{"id":22382,"date":"2026-01-21T17:05:17","date_gmt":"2026-01-21T16:05:17","guid":{"rendered":"https:\/\/www.transparentedge.eu\/en\/blog\/"},"modified":"2026-01-22T10:26:52","modified_gmt":"2026-01-22T09:26:52","slug":"leading-the-cybersecurity-conversation-not-being-a-technician","status":"publish","type":"post","link":"https:\/\/www.transparentedge.eu\/en\/blog\/leading-the-cybersecurity-conversation-not-being-a-technician\/","title":{"rendered":"Leading the cybersecurity conversation not being a technician"},"content":{"rendered":"\n<p>The complex network of dependencies that make up the web value chain has become the new vulnerability. We tend to fortify the core of our infrastructure, but we leave the backdoors open: that entire network of third-party libraries and services that underpins the modern web. A single weakness can translate into an operational, financial, and reputational impact from which it is very difficult to recover.<\/p>\n\n\n\n<p>The World Economic Forum summarizes it clearly in its: <a href=\"https:\/\/reports.weforum.org\/docs\/WEF_Global_Cybersecurity_Outlook_2026.pdf\">Global Cybersecurity Outlook 2026<\/a>:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>&#8220;Cybersecurity is no longer just a technical issue; it is increasingly becoming a strategic economic priority. Decisions about how much to invest in protecting digital assets have become financial choices that shape an organization\u2019s resilience, competitiveness and growth trajectory.&#8221;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">8 keys to cybersecurity governance<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">1. <strong>Risk of concentration and technological dependence<\/strong><\/h3>\n\n\n\n<p>Evaluate how many critical processes depend on a single vendor, technology, or legal jurisdiction, and what the implications would be of a prolonged disruption, regulatory change, or geopolitical restriction. The central question is the degree of effective control over data, traffic, and digital operations when critical services rely on external infrastructure (cloud, CDN, payment gateways, etc.).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2.\u00a0 <strong>Web supply chain audit<\/strong><\/h3>\n\n\n\n<p>It&#8217;s not enough to be secure; we must know the level of exposure our suppliers introduce, as recently happened in the case of Endesa (more information here). It&#8217;s necessary to periodically assess third-party risk to prevent an external vulnerability from becoming our own problem. Regulatory changes, sanctions, or geopolitical conflicts can affect key suppliers.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3.\u00a0 <strong>Training, and more training<\/strong><\/h3>\n\n\n\n<p>The human factor remains the weak link where credentials are compromised. Are we fostering a safety culture that resonates with employees? Training in good operating practices is vital.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. \u00a0 <strong>Visibility of critical assets<\/strong><\/h3>\n\n\n\n<p>Maintaining an up-to-date inventory of digital assets (websites, applications, APIs, etc.) and understanding their security status is essential. Implementing strict identity management and least privilege policies is key to limiting the impact of any incident.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5.\u00a0 <strong>Resilience and contingency planning<\/strong><\/h3>\n\n\n\n<p>The first step is to acknowledge that there&#8217;s a paradigm shift, and the question &#8220;<em>Will we be attacked?<\/em>&#8221; has become &#8220;<em>How long will it take us to return to normal operations after an incident?<\/em>&#8221; <a href=\"https:\/\/en.wikipedia.org\/wiki\/IT_disaster_recovery#Recovery_Time_Objective\">Recovery Time Objective (RTO)<\/a>, service degradation, and revenue loss must be treated as business metrics and integrated into the dashboard.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6.\u00a0 <strong>Proactive vulnerability management<\/strong><\/h3>\n\n\n\n<p>Patching and bug detection in web applications should be an automated process prioritized according to business risk, not a pending task accumulating in the backlog.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">7.\u00a0 <strong>Regulatory compliance<\/strong><\/h3>\n\n\n\n<p>Implementing <a href=\"https:\/\/www.transparentedge.eu\/blog\/nis2-directive\/\">NIS2<\/a> and other regulations to strengthen resilience is necessary beyond formal compliance to build resilience.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">8.\u00a0 <strong>Alignment with the economic strategy<\/strong><\/h3>\n\n\n\n<p>Investment in cybersecurity should be evaluated based on its ability to protect economic value and reputation. According to the <a href=\"https:\/\/www.weforum.org\/\">World Economic Forum<\/a>, &#8220;<em>The organizations that thrive will be those that recognize cyber resilience as a shared, strategic responsibility \u2013 one that underpins trust, enables innovation and safeguards the interconnected foundations of global society<\/em>&#8220;. Clear scenarios allow us to see clearly what is being protected, what risk is being accepted, and what the impact of a relevant disruption would be on revenue, costs, and confidence.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Strategic responsibility<\/h2>\n\n\n\n<p>Anticipating these scenarios is part of strategic responsibility. Organizations that thrive in this context will be those whose boards of directors integrate these decisions into the core of their strategy, with clear priorities and a long-term vision.<\/p>\n\n\n\n<p>This is where architecture, digital supply chain design, traffic management, and security make all the difference and improve responsiveness to disruptions with economic impact.<\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>8 keys to achieving cybersecurity governance explained for those who lead an organization without a technical background.