{"id":254,"date":"2021-12-03T18:21:13","date_gmt":"2021-12-03T17:21:13","guid":{"rendered":"https:\/\/www.bitmat.it\/visions\/?p=254"},"modified":"2021-12-03T18:21:13","modified_gmt":"2021-12-03T17:21:13","slug":"hp-cybersecurity-prediction-per-il-2022","status":"publish","type":"post","link":"https:\/\/www.bitmat.it\/visions\/previsioni-per-il-2022\/hp-cybersecurity-prediction-per-il-2022\/","title":{"rendered":"HP: Cybersecurity Prediction per il 2022"},"content":{"rendered":"<p>Mentre il 2021 volge al termine, HP condivide le riflessioni di alcuni esperti e consulenti dell\u2019azienda in merito ai principali rischi in ambito sicurezza.<\/p>\n<p>Dai ransomware pile-on ai TTP della supply chain, exploit di firmware automatizzati e attacchi mirati ai dipendenti che lavorano in modalit\u00e0 ibrida: il panorama delle minacce previste per il 2022 \u00e8 destinato a evolversi a un ritmo preoccupante.<\/p>\n<p><strong>I principali key trend a cui prestare attenzione sono:<\/strong><\/p>\n<ul>\n<li>L\u2019aumento degli attacchi alla supply chain del software potrebbe portare a un pi\u00f9 alto numero di potenziali vittime di alto profilo<\/li>\n<li>Le gang ransomware potrebbero mettere in pericolo molte persone e attuare pratiche di &#8216;pile-on&#8217;<\/li>\n<li>Il potenziamento degli attacchi al firmware indebolir\u00e0 le barriere all\u2019ingresso<br \/>\nIl lavoro ibrido creer\u00e0 maggiori opportunit\u00e0 per attaccare gli utenti<\/li>\n<\/ul>\n<p><em>&#8220;Il passaggio al lavoro ibrido ha generato enormi sfide per le aziende; in base agli ultimi dati, in l\u2019Italia abbiamo registrato numerosi attacchi a enti pubblici, mentre quelli attuati nei confronti di soggetti privati hanno riguardato per lo pi\u00f9 il settore bancario, farmaceutico e sanitario, e dei servizi IT. Secondo un recente report di HP Wolf Security, il volume globale di attacchi informatici \u00e8 aumentato del 238% durante il Covid, periodo nel quale gli hacker hanno preso di mira proprio i dispositivi dei lavoratori da remoto<\/em> &#8211; commenta <strong>Giampiero Savorelli,<\/strong> AD HP Italy -. <em>Per aumentare la sicurezza del workplace le aziende dovranno partire dalla protezione del dispositivo endpoint. Ci\u00f2 richiede device secure-by-design, progettati per essere resilienti e che consentano ai sistemi di essere ripristinati rapidamente quando vengono attaccati, contenendo e neutralizzando le minacce informatiche. Le aziende che sono proattive nell&#8217;adottare un approccio &#8220;protection-first&#8221; per la sicurezza dell&#8217;endpoint saranno un passo avanti ai criminali informatici, assicurando cos\u00ec il futuro del lavoro&#8221;.<\/em><\/p>\n<p><span lang=\"it\">In questo scenario,<\/span><span lang=\"it\">\u00a0<a title=\"URL originale: https:\/\/www.hp.com\/us-en\/security\/endpoint-security-solutions.html?jumpid=va_18a6237081. Fare clic o toccare se si considera attendibile questo collegamento.\" href=\"https:\/\/nam12.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fwww.hp.com%2Fus-en%2Fsecurity%2Fendpoint-security-solutions.html%3Fjumpid%3Dva_18a6237081&amp;data=04%7C01%7CAnnalisa.Bernacchi%40edelman.com%7Cd34b5066dc8a47892a6308d9b4bd737e%7Cb824bfb3918e43c2bb1cdcc1ba40a82b%7C0%7C0%7C637739548053325604%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=2M8lJHlXB0kNimCLWmDmT%2FMALKqYUR%2BNP89vA0zX7WA%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener noreferrer\">HP Wolf Security<\/a>\u00a0<\/span><span lang=\"it\">pu\u00f2 fornire alle aziende il supporto necessario per difendersi dalla moltitudine di nuovi attacchi e rischi che dovranno affrontare nel 2022. Unendo il software hardware-enforced con le funzionalit\u00e0 di sicurezza per gli endpoint leader di settore, HP Wolf Security offre un\u2019ampia difesa e una maggiore protezione, privacy e intelligence sulle minacce, raccogliendo dati sull&#8217;endpoint per aiutare a proteggere l&#8217;azienda nel suo complesso.