{"id":988810,"date":"2023-11-23T00:00:37","date_gmt":"2023-11-22T23:00:37","guid":{"rendered":"https:\/\/vineyard-mc.com\/?p=988810"},"modified":"2024-05-21T15:11:47","modified_gmt":"2024-05-21T13:11:47","slug":"publikation-information-security","status":"publish","type":"post","link":"https:\/\/vineyard-mc.com\/en\/publikation-information-security\/","title":{"rendered":"Publication \u201cInformation Security - Smart solutions for new threats and extended regulation\u201d"},"content":{"rendered":"<div class=\"row\"><div class=\"wpv-grid grid-1-1  wpv-first-level first unextended\" style=\"padding-top:0px;padding-bottom:0px\" id=\"wpv-column-6b2c2f84e0764037f24fa86554ae30af\" ><p><strong>Vineyard Management Consulting GmbH has published the book \"Information Security - Smart Solutions for New Threats and Extended Regulation\":<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-988817 alignright\" src=\"https:\/\/vineyard-mc.com\/wp-content\/uploads\/2023\/11\/Information-Security-219x300.jpg\" alt=\"\" width=\"219\" height=\"300\" srcset=\"https:\/\/vineyard-mc.com\/wp-content\/uploads\/2023\/11\/Information-Security-219x300.jpg 219w, https:\/\/vineyard-mc.com\/wp-content\/uploads\/2023\/11\/Information-Security-9x12.jpg 9w, https:\/\/vineyard-mc.com\/wp-content\/uploads\/2023\/11\/Information-Security.jpg 509w\" sizes=\"auto, (max-width: 219px) 100vw, 219px\" \/><\/p>\n<p>In a world with further new global crises and new types of threats, it is more important than ever to be prepared. This also applies to an unprecedented extent to cyberspace, the protection of which is becoming increasingly important. The diversity and intensity of hacker attacks have never been greater, not least as a result of geopolitical changes and current crises.<\/p>\n<p>In line with the general trend towards greater threats and the increasing dependency of the economy on IT, most countries have continuously introduced corresponding laws and regulations for more effective information security in order to systematically protect critical infrastructures and thus the state and companies.<\/p>\n<p>DORA and NIS2 are probably the best-known examples of innovations and extended protection requirements in the EU at the moment. In practice, cybersecurity has already largely been adapted to the new world: Investments in cybersecurity have continued to increase in recent years,<\/p>\n<p>mostly as a result of specific incidents that are no longer allowed to happen or prescribed measures by internal\/external audits. Another driver for cyber programs is certainly the ever-increasing use of the cloud, especially in regulated industries, albeit with a slight time lag.<\/p>\n<p>The first article in this book starts directly with the topic of NIS2. The focus is on a targeted introduction of the requirements for critical infrastructures, especially for the target group of medium-sized companies.<\/p>\n<p>Following on from US legislation, the new legislation on whistleblowing is now, somewhat belatedly, also becoming mandatory within the EU through corresponding legislation in Germany. This article outlines the main challenges and suitable approaches that companies should take in this regard.<\/p>\n<p>The next article deals with the use of cyber frameworks for strategy implementation and risk management. Some of the most important frameworks (NIST and SANS20\/CIS) will be analyzed in the context of practical examples. The article attempts to show ways in which the topic of risk management based on NIST can also be implemented consistently for unstructured data in order to achieve the best possible protection based on risk-based approaches.<\/p>\n<p>This is followed by an article on security in the cloud. After a general look at the requirements, the article discusses specific best practices and tools for the Microsoft Azure Cloud, before concluding with the question \u201cHow secure is cloud security?\u201d<\/p>\n<p>A relatively high level of expenditure in the cyber security programs of recent years has rightly been invested in identity and access management. This topic will continue to gain in importance due to the increasing use of unstructured data with partners, customers and within 3rd party services, as this information must also be kept under control and managed according to risk. This article on IAM looks at the various disciplines that are relevant for holistic IAM and presents some of the most important approaches and tools.<\/p>\n<p>With the publication of the first detailed requirements this year, the topic of DORA has been given even higher priority than in the previous year, especially as implementation must be completed by the end of 2024. In order to ensure the resilience of financial institutions and third-party ICT service providers, the key requirements and challenges are discussed and corresponding approaches and procedures for implementation are provided.