{"id":1187,"date":"2015-11-21T10:57:32","date_gmt":"2015-11-21T08:57:32","guid":{"rendered":"http:\/\/www.vineyard-mc.com\/?p=1187"},"modified":"2024-04-22T14:09:59","modified_gmt":"2024-04-22T12:09:59","slug":"it-security-trends-und-frameworks","status":"publish","type":"post","link":"https:\/\/vineyard-mc.com\/en\/it-security-trends-und-frameworks\/","title":{"rendered":"IT Security Trends and Frameworks"},"content":{"rendered":"<div class=\"row\"><div class=\"wpv-grid grid-1-1  wpv-first-level first unextended\" style=\"padding-top:0px;padding-bottom:0px\" id=\"wpv-column-5cd393c10e873277738e712989b1b2fc\" ><p><!--:de--><\/p>\n<p style=\"text-align: justify;\"><strong><strong>Carsten Fabig, Vineyard Management Consulting GmbH, about actual IT Security trends and frameworks.<\/strong><\/strong><\/p>\n<p><strong style=\"text-align: justify;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-987729 alignright\" src=\"https:\/\/vineyard-mc.com\/wp-content\/uploads\/2021\/03\/DSC_5483-Edit-Carsten-200x300.jpg\" alt=\"\" width=\"200\" height=\"300\" \/><\/strong><\/strong><\/p>\n<p style=\"text-align: justify;\"><strong><span style=\"color: #333399;\">1. Mister Fabig, why have you and your company gone deeper in the special topic of the IT Security Management?<\/span><\/strong><\/p>\n<p style=\"text-align: justify;\">Well, as far as the core of the Vineyard Management Consulting service offering is concerned, this topic was not actually accelerated. But then it just simply caught me, while being part of a client\u2019s project. This means I was actually approached, based on our Complexity, Process and Project Management competences, and asked if I could support a Data Leakage Prevention initiative. And that is how the first Security project has been started for me, through which I built large Security know-how and in the meantime years of specific qualifications.<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #333399;\"><strong>2. What attracts you in the IT Security Management challenge?<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\">I think, it is one of the top IT trend topics that will keep us on a long term still occupied in the business but also in the private sphere. Often, the only thought in the first step are the tools, but through the utilization by the first users, that is when the true change challenges starts for the organization at a glance.<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #333399;\"><strong>3. From your point of view, are the companies currently correctly established?<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\">Meanwhile, based on the acknowledged importance, all companies have the challenge of finding qualified staff. On the one hand, there are not enough trained professionals available, while on the other hand the providers of critical infrastructures attract accordingly the additional specialized forces in their projects.<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #333399;\"><strong>4. Which are the trends which appear on the horizon and which of those are already actuals challenges in your present consulting projects?<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\">With the increasing number of cyber-attacks, which are now also communicated to a wider public via the press, the call for an effective and efficient Incident Management and special threat intelligence teams will of course become louder. This is the point where automatization just really starts to kick in, but there is still the challenge to filter out the false alarms in the data set. The best match between technology and people needs to further improved. Furthermore, the transparency of the security level of the organization is an ongoing issue, the key words here being the Key Compliance Indicators (KCIs) and the compliance check tools.<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #333399;\"><strong>5. Which IT Security initiatives are generally prioritized by organizations with limited resources and budget cuts?<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\">The topic Data Leakage Prevention has entered the race again. In this case, this applies firstly on how to classify the criticality of the organization\u00b4s information: first manually, then automatized at a later stage. Right after, the Privileged Access Rights Management represents effective network segmentation and the hardware and the software inventories development in their relation with the Patch Management, are as well accordingly highly prioritized.<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #333399;\"><strong>6. Which IT Security frameworks should the customer use? Which are particularly close to implementation?