\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p> HP condivide le riflessioni di alcuni esperti e consulenti dell\u2019azienda in merito ai principali rischi in ambito sicurezza<\/p>\n","protected":false},"author":1,"featured_media":256,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[84],"tags":[91],"class_list":{"0":"post-254","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-previsioni-per-il-2022","8":"tag-hp"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>HP: Cybersecurity Prediction per il 2022 - Previsioni per il 2025<\/title>\n<meta name=\"description\" content=\"HP condivide le riflessioni di alcuni esperti e consulenti dell\u2019azienda in merito ai principali rischi in ambito sicurezza\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bitmat.it\/visions\/previsioni-per-il-2022\/hp-cybersecurity-prediction-per-il-2022\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"HP: Cybersecurity Prediction per il 2022\" \/>\n<meta property=\"og:description\" content=\"HP condivide le riflessioni di alcuni esperti e consulenti dell\u2019azienda in merito ai principali rischi in ambito sicurezza\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bitmat.it\/visions\/previsioni-per-il-2022\/hp-cybersecurity-prediction-per-il-2022\/\" \/>\n<meta property=\"og:site_name\" content=\"Previsioni per il 2025\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/BitMATnews\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/BitMATnews\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-03T17:21:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.bitmat.it\/visions\/files\/2021\/12\/Schermata-2021-12-03-alle-18.20.40.png\" \/>\n\t<meta property=\"og:image:width\" content=\"780\" \/>\n\t<meta property=\"og:image:height\" content=\"776\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Redazione BitMAT\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/BitMATnews\" \/>\n<meta name=\"twitter:site\" content=\"@BitMATnews\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Redazione BitMAT\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.bitmat.it\\\/visions\\\/previsioni-per-il-2022\\\/hp-cybersecurity-prediction-per-il-2022\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.bitmat.it\\\/visions\\\/previsioni-per-il-2022\\\/hp-cybersecurity-prediction-per-il-2022\\\/\"},\"author\":{\"name\":\"Redazione BitMAT\",\"@id\":\"https:\\\/\\\/www.bitmat.it\\\/visions\\\/#\\\/schema\\\/person\\\/4cd1e4627f78f4fbed810748dc1a20d4\"},\"headline\":\"HP: Cybersecurity Prediction per il 2022\",\"datePublished\":\"2021-12-03T17:21:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.bitmat.it\\\/visions\\\/previsioni-per-il-2022\\\/hp-cybersecurity-prediction-per-il-2022\\\/\"},\"wordCount\":363,\"image\":{\"@id\":\"https:\\\/\\\/www.bitmat.it\\\/visions\\\/previsioni-per-il-2022\\\/hp-cybersecurity-prediction-per-il-2022\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.bitmat.it\\\/visions\\\/files\\\/2021\\\/12\\\/Schermata-2021-12-03-alle-18.20.40.png\",\"keywords\":[\"HP\"],\"articleSection\":[\"Previsioni per il 2022\"],\"inLanguage\":\"it-IT\",\"copyrightYear\":\"2021\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/www.bitmat.it\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.bitmat.it\\\/visions\\\/previsioni-per-il-2022\\\/hp-cybersecurity-prediction-per-il-2022\\\/\",\"url\":\"https:\\\/\\\/www.bitmat.it\\\/visions\\\/previsioni-per-il-2022\\\/hp-cybersecurity-prediction-per-il-2022\\\/\",\"name\":\"HP: Cybersecurity Prediction per il 2022 - Previsioni per il 2025\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.bitmat.it\\\/visions\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.bitmat.it\\\/visions\\\/previsioni-per-il-2022\\\/hp-cybersecurity-prediction-per-il-2022\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.bitmat.it\\\/visions\\\/previsioni-per-il-2022\\\/hp-cybersecurity-prediction-per-il-2022\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.bitmat.it\\\/visions\\\/files\\\/2021\\\/12\\\/Schermata-2021-12-03-alle-18.20.40.png\",\"datePublished\":\"2021-12-03T17:21:13+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.bitmat.it\\\/visions\\\/#\\\/schema\\\/person\\\/4cd1e4627f78f4fbed810748dc1a20d4\"},\"description\":\"HP condivide le riflessioni di alcuni esperti e consulenti dell\u2019azienda in merito ai principali rischi in ambito