<\/p>\n<p>According to the authors, it is more important than ever for all companies not to lose track of the legal requirements and to develop smart solutions that address the relevant risks. It is important to always keep an eye on residual risks in order to be able to operate information security at the required security level in a timely and targeted manner with already established partners and to develop it strategically and operationally.<\/p>\n<p><span style=\"text-decoration: underline;\">Publisher:<\/span><\/p>\n<p>Vineyard Management Consulting GmbH, Carsten Fabig and Alexander Haasper.<\/p>\n<p><span style=\"text-decoration: underline;\">Authors:<\/span><\/p>\n<p>Hans-J\u00f6rg Vohl (Project Management Partners Vohl &amp; Partner), Rainer Sponholz (Vineyard Management Consulting GmbH), Laura Beckervordersandforth (Vineyard Management Consulting GmbH), Alexander Haasper (Vineyard Management Consulting GmbH), Yoan Petrov (Actegro GmbH), Dimitar Dimitrov (Vineyard Management Consulting GmbH), Carsten Fabig (Vineyard Management Consulting GmbH), Laura Dinis (Vineyard Management Consulting GmbH).<\/p>\n<p>Buy now via <a href=\"https:\/\/www.amazon.de\/-\/en\/Carsten-Fabig\/dp\/3758316022\/\">Amazon Bookstore<\/a><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Vineyard Management Consulting GmbH has published the book \u201cInformation Security - Smart Solutions to New Threats and Expanded Regulation\u201d: In a world with further new global crises and new types of threats, it is more important than ever to be prepared. This also applies to an unprecedented extent to cyberspace, the protection of which is becoming increasingly...<\/p>","protected":false},"author":6,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-988810","post","type-post","status-publish","format-standard","hentry","category-publikationen"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Publikation &quot;Information Security - Smarte L\u00f6sungen zu neuartigen Bedrohungen und erweiterter Regulatorik&quot; - Vineyard Management Consulting GmbH<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/vineyard-mc.com\/en\/publikation-information-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Publikation &quot;Information Security - Smarte L\u00f6sungen zu neuartigen Bedrohungen und erweiterter Regulatorik&quot; - Vineyard Management Consulting GmbH\" \/>\n<meta property=\"og:description\" content=\"Die Vineyard Management Consulting GmbH hat das Buch \u201cInformation Security &#8211; Smarte L\u00f6sungen zu neuartigen Bedrohungen und erweiterter Regulatorik\u201d publiziert: In einer Welt mit weiteren neuen globalen Krisen und neuartigen Bedrohungen gilt es mehr denn je gewappnet zu sein. Dies trifft auch in einem nie gekannten Ausma\u00df auf den Cyberspace zu, dessen Schutz einen immer...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/vineyard-mc.com\/en\/publikation-information-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Vineyard Management Consulting GmbH\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-22T23:00:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-21T13:11:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/vineyard-mc.com\/wp-content\/uploads\/2023\/11\/Information-Security-219x300.jpg\" \/>\n<meta name=\"author\" content=\"Laura Dinis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Laura Dinis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/publikation-information-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/publikation-information-security\\\/\"},\"author\":{\"name\":\"Laura Dinis\",\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/#\\\/schema\\\/person\\\/7c414ddacefc6059b34cc6cfc48f9bbd\"},\"headline\":\"Publikation &#8220;Information Security &#8211; Smarte L\u00f6sungen zu neuartigen Bedrohungen und erweiterter Regulatorik&#8221;\",\"datePublished\":\"2023-11-22T23:00:37+00:00\",\"dateModified\":\"2024-05-21T13:11:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/publikation-information-security\\\/\"},\"wordCount\":732,\"publisher\":{\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/publikation-information-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/vineyard-mc.com\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Information-Security-219x300.jpg\",\"articleSection\":[\"Publikationen\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/publikation-information-security\\\/\",\"url\":\"https:\\\/\\\/vineyard-mc.com\\\/publikation-information-security\\\/\",\"name\":\"Publikation \\\"Information Security - Smarte L\u00f6sungen zu neuartigen Bedrohungen und erweiterter