{"id":2643,"date":"2017-08-01T09:00:33","date_gmt":"2017-08-01T16:00:33","guid":{"rendered":"https:\/\/cm-edgetun.pages.dev\/industry\/blog\/uncategorized\/the-case-for-digital-identity-opening-new-fronts-against-cybercrime\/"},"modified":"2023-05-31T16:29:37","modified_gmt":"2023-05-31T23:29:37","slug":"the-case-for-digital-identity-opening-new-fronts-against-cybercrime","status":"publish","type":"post","link":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/financial-services\/2017\/08\/01\/the-case-for-digital-identity-opening-new-fronts-against-cybercrime\/","title":{"rendered":"The case for digital identity: opening new fronts against cybercrime"},"content":{"rendered":"<p>Financial institutions understand the importance that identity management plays in their security models. But even the most onerous security protocols are rendered pointless when a case of mistaken, or forged, identity allows someone to walk in through the digital front door.<\/p>\n<p>New technological breakthroughs, such as AI, predictive analytics, and blockchain are opening up many new possibilities for the concepts of identity and identity management. Field-tested solutions to an age-old problem have now reached an enterprise-ready state and will be on the frontlines in the continual battle over cybersecurity.<\/p>\n<p>The current systems and identification techniques have been insecure for many decades. Physical cards can be counterfeited, and passwords can be cracked. Even biometric identifiers, like fingerprints, are not perfectly secure. But technological advances have not only helped empower institutions, but have also enabled those who seek to circumvent defenses or conceal their identities for elicit purposes. So how do banks control access to a trusted network when dealing with an outside party?<\/p>\n<p><strong>Identity and access control reconsidered<\/strong><\/p>\n<p>Traditionally, financial institutions have relied on two-factor authentication. Though not perfect, combining authentication factors is many orders of magnitude more secure than either alone. But why stop at two, or three? Each additional layer of authentication makes the system orders of magnitude more secure.<\/p>\n<p>The main limitation is physical: identification and bank cards contain a finite amount of information, a constraint that is no longer applicable in our digital era. Consider how the following innovations\u2014made possible with the scale and power of the cloud\u2014potentially change the game:<\/p>\n<ul>\n<li><strong>A system with memory. <\/strong>Imagine an authentication system that not only used the three primary identity components\u2014knowledge factors (such as a password), possession factors (like a bank card), and inherence factors (biometrics)\u2014but also maintains a historical record of each, generating additional context around every interaction.<\/li>\n<li><strong>Combinatorial improvements. <\/strong>Leveraging technology, like biometrics, and AI, in combination with blockchain can provide an immutable and truly unique identifier. Adding a secure, cloud-based, component would also provide additional computing power for behavior analysis, resulting in a much more agile platform\u2013reducing security risks while offering greater agility.<\/li>\n<li><strong>A fourth identity component. <\/strong>The combination of cognitive computing, predictive analytics, and the context derived from an immutable record introduces a fourth identity component: <em>what a person does<\/em>. The fourth component, the attributes of an individual\u2019s digital activity recorded in an immutable blockchain, can add even more unique possibilities and identifiers.<\/li>\n<\/ul>\n<p><strong>New models of identity management<\/strong><\/p>\n<p>As these concepts of identity management take hold in real-world applications, we will see significant improvements in the security of digital systems. In fact, we\u2019re already seeing the outlines of this future today, with new models of identity management based on cloud solutions:<\/p>\n<ul>\n<li><strong>Identity as the new perimeter. <\/strong>Many traditional security measures focus on securing devices or adding more firewalls. Microsoft provides solutions that enable financial institutions to secure corporate identities and use machine learning to detect and defend against cyberattacks. Microsoft processes 450 billion authentications per month and from our cloud telemetry we have acquired unique <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/security\/intelligence\" target=\"_blank\" rel=\"noopener\">threat intelligence<\/a> that financial institutions can leverage for their protection.<\/li>\n<li><strong>Greater security through distribution.<\/strong> The repositories for corporate identities are compelling targets for cyberattacks. Part of the solution is to distribute and secure those identities separately. Microsoft is working with several organizations (Accenture, RSA, and others) to build an open source <a href=\"https:\/\/decentralized-identity.github.io\/\" target=\"_blank\" rel=\"noopener\">Distributed Identity Framework<\/a>, in which the storage of identities is decentralized but secured by blockchain. This framework is being developed as part of the <a href=\"http:\/\/id2020.org\/\" target=\"_blank\" rel=\"noopener\">ID2020 initiative<\/a> to enable refugees to register their identity with biometrics and own and manage their identity.<\/li>\n<\/ul>\n<p><em>\u00a0<\/em><em>At Microsoft, our approach applies technology in unique ways\u2014with a trusted cloud platform, tools, and services that empower business agility and enable a new vision of cybersecurity for the industry. As your trusted technology partner, we offer both industry know-how and enterprise-grade solutions. We can help no matter where you are on your digital transformation roadmap.