{"id":891,"date":"2019-07-09T14:12:18","date_gmt":"2019-07-09T12:12:18","guid":{"rendered":"http:\/\/elementor.itaf.eu\/?p=891"},"modified":"2025-02-24T16:46:33","modified_gmt":"2025-02-24T15:46:33","slug":"the-future-of-protection-against-cyber-attacks","status":"publish","type":"post","link":"https:\/\/www.itaf.eu\/en\/the-future-of-protection-against-cyber-attacks\/","title":{"rendered":"The future of protection against cyber attacks"},"content":{"rendered":"<p>The year behind us has brought a number of surprises for IT security industry employees, from the resurgence of destructive ransomware attacks, the IoT botnet, and malware for mobile devices, to sophisticated multilevel attacks. Cyber attacks evolve \u2013 today\u2019s and future challenges cannot be compared with those we met in the past, therefore, the future of protection against cyber attacks is very important.<\/p>\n<h2>IoT Technology<\/h2>\n<p>Mobile computers enable us to perform all our business activities in the same way, whether we are in or out of the corporate network. That\u2019s where we get help from smartphones, tablets, and cloud infrastructure, which provides exceptional capabilities in terms of the availability of information. On the other hand, <a class=\"jshlink\" href=\"https:\/\/en.wikipedia.org\/wiki\/Internet_of_things\">IoT technology<\/a> has become a reality, and with it has increased the number of devices available on the Internet (cameras, home appliances, etc.), forming a botnet network of huge proportions that needs to be controlled and protected against cyber attacks.<\/p>\n<h2>Generations of Cyber Attacks<\/h2>\n<p>Cyber attacks today are among the three major risk factors that can severely shake the world\u2019s economy. Chronologically, the evolution of these attacks can be divided into four generations.<br \/>\nThe first generation of cyber attacks appeared in the early 1980s, with the emergence of the first personal computers, and with them the first computer viruses. The viruses were spread over floppy disks, and hackers wrote them out of curiosity or entertainment. In response to them, today we have developed effective antivirus solutions.<\/p>\n<p>The second generation started in the early nineties with the beginning of massive networking. An increasing number of computers were connected to the Internet for the purpose of mutual communication and information sharing. However, access to the Internet was also a potential threat due to exposure. In response, firewall protection solutions have emerged. A firewall represents a barrier between a computer and an internet network, and it controls who can access your computer or network.<\/p>\n<p>The third generation of cyber attacks started to evolve from the beginning of the 21st century when the hackers realized that those attacks could earn them money. They started to organize themselves much better and deploy more sophisticated attacks. With these attacks, they started to target security flaws in applications and operating systems on user computers. In response to these challenges, IPS solutions have emerged, designed to protect us from security failures in applications.<\/p>\n<p>In early 2010, cyber-attacks further advanced. With the arrival of the fourth generation of cyber attacks, the malware becomes extremely sophisticated and for the first time, we were faced with cases where hacker attacks were sponsored by states or large organizations. The attacks are planned in detail and social engineering was used to analyze the victims. Malicious code is hidden in seemingly regular documents (Word, Excel, JPG, or PDF files) that each of our downloads from the Internet or via e-mail and is activated by starting the document. In response, sandbox solutions appeared, which have the ability to intercept the documents we are downloading. These devices receive and run the received files in a virtual environment. In case that they detect any activity that could endanger the network, the files are declared malicious and are rejected. This prevents the possibility of executing malicious code in your network.<\/p>\n<h2>Centralized management<\/h2>\n<p>Having in mind the current development of cyberattacks, we must think about the future of protection against cyber attacks. The number of attacks has increased significantly (IoT, smartphones, laptops, clouds), so the fifth generation of cyber attacks will make mega-attacks. How to protect yourself and your business from them? One thing is certain: we need a <a class=\"jshlink\" href=\"\/en\/managed-security-services\/\">consolidated security solution with centralized management<\/a>, which has the ability to detect a wide range of cyberattacks, whether they come via IoT devices, mobile phones, clouds, or any other attack space.<\/p>\n<h2>How can ITAF help you?<\/h2>\n<p>If you need help with protecting your business and your brand, <a class=\"jshlink\" href=\"\/en\/contact-us\/#contactform\">Contact ITAF<\/a>. Our experienced security experts can help you with installing and maintaining some of the most effective protection against any security risks, training your employees, and helping to defend your business from the lasting effects of hacking attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The year behind us has brought a number of surprises for IT security industry employees, from the resurgence of destructive ransomware attacks, the IoT botnet, and malware for mobile devices, to sophisticated multilevel attacks. Cyber attacks evolve \u2013 today\u2019s and future challenges cannot be compared with those we met in the past, therefore, the future [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":35295,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ngg_post_thumbnail":0,"footnotes":""},"categories":[96],"tags":[],"class_list":["post-891","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The