sicurezza\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.bitmat.it\\\/visions\\\/previsioni-per-il-2022\\\/hp-cybersecurity-prediction-per-il-2022\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.bitmat.it\\\/visions\\\/previsioni-per-il-2022\\\/hp-cybersecurity-prediction-per-il-2022\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.bitmat.it\\\/visions\\\/previsioni-per-il-2022\\\/hp-cybersecurity-prediction-per-il-2022\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.bitmat.it\\\/visions\\\/files\\\/2021\\\/12\\\/Schermata-2021-12-03-alle-18.20.40.png\",\"contentUrl\":\"https:\\\/\\\/www.bitmat.it\\\/visions\\\/files\\\/2021\\\/12\\\/Schermata-2021-12-03-alle-18.20.40.png\",\"width\":780,\"height\":776,\"caption\":\"HP\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.bitmat.it\\\/visions\\\/previsioni-per-il-2022\\\/hp-cybersecurity-prediction-per-il-2022\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.bitmat.it\\\/visions\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"HP: Cybersecurity Prediction per il 2022\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.bitmat.it\\\/visions\\\/#website\",\"url\":\"https:\\\/\\\/www.bitmat.it\\\/visions\\\/\",\"name\":\"Previsioni per il 2025\",\"description\":\"Interviste e previsioni per il 2025, ICT, mercati, trend, tecnologie\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.bitmat.it\\\/visions\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.bitmat.it\\\/visions\\\/#\\\/schema\\\/person\\\/4cd1e4627f78f4fbed810748dc1a20d4\",\"name\":\"Redazione BitMAT\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cc68cb64f5606ebc4c95ec5b02440c57fc7d268268e5dd8c1cac7ec09ec07ac9?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cc68cb64f5606ebc4c95ec5b02440c57fc7d268268e5dd8c1cac7ec09ec07ac9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cc68cb64f5606ebc4c95ec5b02440c57fc7d268268e5dd8c1cac7ec09ec07ac9?s=96&d=mm&r=g\",\"caption\":\"Redazione BitMAT\"},\"description\":\"BitMAT Edizioni \u00e8 una casa editrice che ha sede a Milano con una copertura a 360\u00b0 per quanto riguarda la comunicazione rivolta agli specialisti dell'lnformation &amp; Communication Technology.\",\"sameAs\":[\"https:\\\/\\\/www.bitmat.it\\\/\",\"https:\\\/\\\/www.facebook.com\\\/BitMATnews\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/twitter.com\\\/BitMATnews\"],\"url\":\"https:\\\/\\\/www.bitmat.it\\\/visions\\\/author\\\/bitmat\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"HP: Cybersecurity Prediction per il 2022 - Previsioni per il 2025","description":"HP condivide le riflessioni di alcuni esperti e consulenti dell\u2019azienda in merito ai principali rischi in ambito sicurezza","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bitmat.it\/visions\/previsioni-per-il-2022\/hp-cybersecurity-prediction-per-il-2022\/","og_locale":"it_IT","og_type":"article","og_title":"HP: Cybersecurity Prediction per il 2022","og_description":"HP condivide le riflessioni di alcuni esperti e consulenti dell\u2019azienda in merito ai principali rischi in ambito sicurezza","og_url":"https:\/\/www.bitmat.it\/visions\/previsioni-per-il-2022\/hp-cybersecurity-prediction-per-il-2022\/","og_site_name":"Previsioni per il 2025","article_publisher":"http:\/\/www.facebook.com\/BitMATnews","article_author":"https:\/\/www.facebook.com\/BitMATnews","article_published_time":"2021-12-03T17:21:13+00:00","og_image":[{"width":780,"height":776,"url":"https:\/\/www.bitmat.it\/visions\/files\/2021\/12\/Schermata-2021-12-03-alle-18.20.40.png","type":"image\/png"}],"author":"Redazione BitMAT","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/BitMATnews","twitter_site":"@BitMATnews","twitter_misc":{"Scritto da":"Redazione BitMAT","Tempo di lettura stimato":"2 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.bitmat.it\/visions\/previsioni-per-il-2022\/hp-cybersecurity-prediction-per-il-2022\/#article","isPartOf":{"@id":"https:\/\/www.bitmat.it\/visions\/previsioni-per-il-2022\/hp-cybersecurity-prediction-per-il-2022\/"},"author":{"name":"Redazione BitMAT","@id":"https:\/\/www.bitmat.it\/visions\/#\/schema\/person\/4cd1e4627f78f4fbed810748dc1a20d4"},"headline":"HP: Cybersecurity Prediction per il 2022","datePublished":"2021-12-03T17:21:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.bitmat.it\/visions\/previsioni-per-il-2022\/hp-cybersecurity-prediction-per-il-2022\/"},"wordCount":363,"image":{"@id":"https:\/\/www.bitmat.it\/visions\/previsioni-per-il-2022\/hp-cybersecurity-prediction-per-il-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/www.bitmat.it\/visions\/files\/2021\/12\/Schermata-2021-12-03-alle-18.20.40.png","keywords":["HP"],"articleSection":["Previsioni per il 