<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\">Typically, the companies in Germany are currently ISO certified and align their Management Information Security according to ISO27001\/27002. Since the subjects with the existing line organization teams can usually hardly be fully processed, it is often helpful to develop a suitable framework for the company and of course to use sources such as COBIT, ISO and SANS as Input and focus in a specific area. Precisely SANS20 is not a holistic approach, it concretes the implementation, therefore but only with certain technologies.<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #333399;\"><strong>7. SANS20 is currently in IT Security on everyone\u00b4s lips. What changes have now been made to the current version 6.0? How are these to be evaluated?<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\">SANS20 represents an enormous guidance help due to its priorities and implementation level particularly for small and medium sized companies. The new version 6.0 which was made public on 15th of October by CIS (Center of Internet Security), has made significant changes to the priorities of the 20 individual focus areas. Here is the first step to name the sharp downgrades of security monitoring and a controlled Privileged Access Rights Management. Additionally, a new focus field has been introduced, which immediately addresses the data leakage risks and aims in this respect to make the configuration and use of email systems and browsers safer. Also, not surprisingly, the process for secure software development has been downgraded, since the use of third-party purchased software continues to rise and these risks attributed to gaps in patching as well as encryption and authentication procedures can ultimately frequently be traced back.<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #333399;\"><strong>8. Many German companies continue to heavily rely on ISO27001\/2. Do you see this as a contradiction to SANS20 or do you see perhaps this orientation as backward?<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\">No, this is certainly no contradiction. The frameworks are complementary. In SANS20 there are many organizational and procedural aspects that are almost not covered. It is therefore right and proper to set them according to the general management of information security in ISO and COBIT. Particularly with regards to the \u201cnon-IT channels\u201d such as voice and print, corresponding awareness is needed, for which SANS20 does not hold the right answers.<\/p>\n<p><!--:--><!--:en--><\/p>\n<p><!--:--><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Carsten Fabig, Vineyard Management Consulting GmbH, \u00fcber IT Security Trends und Frameworks in der Praxis. 1. Herr Fabig, warum sind Sie als Management Berater mit Ihrer Firma tiefer in das Spezialthema IT Security Management eingestiegen? Nun, vom Kern des Vineyard Management Consulting Leistungsangebots her war dies zun\u00e4chst nicht forciert worden. Doch dann hat es mich&#8230;<\/p>","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[43],"tags":[],"class_list":["post-1187","post","type-post","status-publish","format-standard","hentry","category-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT Security Trends und Frameworks - Vineyard Management Consulting GmbH<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/vineyard-mc.com\/en\/it-security-trends-und-frameworks\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Security Trends und Frameworks - Vineyard Management Consulting GmbH\" \/>\n<meta property=\"og:description\" content=\"Carsten Fabig, Vineyard Management Consulting GmbH, \u00fcber IT Security Trends und Frameworks in der Praxis. 1. Herr Fabig, warum sind Sie als Management Berater mit Ihrer Firma tiefer in das Spezialthema IT Security Management eingestiegen? Nun, vom Kern des Vineyard Management Consulting Leistungsangebots her war dies zun\u00e4chst nicht forciert worden. Doch dann hat es mich...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/vineyard-mc.com\/en\/it-security-trends-und-frameworks\/\" \/>\n<meta property=\"og:site_name\" content=\"Vineyard Management Consulting GmbH\" \/>\n<meta property=\"article:published_time\" content=\"2015-11-21T08:57:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-22T12:09:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/vineyard-mc.com\/wp-content\/uploads\/2021\/03\/DSC_5483-Edit-Carsten-200x300.jpg\" \/>\n<meta name=\"author\" content=\"Carsten Fabig\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Carsten Fabig\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/it-security-trends-und-frameworks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/it-security-trends-und-frameworks\\\/\"},\"author\":{\"name\":\"Carsten Fabig\",\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/#\\\/schema\\\/person\\\/0597cdc702c5c6248aa3e1fb4acc1697\"},\"headline\":\"IT Security Trends und Frameworks\",\"datePublished\":\"2015-11-21T08:57:32+00:00\",\"dateModified\":\"2024-04-22T12:09:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/it-security-trends-und-frameworks\\\/\"},\"wordCount\":768,\"publisher\":{\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/it-security-trends-und-frameworks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/vineyard-mc.