future of protection against cyber attacks - ITAF IT Partner<\/title>\n<meta name=\"description\" content=\"Cyberattacks evolve, Today\u2019s cannot be compared with those in the past. Let&#039;s break down the furure of protection against cyber attacks\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.itaf.eu\/en\/the-future-of-protection-against-cyber-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The future of protection against cyber attacks - ITAF IT Partner\" \/>\n<meta property=\"og:description\" content=\"Cyberattacks evolve, Today\u2019s cannot be compared with those in the past. Let&#039;s break down the furure of protection against cyber attacks\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.itaf.eu\/en\/the-future-of-protection-against-cyber-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"ITAF IT Partner\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ITAF.eu\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-09T12:12:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-24T15:46:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.itaf.eu\/wp-content\/uploads\/2019\/07\/future-of-protec-cyber-attack-itaf.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dejan Janosevic\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ITAF_IT_partner\" \/>\n<meta name=\"twitter:site\" content=\"@ITAF_IT_partner\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dejan Janosevic\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/the-future-of-protection-against-cyber-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/the-future-of-protection-against-cyber-attacks\\\/\"},\"author\":{\"name\":\"Dejan Janosevic\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#\\\/schema\\\/person\\\/76d18fd2e3c2d369c9b20b96217208c2\"},\"headline\":\"The future of protection against cyber attacks\",\"datePublished\":\"2019-07-09T12:12:18+00:00\",\"dateModified\":\"2025-02-24T15:46:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/the-future-of-protection-against-cyber-attacks\\\/\"},\"wordCount\":689,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/the-future-of-protection-against-cyber-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/future-of-protec-cyber-attack-itaf.jpg\",\"articleSection\":[\"IT Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.itaf.eu\\\/en\\\/the-future-of-protection-against-cyber-attacks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/the-future-of-protection-against-cyber-attacks\\\/\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/the-future-of-protection-against-cyber-attacks\\\/\",\"name\":\"The future of protection against cyber attacks - ITAF IT Partner\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/the-future-of-protection-against-cyber-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/the-future-of-protection-against-cyber-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/future-of-protec-cyber-attack-itaf.jpg\",\"datePublished\":\"2019-07-09T12:12:18+00:00\",\"dateModified\":\"2025-02-24T15:46:33+00:00\",\"description\":\"Cyberattacks evolve, Today\u2019s cannot be compared with those in the past. Let's break down the furure of protection against cyber attacks\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/the-future-of-protection-against-cyber-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.itaf.eu\\\/en\\\/the-future-of-protection-against-cyber-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/the-future-of-protection-against-cyber-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/future-of-protec-cyber-attack-itaf.jpg\",\"contentUrl\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/future-of-protec-cyber-attack-itaf.jpg\",\"width\":1080,\"height\":600,\"caption\":\"The future of protection against cyber attacks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/the-future-of-protection-against-cyber-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The future of protection against cyber attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/\",\"name\":\"ITAF IT Partner\",\"description\":\"Reliable IT support\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#organization\",\"name\":\"ITAF is een IT partner voor KMO's, grote bedrijven en overheid: IT support, ICT infrastructuur, Cloud oplossingen, Managed IT services en software ontwikkeling\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/ITAF-Geniki_logo_512px-1.webp\",\"contentUrl\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/ITAF-Geniki_logo_512px-1.webp\",\"width\":512,\"height\":166,\"caption\":\"ITAF is een IT partner voor KMO's, grote bedrijven en overheid: IT support, ICT infrastructuur, Cloud oplossingen, Managed IT services en software ontwikkeling\"},\"image\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ITAF.eu\",\"https:\\\/\\\/x.com\\\/ITAF_IT_partner\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/itaf-eu?trk=tyah&trkInfo=clickedVerticalcompanyidx2-2-7tarId1429703363595tasitaf\",\"https:\\\/\\\/www.youtube.com\\\/@ITAFICTPartner\\\/\",\"https:\\\/\\\/www.instagram.com\\\/itaf.eu\\\/\",\"https:\\\/\\\/www.threads.net\\\/@itaf.eu\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#\\\/schema\\\/person\\\/76d18fd2e3c2d369c9b20b96217208c2\",\"name\":\"Dejan Janosevic\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/author\\\/dejan-janosevic\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The future of protection against cyber attacks - ITAF IT Partner","description":"Cyberattacks evolve, Today\u2019s cannot be compared with those in the past. Let's break down the furure of protection against cyber attacks","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.itaf.eu\/en\/the-future-of-protection-against-cyber-attacks\/","og_locale":"en_US","og_type":"article","og_title":"The future of protection against cyber attacks - ITAF IT Partner","og_description":"Cyberattacks