Regulatorik\\\" - Vineyard Management Consulting GmbH\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/publikation-information-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/publikation-information-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/vineyard-mc.com\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Information-Security-219x300.jpg\",\"datePublished\":\"2023-11-22T23:00:37+00:00\",\"dateModified\":\"2024-05-21T13:11:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/publikation-information-security\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/vineyard-mc.com\\\/publikation-information-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/publikation-information-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/vineyard-mc.com\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Information-Security-219x300.jpg\",\"contentUrl\":\"https:\\\/\\\/vineyard-mc.com\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Information-Security-219x300.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/publikation-information-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/vineyard-mc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Publikation &#8220;Information Security &#8211; Smarte L\u00f6sungen zu neuartigen Bedrohungen und erweiterter Regulatorik&#8221;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/#website\",\"url\":\"https:\\\/\\\/vineyard-mc.com\\\/\",\"name\":\"Vineyard Management Consulting GmbH\",\"description\":\"Better Ideas - Better Results\",\"publisher\":{\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/#organization\"},\"alternateName\":\"VMC GmbH\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/vineyard-mc.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/#organization\",\"name\":\"Vineyard Management Consulting GmbH\",\"url\":\"https:\\\/\\\/vineyard-mc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/vineyard-mc.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/VMC-Logo_1.jpg\",\"contentUrl\":\"https:\\\/\\\/vineyard-mc.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/VMC-Logo_1.jpg\",\"width\":506,\"height\":665,\"caption\":\"Vineyard Management Consulting GmbH\"},\"image\":{\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/de.linkedin.com\\\/company\\\/vineyard-management-consulting-gmbh\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/vineyard-mc.com\\\/#\\\/schema\\\/person\\\/7c414ddacefc6059b34cc6cfc48f9bbd\",\"name\":\"Laura Dinis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/58400af0f53e7c9b1827cfdd763ebe76d852c3113f4682c4d26277beb7e7a8b8?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/58400af0f53e7c9b1827cfdd763ebe76d852c3113f4682c4d26277beb7e7a8b8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/58400af0f53e7c9b1827cfdd763ebe76d852c3113f4682c4d26277beb7e7a8b8?s=96&d=mm&r=g\",\"caption\":\"Laura Dinis\"},\"url\":\"https:\\\/\\\/vineyard-mc.com\\\/en\\\/author\\\/laura-dinis\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Publikation \"Information Security - Smarte L\u00f6sungen zu neuartigen Bedrohungen und erweiterter Regulatorik\" - Vineyard Management Consulting GmbH","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/vineyard-mc.com\/en\/publikation-information-security\/","og_locale":"en_GB","og_type":"article","og_title":"Publikation \"Information Security - Smarte L\u00f6sungen zu neuartigen Bedrohungen und erweiterter Regulatorik\" - Vineyard Management Consulting GmbH","og_description":"Die Vineyard Management Consulting GmbH hat das Buch \u201cInformation Security &#8211; Smarte L\u00f6sungen zu neuartigen Bedrohungen und erweiterter Regulatorik\u201d publiziert: In einer Welt mit weiteren neuen globalen Krisen und neuartigen Bedrohungen gilt es mehr denn je gewappnet zu sein. Dies trifft auch in einem nie gekannten Ausma\u00df auf den Cyberspace zu, dessen Schutz einen immer...","og_url":"https:\/\/vineyard-mc.com\/en\/publikation-information-security\/","og_site_name":"Vineyard Management Consulting GmbH","article_published_time":"2023-11-22T23:00:37+00:00","article_modified_time":"2024-05-21T13:11:47+00:00","og_image":[{"url":"https:\/\/vineyard-mc.com\/wp-content\/uploads\/2023\/11\/Information-Security-219x300.jpg","type":"","width":"","height":""}],"author":"Laura Dinis","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Laura Dinis","Estimated reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/vineyard-mc.com\/publikation-information-security\/#article","isPartOf":{"@id":"https:\/\/vineyard-mc.com\/publikation-information-security\/"},"author":{"name":"Laura Dinis","@id":"https:\/\/vineyard-mc.com\/#\/schema\/person\/7c414ddacefc6059b34cc6cfc48f9bbd"},"headline":"Publikation &#8220;Information Security &#8211; Smarte L\u00f6sungen