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/DSC_5483-Edit-Carsten-200x300.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/it-security-trends-und-frameworks\\\/\",\"url\":\"https:\\\/\\\/vineyard-mc.com\\\/it-security-trends-und-frameworks\\\/\",\"name\":\"IT Security Trends und Frameworks - Vineyard Management Consulting GmbH\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/it-security-trends-und-frameworks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/it-security-trends-und-frameworks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/vineyard-mc.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/DSC_5483-Edit-Carsten-200x300.jpg\",\"datePublished\":\"2015-11-21T08:57:32+00:00\",\"dateModified\":\"2024-04-22T12:09:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/it-security-trends-und-frameworks\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/vineyard-mc.com\\\/it-security-trends-und-frameworks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/it-security-trends-und-frameworks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/vineyard-mc.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/DSC_5483-Edit-Carsten-200x300.jpg\",\"contentUrl\":\"https:\\\/\\\/vineyard-mc.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/DSC_5483-Edit-Carsten-200x300.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/it-security-trends-und-frameworks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/vineyard-mc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Security Trends und Frameworks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/#website\",\"url\":\"https:\\\/\\\/vineyard-mc.com\\\/\",\"name\":\"Vineyard Management Consulting GmbH\",\"description\":\"Better Ideas - Better Results\",\"publisher\":{\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/#organization\"},\"alternateName\":\"VMC GmbH\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/vineyard-mc.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/#organization\",\"name\":\"Vineyard Management Consulting GmbH\",\"url\":\"https:\\\/\\\/vineyard-mc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/vineyard-mc.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/VMC-Logo_1.jpg\",\"contentUrl\":\"https:\\\/\\\/vineyard-mc.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/VMC-Logo_1.jpg\",\"width\":506,\"height\":665,\"caption\":\"Vineyard Management Consulting GmbH\"},\"image\":{\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/de.linkedin.com\\\/company\\\/vineyard-management-consulting-gmbh\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/#\\\/schema\\\/person\\\/0597cdc702c5c6248aa3e1fb4acc1697\",\"name\":\"Carsten Fabig\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/133b3463857c1f2fac1dc32fce1a09c7eca31b2606df4137145cf370ee1b9767?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/133b3463857c1f2fac1dc32fce1a09c7eca31b2606df4137145cf370ee1b9767?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/133b3463857c1f2fac1dc32fce1a09c7eca31b2606df4137145cf370ee1b9767?s=96&d=mm&r=g\",\"caption\":\"Carsten Fabig\"},\"url\":\"https:\\\/\\\/vineyard-mc.com\\\/en\\\/author\\\/cfabig\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT Security Trends und Frameworks - Vineyard Management Consulting GmbH","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/vineyard-mc.com\/en\/it-security-trends-und-frameworks\/","og_locale":"en_GB","og_type":"article","og_title":"IT Security Trends und Frameworks - Vineyard Management Consulting GmbH","og_description":"Carsten Fabig, Vineyard Management Consulting GmbH, \u00fcber IT Security Trends und Frameworks in der Praxis. 1. Herr Fabig, warum sind Sie als Management Berater mit Ihrer Firma tiefer in das Spezialthema IT Security Management eingestiegen? Nun, vom Kern des Vineyard Management Consulting Leistungsangebots her war dies zun\u00e4chst nicht forciert worden. Doch dann hat es mich...","og_url":"https:\/\/vineyard-mc.com\/en\/it-security-trends-und-frameworks\/","og_site_name":"Vineyard Management Consulting GmbH","article_published_time":"2015-11-21T08:57:32+00:00","article_modified_time":"2024-04-22T12:09:59+00:00","og_image":[{"url":"https:\/\/vineyard-mc.com\/wp-content\/uploads\/2021\/03\/DSC_5483-Edit-Carsten-200x300.jpg","type":"","width":"","height":""}],"author":"Carsten Fabig","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Carsten