<\/p>\n","protected":false},"author":18,"featured_media":22379,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[7],"tags":[],"class_list":["post-22382","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Leading the cybersecurity conversation not being a technician - Transparent Edge<\/title>\n<meta name=\"description\" content=\"Eight keys to achieving cybersecurity governance explained for those who lead an organization without a technical background.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.transparentedge.eu\/blog\/leading-the-cybersecurity-conversation-not-being-a-technician\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Leading the cybersecurity conversation not being a technician - Transparent Edge\" \/>\n<meta property=\"og:description\" content=\"Eight keys to achieving cybersecurity governance explained for those who lead an organization without a technical background.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.transparentedge.eu\/blog\/leading-the-cybersecurity-conversation-not-being-a-technician\/\" \/>\n<meta property=\"og:site_name\" content=\"Transparent Edge\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-21T16:05:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-22T09:26:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2026\/01\/bits.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1128\" \/>\n\t<meta property=\"og:image:height\" content=\"635\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sonia Ar\u00e9valo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@tedgeservices\" \/>\n<meta name=\"twitter:site\" content=\"@tedgeservices\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/leading-the-cybersecurity-conversation-not-being-a-technician\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/leading-the-cybersecurity-conversation-not-being-a-technician\\\/\"},\"author\":{\"name\":\"Sonia Ar\u00e9valo\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#\\\/schema\\\/person\\\/c5e1c51b2f3403c743346f269ffa07ec\"},\"headline\":\"Leading the cybersecurity conversation not being a technician\",\"datePublished\":\"2026-01-21T16:05:17+00:00\",\"dateModified\":\"2026-01-22T09:26:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/leading-the-cybersecurity-conversation-not-being-a-technician\\\/\"},\"wordCount\":578,\"publisher\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/leading-the-cybersecurity-conversation-not-being-a-technician\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/bits.png\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/leading-the-cybersecurity-conversation-not-being-a-technician\\\/\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/leading-the-cybersecurity-conversation-not-being-a-technician\\\/\",\"name\":\"Leading the cybersecurity conversation not being a technician - Transparent Edge\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/leading-the-cybersecurity-conversation-not-being-a-technician\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/leading-the-cybersecurity-conversation-not-being-a-technician\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/bits.png\",\"datePublished\":\"2026-01-21T16:05:17+00:00\",\"dateModified\":\"2026-01-22T09:26:52+00:00\",\"description\":\"Eight keys to achieving cybersecurity governance explained for those who lead an organization without a technical background.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/leading-the-cybersecurity-conversation-not-being-a-technician\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/leading-the-cybersecurity-conversation-not-being-a-technician\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/leading-the-cybersecurity-conversation-not-being-a-technician\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/bits.png\",\"contentUrl\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/bits.png\",\"width\":1128,\"height\":635},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/leading-the-cybersecurity-conversation-not-being-a-technician\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Leading the cybersecurity conversation not being a technician\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#website\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/\",\"name\":\"Transparent Edge\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#organization\"},\"alternateName\":\"Transparent Edge\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.transparentedge.eu\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#organization\",\"name\":\"Transparent Edge Services\",\"alternateName\":\"Transparent Edge\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/logotipo-cuadrado.jpg\",\"contentUrl\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/logotipo-cuadrado.jpg\",\"width\":1328,\"height\":1180,\"caption\":\"Transparent Edge Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/tedgeservices\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/transparent-edge\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UC5zZoyZmiLGBTAdiFpj2xHA\\\/videos\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#\\\/schema\\\/person\\\/c5e1c51b2f3403c743346f269ffa07ec\",\"name\":\"Sonia Ar\u00e9valo\",\"description\":\"Nada como la sensaci\u00f3n de maravilla e infinitud que se despierta cuando aprendo algo nuevo, cuando descubro cu\u00e1l era la historia y c\u00f3mo funciona algo. Vivo en Madrid hace poco, desarrollo sitios web hace siempre.\",\"sameAs\":[\"https:\\\/\\\/www.transparentedge.eu\\\/\",\"https:\\\/\\\/www.instagram.com\\\/aldeaglobal.web\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/soniaarevalo\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Leading the cybersecurity conversation not being a technician - Transparent Edge","description":"Eight keys to achieving cybersecurity governance explained for those who lead an organization without a technical background.