\u00a0 Download our whitepaper to read <a href=\"https:\/\/info.microsoft.com\/Enterprise_EN-US_FinServ_DigitalBankWP_RegistrationPage.html?ls=Website&amp;lsd=eam_corp_en-us_vnext_banking\" target=\"_blank\" rel=\"noopener\">Microsoft&#8217;s perspectives on the digital bank<\/a>.\u00a0<\/em><\/p>\n<p><b>Follow us <\/b><a href=\"https:\/\/twitter.com\/msftfinserv\" target=\"_blank\" rel=\"noopener\"><b>@msftfinserv<\/b><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft technologies like AI, predictive analytics, and blockchain are opening up many new possibilities for the concepts of identity and identity management.<\/p>\n","protected":false},"author":85,"featured_media":10517,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"categories":[1523],"post_tag":[],"content-type":[1483],"coauthors":[1264],"class_list":["post-2643","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-financial-services","content-type-thought-leadership"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The case for digital identity: opening new fronts against cybercrime - Microsoft Industry Blogs<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/financial-services\/2017\/08\/01\/the-case-for-digital-identity-opening-new-fronts-against-cybercrime\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The case for digital identity: opening new fronts against cybercrime - Microsoft Industry Blogs\" \/>\n<meta property=\"og:description\" content=\"Microsoft technologies like AI, predictive analytics, and blockchain are opening up many new possibilities for the concepts of identity and identity management.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/financial-services\/2017\/08\/01\/the-case-for-digital-identity-opening-new-fronts-against-cybercrime\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Industry Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2017-08-01T16:00:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-31T23:29:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2017\/07\/new-vision-cybersecurity-blog-1_code.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Daragh Morrissey\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 min read\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/financial-services\/2017\/08\/01\/the-case-for-digital-identity-opening-new-fronts-against-cybercrime\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/financial-services\/2017\/08\/01\/the-case-for-digital-identity-opening-new-fronts-against-cybercrime\/\"},\"author\":[{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/author\/daragh-morrissey\/\",\"@type\":\"Person\",\"@name\":\"Daragh Morrissey\"}],\"headline\":\"The case for digital identity: opening new fronts against cybercrime\",\"datePublished\":\"2017-08-01T16:00:33+00:00\",\"dateModified\":\"2023-05-31T23:29:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/financial-services\/2017\/08\/01\/the-case-for-digital-identity-opening-new-fronts-against-cybercrime\/\"},\"wordCount\":679,\"publisher\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/financial-services\/2017\/08\/01\/the-case-for-digital-identity-opening-new-fronts-against-cybercrime\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2017\/07\/new-vision-cybersecurity-blog-1_code.jpg\",\"articleSection\":[\"Financial services\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/financial-services\/2017\/08\/01\/the-case-for-digital-identity-opening-new-fronts-against-cybercrime\/\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/financial-services\/2017\/08\/01\/the-case-for-digital-identity-opening-new-fronts-against-cybercrime\/\",\"name\":\"The case for digital identity: opening new fronts against cybercrime - Microsoft Industry Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/financial-services\/2017\/08\/01\/the-case-for-digital-identity-opening-new-fronts-against-cybercrime\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/financial-services\/2017\/08\/01\/the-case-for-digital-identity-opening-new-fronts-against-cybercrime\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2017\/07\/new-vision-cybersecurity-blog-1_code.jpg\",\"datePublished\":\"2017-08-01T16:00:33+00:00\",\"dateModified\":\"2023-05-31T23:29:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/financial-services\/2017\/08\/01\/the-case-for-digital-identity-opening-new-fronts-against-cybercrime\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/financial-services\/2017\/08\/01\/the-case-for-digital-identity-opening-new-fronts-against-cybercrime\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/financial-services\/2017\/08\/01\/the-case-for-digital-identity-opening-new-fronts-against-cybercrime\/#primaryimage\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2017\/07\/new-vision-cybersecurity-blog-1_code.jpg\",\"contentUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2017\/07\/new-vision-cybersecurity-blog-1_code.jpg\",\"width\":960,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/financial-services\/2017\/08\/01\/the-case-for-digital-identity-opening-new-fronts-against-cybercrime\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The case for digital identity: opening new fronts against cybercrime\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#website\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/\",\"name\":\"Microsoft Industry Blogs\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization\",\"name\":\"Microsoft Industry Blogs\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"contentUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"width\":259,\"height\":194,\"caption\":\"Microsoft Industry Blogs\"},\"image\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The case for