zu neuartigen Bedrohungen und erweiterter Regulatorik&#8221;","datePublished":"2023-11-22T23:00:37+00:00","dateModified":"2024-05-21T13:11:47+00:00","mainEntityOfPage":{"@id":"https:\/\/vineyard-mc.com\/publikation-information-security\/"},"wordCount":732,"publisher":{"@id":"https:\/\/vineyard-mc.com\/#organization"},"image":{"@id":"https:\/\/vineyard-mc.com\/publikation-information-security\/#primaryimage"},"thumbnailUrl":"https:\/\/vineyard-mc.com\/wp-content\/uploads\/2023\/11\/Information-Security-219x300.jpg","articleSection":["Publikationen"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/vineyard-mc.com\/publikation-information-security\/","url":"https:\/\/vineyard-mc.com\/publikation-information-security\/","name":"Publikation \"Information Security - Smarte L\u00f6sungen zu neuartigen Bedrohungen und erweiterter Regulatorik\" - Vineyard Management Consulting GmbH","isPartOf":{"@id":"https:\/\/vineyard-mc.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/vineyard-mc.com\/publikation-information-security\/#primaryimage"},"image":{"@id":"https:\/\/vineyard-mc.com\/publikation-information-security\/#primaryimage"},"thumbnailUrl":"https:\/\/vineyard-mc.com\/wp-content\/uploads\/2023\/11\/Information-Security-219x300.jpg","datePublished":"2023-11-22T23:00:37+00:00","dateModified":"2024-05-21T13:11:47+00:00","breadcrumb":{"@id":"https:\/\/vineyard-mc.com\/publikation-information-security\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/vineyard-mc.com\/publikation-information-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/vineyard-mc.com\/publikation-information-security\/#primaryimage","url":"https:\/\/vineyard-mc.com\/wp-content\/uploads\/2023\/11\/Information-Security-219x300.jpg","contentUrl":"https:\/\/vineyard-mc.com\/wp-content\/uploads\/2023\/11\/Information-Security-219x300.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/vineyard-mc.com\/publikation-information-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/vineyard-mc.com\/"},{"@type":"ListItem","position":2,"name":"Publikation &#8220;Information Security &#8211; Smarte L\u00f6sungen zu neuartigen Bedrohungen und erweiterter Regulatorik&#8221;"}]},{"@type":"WebSite","@id":"https:\/\/vineyard-mc.com\/#website","url":"https:\/\/vineyard-mc.com\/","name":"Vineyard Management Consulting GmbH","description":"Better Ideas - Better Results","publisher":{"@id":"https:\/\/vineyard-mc.com\/#organization"},"alternateName":"VMC GmbH","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/vineyard-mc.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/vineyard-mc.com\/#organization","name":"Vineyard Management Consulting GmbH","url":"https:\/\/vineyard-mc.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/vineyard-mc.com\/#\/schema\/logo\/image\/","url":"https:\/\/vineyard-mc.com\/wp-content\/uploads\/2021\/03\/VMC-Logo_1.jpg","contentUrl":"https:\/\/vineyard-mc.com\/wp-content\/uploads\/2021\/03\/VMC-Logo_1.jpg","width":506,"height":665,"caption":"Vineyard Management Consulting GmbH"},"image":{"@id":"https:\/\/vineyard-mc.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/de.linkedin.com\/company\/vineyard-management-consulting-gmbh"]},{"@type":"Person","@id":"https:\/\/vineyard-mc.com\/#\/schema\/person\/7c414ddacefc6059b34cc6cfc48f9bbd","name":"Laura Dinis","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/58400af0f53e7c9b1827cfdd763ebe76d852c3113f4682c4d26277beb7e7a8b8?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/58400af0f53e7c9b1827cfdd763ebe76d852c3113f4682c4d26277beb7e7a8b8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/58400af0f53e7c9b1827cfdd763ebe76d852c3113f4682c4d26277beb7e7a8b8?s=96&d=mm&r=g","caption":"Laura Dinis"},"url":"https:\/\/vineyard-mc.com\/en\/author\/laura-dinis\/"}]}},"_links":{"self":[{"href":"https:\/\/vineyard-mc.com\/en\/wp-json\/wp\/v2\/posts\/988810","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vineyard-mc.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vineyard-mc.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vineyard-mc.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/vineyard-mc.com\/en\/wp-json\/wp\/v2\/comments?post=988810"}],"version-history":[{"count":6,"href":"https:\/\/vineyard-mc.com\/en\/wp-json\/wp\/v2\/posts\/988810\/revisions"}],"predecessor-version":[{"id":988849,"href":"https:\/\/vineyard-mc.com\/en\/wp-json\/wp\/v2\/posts\/988810\/revisions\/988849"}],"wp:attachment":[{"href":"https:\/\/vineyard-mc.com\/en\/wp-json\/wp\/v2\/media?parent=988810"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vineyard-mc.com\/en\/wp-json\/wp\/v2\/categories?post=988810"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vineyard-mc.com\/en\/wp-json\/wp\/v2\/tags?post=988810"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}