2022"],"inLanguage":"it-IT","copyrightYear":"2021","copyrightHolder":{"@id":"https:\/\/www.bitmat.it\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.bitmat.it\/visions\/previsioni-per-il-2022\/hp-cybersecurity-prediction-per-il-2022\/","url":"https:\/\/www.bitmat.it\/visions\/previsioni-per-il-2022\/hp-cybersecurity-prediction-per-il-2022\/","name":"HP: Cybersecurity Prediction per il 2022 - Previsioni per il 2025","isPartOf":{"@id":"https:\/\/www.bitmat.it\/visions\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.bitmat.it\/visions\/previsioni-per-il-2022\/hp-cybersecurity-prediction-per-il-2022\/#primaryimage"},"image":{"@id":"https:\/\/www.bitmat.it\/visions\/previsioni-per-il-2022\/hp-cybersecurity-prediction-per-il-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/www.bitmat.it\/visions\/files\/2021\/12\/Schermata-2021-12-03-alle-18.20.40.png","datePublished":"2021-12-03T17:21:13+00:00","author":{"@id":"https:\/\/www.bitmat.it\/visions\/#\/schema\/person\/4cd1e4627f78f4fbed810748dc1a20d4"},"description":"HP condivide le riflessioni di alcuni esperti e consulenti dell\u2019azienda in merito ai principali rischi in ambito sicurezza","breadcrumb":{"@id":"https:\/\/www.bitmat.it\/visions\/previsioni-per-il-2022\/hp-cybersecurity-prediction-per-il-2022\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bitmat.it\/visions\/previsioni-per-il-2022\/hp-cybersecurity-prediction-per-il-2022\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.bitmat.it\/visions\/previsioni-per-il-2022\/hp-cybersecurity-prediction-per-il-2022\/#primaryimage","url":"https:\/\/www.bitmat.it\/visions\/files\/2021\/12\/Schermata-2021-12-03-alle-18.20.40.png","contentUrl":"https:\/\/www.bitmat.it\/visions\/files\/2021\/12\/Schermata-2021-12-03-alle-18.20.40.png","width":780,"height":776,"caption":"HP"},{"@type":"BreadcrumbList","@id":"https:\/\/www.bitmat.it\/visions\/previsioni-per-il-2022\/hp-cybersecurity-prediction-per-il-2022\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.bitmat.it\/visions\/"},{"@type":"ListItem","position":2,"name":"HP: Cybersecurity Prediction per il 2022"}]},{"@type":"WebSite","@id":"https:\/\/www.bitmat.it\/visions\/#website","url":"https:\/\/www.bitmat.it\/visions\/","name":"Previsioni per il 2025","description":"Interviste e previsioni per il 2025, ICT, mercati, trend, tecnologie","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bitmat.it\/visions\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Person","@id":"https:\/\/www.bitmat.it\/visions\/#\/schema\/person\/4cd1e4627f78f4fbed810748dc1a20d4","name":"Redazione BitMAT","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/cc68cb64f5606ebc4c95ec5b02440c57fc7d268268e5dd8c1cac7ec09ec07ac9?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/cc68cb64f5606ebc4c95ec5b02440c57fc7d268268e5dd8c1cac7ec09ec07ac9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cc68cb64f5606ebc4c95ec5b02440c57fc7d268268e5dd8c1cac7ec09ec07ac9?s=96&d=mm&r=g","caption":"Redazione BitMAT"},"description":"BitMAT Edizioni \u00e8 una casa editrice che ha sede a Milano con una copertura a 360\u00b0 per quanto riguarda la comunicazione rivolta agli specialisti dell'lnformation &amp; Communication Technology.","sameAs":["https:\/\/www.bitmat.it\/","https:\/\/www.facebook.com\/BitMATnews","https:\/\/x.com\/https:\/\/twitter.com\/BitMATnews"],"url":"https:\/\/www.bitmat.it\/visions\/author\/bitmat\/"}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/www.bitmat.it\/visions\/wp-json\/wp\/v2\/posts\/254","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bitmat.it\/visions\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bitmat.it\/visions\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bitmat.it\/visions\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bitmat.it\/visions\/wp-json\/wp\/v2\/comments?post=254"}],"version-history":[{"count":1,"href":"https:\/\/www.bitmat.it\/visions\/wp-json\/wp\/v2\/posts\/254\/revisions"}],"predecessor-version":[{"id":257,"href":"https:\/\/www.bitmat.it\/visions\/wp-json\/wp\/v2\/posts\/254\/revisions\/257"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bitmat.it\/visions\/wp-json\/wp\/v2\/media\/256"}],"wp:attachment":[{"href":"https:\/\/www.bitmat.it\/visions\/wp-json\/wp\/v2\/media?parent=254"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bitmat.it\/visions\/wp-json\/wp\/v2\/categories?post=254"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bitmat.it\/visions\/wp-json\/wp\/v2\/tags?post=254"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}