digital identity: opening new fronts against cybercrime - Microsoft Industry Blogs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/financial-services\/2017\/08\/01\/the-case-for-digital-identity-opening-new-fronts-against-cybercrime\/","og_locale":"en_US","og_type":"article","og_title":"The case for digital identity: opening new fronts against cybercrime - Microsoft Industry Blogs","og_description":"Microsoft technologies like AI, predictive analytics, and blockchain are opening up many new possibilities for the concepts of identity and identity management.","og_url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/financial-services\/2017\/08\/01\/the-case-for-digital-identity-opening-new-fronts-against-cybercrime\/","og_site_name":"Microsoft Industry Blogs","article_published_time":"2017-08-01T16:00:33+00:00","article_modified_time":"2023-05-31T23:29:37+00:00","og_image":[{"width":960,"height":300,"url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2017\/07\/new-vision-cybersecurity-blog-1_code.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Daragh Morrissey","Est. reading time":"3 min read"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/financial-services\/2017\/08\/01\/the-case-for-digital-identity-opening-new-fronts-against-cybercrime\/#article","isPartOf":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/financial-services\/2017\/08\/01\/the-case-for-digital-identity-opening-new-fronts-against-cybercrime\/"},"author":[{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/author\/daragh-morrissey\/","@type":"Person","@name":"Daragh Morrissey"}],"headline":"The case for digital identity: opening new fronts against cybercrime","datePublished":"2017-08-01T16:00:33+00:00","dateModified":"2023-05-31T23:29:37+00:00","mainEntityOfPage":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/financial-services\/2017\/08\/01\/the-case-for-digital-identity-opening-new-fronts-against-cybercrime\/"},"wordCount":679,"publisher":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/financial-services\/2017\/08\/01\/the-case-for-digital-identity-opening-new-fronts-against-cybercrime\/#primaryimage"},"thumbnailUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2017\/07\/new-vision-cybersecurity-blog-1_code.jpg","articleSection":["Financial services"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/financial-services\/2017\/08\/01\/the-case-for-digital-identity-opening-new-fronts-against-cybercrime\/","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/financial-services\/2017\/08\/01\/the-case-for-digital-identity-opening-new-fronts-against-cybercrime\/","name":"The case for digital identity: opening new fronts against cybercrime - Microsoft Industry Blogs","isPartOf":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/financial-services\/2017\/08\/01\/the-case-for-digital-identity-opening-new-fronts-against-cybercrime\/#primaryimage"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/financial-services\/2017\/08\/01\/the-case-for-digital-identity-opening-new-fronts-against-cybercrime\/#primaryimage"},"thumbnailUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2017\/07\/new-vision-cybersecurity-blog-1_code.jpg","datePublished":"2017-08-01T16:00:33+00:00","dateModified":"2023-05-31T23:29:37+00:00","breadcrumb":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/financial-services\/2017\/08\/01\/the-case-for-digital-identity-opening-new-fronts-against-cybercrime\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/financial-services\/2017\/08\/01\/the-case-for-digital-identity-opening-new-fronts-against-cybercrime\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/financial-services\/2017\/08\/01\/the-case-for-digital-identity-opening-new-fronts-against-cybercrime\/#primaryimage","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2017\/07\/new-vision-cybersecurity-blog-1_code.jpg","contentUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2017\/07\/new-vision-cybersecurity-blog-1_code.jpg","width":960,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/financial-services\/2017\/08\/01\/the-case-for-digital-identity-opening-new-fronts-against-cybercrime\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/"},{"@type":"ListItem","position":2,"name":"The case for digital identity: opening new fronts against cybercrime"}]},{"@type":"WebSite","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#website","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/","name":"Microsoft Industry Blogs","description":"","publisher":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization","name":"Microsoft Industry Blogs","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","contentUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","width":259,"height":194,"caption":"Microsoft Industry Blogs"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#\/schema\/logo\/image\/"}}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Industry Blogs","distributor_original_site_url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts\/2643","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/users\/85"}],"replies":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/comments?post=2643"}],"version-history":[{"count":0,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts\/2643\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/media\/10517"}],"wp:attachment":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/media?parent=2643"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/categories?post=2643"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/post_tag?post=2643"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/content-type?post=2643"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/coauthors?post=2643"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}