evolve, Today\u2019s cannot be compared with those in the past. Let's break down the furure of protection against cyber attacks","og_url":"https:\/\/www.itaf.eu\/en\/the-future-of-protection-against-cyber-attacks\/","og_site_name":"ITAF IT Partner","article_publisher":"https:\/\/www.facebook.com\/ITAF.eu","article_published_time":"2019-07-09T12:12:18+00:00","article_modified_time":"2025-02-24T15:46:33+00:00","og_image":[{"width":1080,"height":600,"url":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2019\/07\/future-of-protec-cyber-attack-itaf.jpg","type":"image\/jpeg"}],"author":"Dejan Janosevic","twitter_card":"summary_large_image","twitter_creator":"@ITAF_IT_partner","twitter_site":"@ITAF_IT_partner","twitter_misc":{"Written by":"Dejan Janosevic","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.itaf.eu\/en\/the-future-of-protection-against-cyber-attacks\/#article","isPartOf":{"@id":"https:\/\/www.itaf.eu\/en\/the-future-of-protection-against-cyber-attacks\/"},"author":{"name":"Dejan Janosevic","@id":"https:\/\/www.itaf.eu\/en\/#\/schema\/person\/76d18fd2e3c2d369c9b20b96217208c2"},"headline":"The future of protection against cyber attacks","datePublished":"2019-07-09T12:12:18+00:00","dateModified":"2025-02-24T15:46:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.itaf.eu\/en\/the-future-of-protection-against-cyber-attacks\/"},"wordCount":689,"commentCount":0,"publisher":{"@id":"https:\/\/www.itaf.eu\/en\/#organization"},"image":{"@id":"https:\/\/www.itaf.eu\/en\/the-future-of-protection-against-cyber-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2019\/07\/future-of-protec-cyber-attack-itaf.jpg","articleSection":["IT Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.itaf.eu\/en\/the-future-of-protection-against-cyber-attacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.itaf.eu\/en\/the-future-of-protection-against-cyber-attacks\/","url":"https:\/\/www.itaf.eu\/en\/the-future-of-protection-against-cyber-attacks\/","name":"The future of protection against cyber attacks - ITAF IT Partner","isPartOf":{"@id":"https:\/\/www.itaf.eu\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.itaf.eu\/en\/the-future-of-protection-against-cyber-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.itaf.eu\/en\/the-future-of-protection-against-cyber-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2019\/07\/future-of-protec-cyber-attack-itaf.jpg","datePublished":"2019-07-09T12:12:18+00:00","dateModified":"2025-02-24T15:46:33+00:00","description":"Cyberattacks evolve, Today\u2019s cannot be compared with those in the past. Let's break down the furure of protection against cyber attacks","breadcrumb":{"@id":"https:\/\/www.itaf.eu\/en\/the-future-of-protection-against-cyber-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.itaf.eu\/en\/the-future-of-protection-against-cyber-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.itaf.eu\/en\/the-future-of-protection-against-cyber-attacks\/#primaryimage","url":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2019\/07\/future-of-protec-cyber-attack-itaf.jpg","contentUrl":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2019\/07\/future-of-protec-cyber-attack-itaf.jpg","width":1080,"height":600,"caption":"The future of protection against cyber attacks"},{"@type":"BreadcrumbList","@id":"https:\/\/www.itaf.eu\/en\/the-future-of-protection-against-cyber-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.itaf.eu\/en\/"},{"@type":"ListItem","position":2,"name":"The future of protection against cyber attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.itaf.eu\/en\/#website","url":"https:\/\/www.itaf.eu\/en\/","name":"ITAF IT Partner","description":"Reliable IT support","publisher":{"@id":"https:\/\/www.itaf.eu\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.itaf.eu\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.itaf.eu\/en\/#organization","name":"ITAF is een IT partner voor KMO's, grote bedrijven en overheid: IT support, ICT infrastructuur, Cloud oplossingen, Managed IT services en software ontwikkeling","url":"https:\/\/www.itaf.eu\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.itaf.eu\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2026\/02\/ITAF-Geniki_logo_512px-1.webp","contentUrl":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2026\/02\/ITAF-Geniki_logo_512px-1.webp","width":512,"height":166,"caption":"ITAF is een IT partner voor KMO's, grote bedrijven en overheid: IT support, ICT infrastructuur, Cloud oplossingen, Managed IT services en software ontwikkeling"},"image":{"@id":"https:\/\/www.itaf.eu\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ITAF.eu","https:\/\/x.com\/ITAF_IT_partner","https:\/\/www.linkedin.com\/company\/itaf-eu?trk=tyah&trkInfo=clickedVerticalcompanyidx2-2-7tarId1429703363595tasitaf","https:\/\/www.youtube.com\/@ITAFICTPartner\/","https:\/\/www.instagram.com\/itaf.eu\/","https:\/\/www.threads.net\/@itaf.eu"]},{"@type":"Person","@id":"https:\/\/www.itaf.eu\/en\/#\/schema\/person\/76d18fd2e3c2d369c9b20b96217208c2","name":"Dejan Janosevic","url":"https:\/\/www.itaf.eu\/en\/author\/dejan-janosevic\/"}]}},"_links":{"self":[{"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/posts\/891","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/comments?post=891"}],"version-history":[{"count":2,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/posts\/891\/revisions"}],"predecessor-version":[{"id":35299,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/posts\/891\/revisions\/35299"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/media\/35295"}],"wp:attachment":[{"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/media?parent=891"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/categories?post=891"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/tags?post=891"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}