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.transparentedge.eu\/blog\/leading-the-cybersecurity-conversation-not-being-a-technician\/","og_locale":"en_US","og_type":"article","og_title":"Leading the cybersecurity conversation not being a technician - Transparent Edge","og_description":"Eight keys to achieving cybersecurity governance explained for those who lead an organization without a technical background.","og_url":"https:\/\/www.transparentedge.eu\/blog\/leading-the-cybersecurity-conversation-not-being-a-technician\/","og_site_name":"Transparent Edge","article_published_time":"2026-01-21T16:05:17+00:00","article_modified_time":"2026-01-22T09:26:52+00:00","og_image":[{"width":1128,"height":635,"url":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2026\/01\/bits.png","type":"image\/png"}],"author":"Sonia Ar\u00e9valo","twitter_card":"summary_large_image","twitter_creator":"@tedgeservices","twitter_site":"@tedgeservices","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.transparentedge.eu\/blog\/leading-the-cybersecurity-conversation-not-being-a-technician\/#article","isPartOf":{"@id":"https:\/\/www.transparentedge.eu\/blog\/leading-the-cybersecurity-conversation-not-being-a-technician\/"},"author":{"name":"Sonia Ar\u00e9valo","@id":"https:\/\/www.transparentedge.eu\/#\/schema\/person\/c5e1c51b2f3403c743346f269ffa07ec"},"headline":"Leading the cybersecurity conversation not being a technician","datePublished":"2026-01-21T16:05:17+00:00","dateModified":"2026-01-22T09:26:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.transparentedge.eu\/blog\/leading-the-cybersecurity-conversation-not-being-a-technician\/"},"wordCount":578,"publisher":{"@id":"https:\/\/www.transparentedge.eu\/#organization"},"image":{"@id":"https:\/\/www.transparentedge.eu\/blog\/leading-the-cybersecurity-conversation-not-being-a-technician\/#primaryimage"},"thumbnailUrl":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2026\/01\/bits.png","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.transparentedge.eu\/blog\/leading-the-cybersecurity-conversation-not-being-a-technician\/","url":"https:\/\/www.transparentedge.eu\/blog\/leading-the-cybersecurity-conversation-not-being-a-technician\/","name":"Leading the cybersecurity conversation not being a technician - Transparent Edge","isPartOf":{"@id":"https:\/\/www.transparentedge.eu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.transparentedge.eu\/blog\/leading-the-cybersecurity-conversation-not-being-a-technician\/#primaryimage"},"image":{"@id":"https:\/\/www.transparentedge.eu\/blog\/leading-the-cybersecurity-conversation-not-being-a-technician\/#primaryimage"},"thumbnailUrl":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2026\/01\/bits.png","datePublished":"2026-01-21T16:05:17+00:00","dateModified":"2026-01-22T09:26:52+00:00","description":"Eight keys to achieving cybersecurity governance explained for those who lead an organization without a technical background.","breadcrumb":{"@id":"https:\/\/www.transparentedge.eu\/blog\/leading-the-cybersecurity-conversation-not-being-a-technician\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.transparentedge.eu\/blog\/leading-the-cybersecurity-conversation-not-being-a-technician\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.transparentedge.eu\/blog\/leading-the-cybersecurity-conversation-not-being-a-technician\/#primaryimage","url":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2026\/01\/bits.png","contentUrl":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2026\/01\/bits.png","width":1128,"height":635},{"@type":"BreadcrumbList","@id":"https:\/\/www.transparentedge.eu\/blog\/leading-the-cybersecurity-conversation-not-being-a-technician\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.transparentedge.eu\/en\/"},{"@type":"ListItem","position":2,"name":"Leading the cybersecurity conversation not being a technician"}]},{"@type":"WebSite","@id":"https:\/\/www.transparentedge.eu\/#website","url":"https:\/\/www.transparentedge.eu\/","name":"Transparent Edge","description":"","publisher":{"@id":"https:\/\/www.transparentedge.eu\/#organization"},"alternateName":"Transparent Edge","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.transparentedge.eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.transparentedge.eu\/#organization","name":"Transparent Edge Services","alternateName":"Transparent Edge","url":"https:\/\/www.transparentedge.eu\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.transparentedge.eu\/#\/schema\/logo\/image\/","url":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2023\/07\/logotipo-cuadrado.jpg","contentUrl":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2023\/07\/logotipo-cuadrado.jpg","width":1328,"height":1180,"caption":"Transparent Edge Services"},"image":{"@id":"https:\/\/www.transparentedge.eu\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/tedgeservices","https:\/\/www.linkedin.com\/company\/transparent-edge\/","https:\/\/www.youtube.com\/channel\/UC5zZoyZmiLGBTAdiFpj2xHA\/videos"]},{"@type":"Person","@id":"https:\/\/www.transparentedge.eu\/#\/schema\/person\/c5e1c51b2f3403c743346f269ffa07ec","name":"Sonia Ar\u00e9valo","description":"Nada como la sensaci\u00f3n de maravilla e infinitud que se despierta cuando aprendo algo nuevo, cuando descubro cu\u00e1l era la historia y c\u00f3mo funciona algo. Vivo en Madrid hace poco, desarrollo sitios web hace siempre.","sameAs":["https:\/\/www.transparentedge.eu\/","https:\/\/www.instagram.com\/aldeaglobal.web","https:\/\/www.linkedin.com\/in\/soniaarevalo\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/posts\/22382","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/comments?post=22382"}],"version-history":[{"count":4,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/posts\/22382\/revisions"}],"predecessor-version":[{"id":22392,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/posts\/22382\/revisions\/22392"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/media\/22379"}],"wp:attachment":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/media?parent=22382"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/categories?post=22382"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/tags?post=22382"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}