.horsesforsources.com\/#\/schema\/person\/c4f084ff7ad43632f537b3b30918e69f\",\"name\":\"Phil Fersht\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.horsesforsources.com\/#\/schema\/person\/image\/86ee0c0ac2d033eed87f327162eb27f7\",\"url\":\"https:\/\/www.horsesforsources.com\/wp-content\/uploads\/2020\/11\/phill-150x150.png\",\"contentUrl\":\"https:\/\/www.horsesforsources.com\/wp-content\/uploads\/2020\/11\/phill-150x150.png\",\"caption\":\"Phil Fersht\"},\"description\":\"Phil Fersht is\u00a0a world-renowned analyst, writer and visionary in\u00a0emerging technologies, automation, digital business models, and the alignment of\u00a0enterprise operations to\u00a0drive customer impact and competitive advantage\",\"sameAs\":[\"http:\/\/hfsresearch.com\/team\/phil-fersht\",\"https:\/\/www.linkedin.com\/in\/pfersht\/\",\"https:\/\/x.com\/pfersht\"],\"url\":\"https:\/\/www.horsesforsources.com\/author\/phil-fherst\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Provider, provider on the wall, who's delivering Trust for Digital? - Horses for Sources | No Boundaries","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.horsesforsources.com\/trust-as-a-service-blueprint_101915\/","og_locale":"en_US","og_type":"article","og_title":"Provider, provider on the wall, who's delivering Trust for Digital? - Horses for Sources | No Boundaries","og_description":"Anyone who knows me well has seen how hard we’ve been pressing the importance of security and trust in a...","og_url":"https:\/\/www.horsesforsources.com\/trust-as-a-service-blueprint_101915\/","og_site_name":"Horses for Sources | No Boundaries","article_published_time":"2015-10-18T20:19:00+00:00","og_image":[{"url":"http:\/\/www.horsesforsources.com\/wp-content\/uploads\/2015\/10\/Trust-as-a-Services-2015_Axis_only-e1445212169869.jpg"}],"author":"Phil Fersht","twitter_card":"summary_large_image","twitter_creator":"@pfersht","twitter_misc":{"Written by":"Phil Fersht","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.horsesforsources.com\/trust-as-a-service-blueprint_101915\/","url":"https:\/\/www.horsesforsources.com\/trust-as-a-service-blueprint_101915\/","name":"Provider, provider on the wall, who's delivering Trust for Digital? - Horses for Sources | No Boundaries","isPartOf":{"@id":"https:\/\/www.horsesforsources.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.horsesforsources.com\/trust-as-a-service-blueprint_101915\/#primaryimage"},"image":{"@id":"https:\/\/www.horsesforsources.com\/trust-as-a-service-blueprint_101915\/#primaryimage"},"thumbnailUrl":"http:\/\/www.horsesforsources.com\/wp-content\/uploads\/2015\/10\/Trust-as-a-Services-2015_Axis_only-e1445212169869.jpg","datePublished":"2015-10-18T20:19:00+00:00","dateModified":"2015-10-18T20:19:00+00:00","author":{"@id":"https:\/\/www.horsesforsources.com\/#\/schema\/person\/c4f084ff7ad43632f537b3b30918e69f"},"breadcrumb":{"@id":"https:\/\/www.horsesforsources.com\/trust-as-a-service-blueprint_101915\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.horsesforsources.com\/trust-as-a-service-blueprint_101915\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.horsesforsources.com\/trust-as-a-service-blueprint_101915\/#primaryimage","url":"http:\/\/www.horsesforsources.com\/wp-content\/uploads\/2015\/10\/Trust-as-a-Services-2015_Axis_only-e1445212169869.jpg","contentUrl":"http:\/\/www.horsesforsources.com\/wp-content\/uploads\/2015\/10\/Trust-as-a-Services-2015_Axis_only-e1445212169869.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.horsesforsources.com\/trust-as-a-service-blueprint_101915\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.horsesforsources.com\/"},{"@type":"ListItem","position":2,"name":"Provider, provider on the wall, who’s delivering Trust for Digital?"}]},{"@type":"WebSite","@id":"https:\/\/www.horsesforsources.com\/#website","url":"https:\/\/www.horsesforsources.com\/","name":"Horses for Sources | No Boundaries","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.horsesforsources.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.horsesforsources.com\/#\/schema\/person\/c4f084ff7ad43632f537b3b30918e69f","name":"Phil Fersht","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.horsesforsources.com\/#\/schema\/person\/image\/86ee0c0ac2d033eed87f327162eb27f7","url":"https:\/\/www.horsesforsources.com\/wp-content\/uploads\/2020\/11\/phill-150x150.png","contentUrl":"https:\/\/www.horsesforsources.com\/wp-content\/uploads\/2020\/11\/phill-150x150.png","caption":"Phil Fersht"},"description":"Phil Fersht is\u00a0a world-renowned analyst, writer and visionary in\u00a0emerging technologies, automation, digital business models, and the alignment of\u00a0enterprise operations to\u00a0drive customer impact and competitive advantage","sameAs":["http:\/\/hfsresearch.com\/team\/phil-fersht","https:\/\/www.linkedin.com\/in\/pfersht\/","https:\/\/x.com\/pfersht"],"url":"https:\/\/www.horsesforsources.com\/author\/phil-fherst\/"}]}},"authors":[{"term_id":19,"user_id":3,"is_guest":0,"slug":"phil-fherst","display_name":"Phil Fersht","avatar_url":{"url":"https:\/\/www.horsesforsources.com\/wp-content\/uploads\/2024\/02\/Phil-Fersht-HFS-Updated.jpg","url2x":"https:\/\/www.horsesforsources.com\/wp-content\/uploads\/2024\/02\/Phil-Fersht-HFS-Updated.jpg"},"first_name":"Phil","last_name":"Fersht","user_url":"http:\/\/hfsresearch.com\/team\/phil-fersht","description":"Phil Fersht is\u00a0a world-renowned analyst, writer and visionary in\u00a0emerging technologies, automation, digital business models, and the alignment of\u00a0enterprise operations to\u00a0drive customer impact and competitive advantage"}],"_links":{"self":[{"href":"https:\/\/www.horsesforsources.com\/wp-json\/wp\/v2\/posts\/986"}],"collection":[{"href":"https:\/\/www.horsesforsources.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.horsesforsources.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.horsesforsources.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.horsesforsources.com\/wp-json\/wp\/v2\/comments?post=986"}],"version-history":[{"count":0,"href":"https:\/\/www.horsesforsources.com\/wp-json\/wp\/v2\/posts\/986\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.horsesforsources.com\/wp-json\/wp\/v2\/media?parent=986"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.horsesforsources.com\/wp-json\/wp\/v2\/categories?post=986"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.horsesforsources.com\/wp-json\/wp\/v2\/tags?post=986"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.horsesforsources.com\/wp-json\/wp\/v2\/ppma_author?post=986"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}