Fabig","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/vineyard-mc.com\/it-security-trends-und-frameworks\/#article","isPartOf":{"@id":"https:\/\/vineyard-mc.com\/it-security-trends-und-frameworks\/"},"author":{"name":"Carsten Fabig","@id":"https:\/\/vineyard-mc.com\/#\/schema\/person\/0597cdc702c5c6248aa3e1fb4acc1697"},"headline":"IT Security Trends und Frameworks","datePublished":"2015-11-21T08:57:32+00:00","dateModified":"2024-04-22T12:09:59+00:00","mainEntityOfPage":{"@id":"https:\/\/vineyard-mc.com\/it-security-trends-und-frameworks\/"},"wordCount":768,"publisher":{"@id":"https:\/\/vineyard-mc.com\/#organization"},"image":{"@id":"https:\/\/vineyard-mc.com\/it-security-trends-und-frameworks\/#primaryimage"},"thumbnailUrl":"https:\/\/vineyard-mc.com\/wp-content\/uploads\/2021\/03\/DSC_5483-Edit-Carsten-200x300.jpg","articleSection":["Blog"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/vineyard-mc.com\/it-security-trends-und-frameworks\/","url":"https:\/\/vineyard-mc.com\/it-security-trends-und-frameworks\/","name":"IT Security Trends und Frameworks - Vineyard Management Consulting GmbH","isPartOf":{"@id":"https:\/\/vineyard-mc.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/vineyard-mc.com\/it-security-trends-und-frameworks\/#primaryimage"},"image":{"@id":"https:\/\/vineyard-mc.com\/it-security-trends-und-frameworks\/#primaryimage"},"thumbnailUrl":"https:\/\/vineyard-mc.com\/wp-content\/uploads\/2021\/03\/DSC_5483-Edit-Carsten-200x300.jpg","datePublished":"2015-11-21T08:57:32+00:00","dateModified":"2024-04-22T12:09:59+00:00","breadcrumb":{"@id":"https:\/\/vineyard-mc.com\/it-security-trends-und-frameworks\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/vineyard-mc.com\/it-security-trends-und-frameworks\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/vineyard-mc.com\/it-security-trends-und-frameworks\/#primaryimage","url":"https:\/\/vineyard-mc.com\/wp-content\/uploads\/2021\/03\/DSC_5483-Edit-Carsten-200x300.jpg","contentUrl":"https:\/\/vineyard-mc.com\/wp-content\/uploads\/2021\/03\/DSC_5483-Edit-Carsten-200x300.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/vineyard-mc.com\/it-security-trends-und-frameworks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/vineyard-mc.com\/"},{"@type":"ListItem","position":2,"name":"IT Security Trends und Frameworks"}]},{"@type":"WebSite","@id":"https:\/\/vineyard-mc.com\/#website","url":"https:\/\/vineyard-mc.com\/","name":"Vineyard Management Consulting GmbH","description":"Better Ideas - Better Results","publisher":{"@id":"https:\/\/vineyard-mc.com\/#organization"},"alternateName":"VMC GmbH","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/vineyard-mc.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/vineyard-mc.com\/#organization","name":"Vineyard Management Consulting GmbH","url":"https:\/\/vineyard-mc.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/vineyard-mc.com\/#\/schema\/logo\/image\/","url":"https:\/\/vineyard-mc.com\/wp-content\/uploads\/2021\/03\/VMC-Logo_1.jpg","contentUrl":"https:\/\/vineyard-mc.com\/wp-content\/uploads\/2021\/03\/VMC-Logo_1.jpg","width":506,"height":665,"caption":"Vineyard Management Consulting GmbH"},"image":{"@id":"https:\/\/vineyard-mc.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/de.linkedin.com\/company\/vineyard-management-consulting-gmbh"]},{"@type":"Person","@id":"https:\/\/vineyard-mc.com\/#\/schema\/person\/0597cdc702c5c6248aa3e1fb4acc1697","name":"Carsten Fabig","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/133b3463857c1f2fac1dc32fce1a09c7eca31b2606df4137145cf370ee1b9767?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/133b3463857c1f2fac1dc32fce1a09c7eca31b2606df4137145cf370ee1b9767?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/133b3463857c1f2fac1dc32fce1a09c7eca31b2606df4137145cf370ee1b9767?s=96&d=mm&r=g","caption":"Carsten Fabig"},"url":"https:\/\/vineyard-mc.com\/en\/author\/cfabig\/"}]}},"_links":{"self":[{"href":"https:\/\/vineyard-mc.com\/en\/wp-json\/wp\/v2\/posts\/1187","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vineyard-mc.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vineyard-mc.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vineyard-mc.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/vineyard-mc.com\/en\/wp-json\/wp\/v2\/comments?post=1187"}],"version-history":[{"count":3,"href":"https:\/\/vineyard-mc.com\/en\/wp-json\/wp\/v2\/posts\/1187\/revisions"}],"predecessor-version":[{"id":988567,"href":"https:\/\/vineyard-mc.com\/en\/wp-json\/wp\/v2\/posts\/1187\/revisions\/988567"}],"wp:attachment":[{"href":"https:\/\/vineyard-mc.com\/en\/wp-json\/wp\/v2\/media?parent=1187"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vineyard-mc.com\/en\/wp-json\/wp\/v2\/categories?post=1187"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vineyard-mc.com\/en\/wp-json\/wp\/v2\/tags?post=1187"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}